m451.de. 86400 SOA ns.inwx.de. # Start Of Authority
hostmaster.m451.de. # Mail-Addresse
2018090901 # Serialnumber
10800 # refresh
3600 # retry
604800 # expire
3600 # TTL
m451.de. 86400 NS ns.inwx.de. # Nameserver
m451.de. 86400 NS ns2.inwx.de. # Nameserver
m451.de. 3600 IN A 185.11.138.5
m451.de. 3600 MX 100 mail.ideas-in-logic.de.
NS für www.m451.de -> x.root-server.net?: ".de -> NS a.nic.de"
NS für www.m451.de -> a.nic.de?: "m451.de -> NS ns.inwx.de"
A für www.m451.de -> ns.inwx.de?: "www.m451.de -> IN A 185.11.138.5"
> delv +vtrace +mtrace A www.m451.de
;; fetch: www.m451.de/A
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10286
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;www.m451.de. IN A
;; ANSWER SECTION:
;www.m451.de. 2796 IN A 185.11.138.5
;www.m451.de. 2796 IN RRSIG A 13 3 3600 (
; 20180922125042 20180908112042 13461 m451.de.
; FwYUGXWl6ThYkFBWH4z3fSyMO3yv
; O0HGRhb/tWYmCqxMsLQKVLAqfLX+
; r1DTmueRHs+WCvmA0UCN15CfySmf
; Wg== )
;; validating www.m451.de/A: starting
;; validating www.m451.de/A: attempting positive response validation
;; fetch: m451.de/DNSKEY
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26443
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;m451.de. IN DNSKEY
;; ANSWER SECTION:
;m451.de. 83644 IN DNSKEY 257 3 13 (
; rr05gqdmgNBHZ40bBIMR9VocgwBF
; CZcgrCR7Gb87Y4YeIHDty8/IYVbr
; xAytrCuc8VG85Rc9Kjq+hDSjpc6f
; Qw==
; ) ; KSK; alg = ECDSAP256SHA256 ; key id = 16944
;m451.de. 83644 IN DNSKEY 256 3 13 (
; 0dNuGSiNHq66qU8s2Rf+Iiv5+/t+
; aJE3tupLEbHqRZTHT4vIyhStGIrF
; XOZRiXpt2bZuQOnsFazmyb5hxMVn
; 1A==
; ) ; ZSK; alg = ECDSAP256SHA256 ; key id = 13461
;m451.de. 83644 IN RRSIG DNSKEY 13 2 86400 (
; 20180922135042 20180908122042 16944 m451.de.
; smH5bxe/ifa7xkTAIZrxkUrSKXdF
; 262xL+YS/jtalQhxEQAeYIZ+sJyg
; 0bWLO6Tg56TMz/TSRMEiL+FLOV+y
; fA== )
;; validating m451.de/DNSKEY: starting
;; validating m451.de/DNSKEY: attempting positive response validation
;; fetch: m451.de/DS
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50609
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;m451.de. IN DS
;; ANSWER SECTION:
;m451.de. 83644 IN DS 16944 13 2 (
; CFFEF6FB4C83737E5B5F2DE77FA8
; 40149E09BD2721DE0F72EDB0C946
; 9DC20CAE )
;m451.de. 83644 IN RRSIG DS 8 2 86400 (
; 20180918200125 20180911200125 33364 de.
; GDDxfC969C9VMleiJYQ6xi4TBJXo
; C/m9kZ3qGqXXGoLbq/F6eG0dyjb2
; oXuzssfTRK/jxfvWpvvU9I1RA9ry
; lbgz4ZsTp+GpHCRcu4Qm5whYRNjG
; zauoJ/pNYIDi0ziEgwTAV01Pve6S
; 8SLktYaEsk/XKtXrgeASfo2vF28C
; RZg= )
;; validating m451.de/DS: starting
;; validating m451.de/DS: attempting positive response validation
;; fetch: de/DNSKEY
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3899
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;de. IN DNSKEY
;; ANSWER SECTION:
;de. 4314 IN DNSKEY 257 3 8 (
; AwEAAaZEsxM26e8MgLuWsLAeRd7B
; zNdJjvhfGbqQ1xxtYd4TPPqYr7Qc
; K9Em18VyYEnjqXOqVWBuOhCWnrij
; P5GiumIliap+LerHjTk3QCgim1qv
; w3k7UFOgwMe8yOl7hghG8Nbgw6Un
; VfmUD71TaGSwj1C5EO2guiXZkFPU
; p2UzmUmoe5EWwtzCni7L0RDl5MaR
; VhjUBEkPrAVI603GDTuwtRKZLTiy
; fc3Qmq/u83/6Knxot5pHp3reRcsp
; 0vk2G+RQubgDKsmaXCql4mPzR911
; Di68vwbBfSyLZ0EOwVkrO7VJgr/R
; JJ37JlydfQfGmQ3Dkvw1h8ifZhRC
; 8oOkv8ynUXM=
; ) ; KSK; alg = RSASHA256 ; key id = 39227
;de. 4314 IN DNSKEY 256 3 8 (
; AwEAAbg/JmxwVhcxVUCgUIIywYIB
; rDpEgSeFIL9xwU7XmJgcgsF6/t0c
; LLnUydK/e/dam2pDyllUqaCZFRf9
; qagYmgMIoZbvAylIcUqjjv7PjXLs
; aWC/Ir3ioXFEAUzXfNlsSOeyf3eS
; wz+DEOafc8+iwuPl5l3V2onV34Q8
; x3i2CSlj
; ) ; ZSK; alg = RSASHA256 ; key id = 33364
;de. 4314 IN RRSIG DNSKEY 8 1 7200 (
; 20180927120000 20180906120000 39227 de.
; J5ATKKj37fEkKUsJVcsZGgZGa4ec
; nrTx5MYcq1OgBTuPXY4l83YTq7vy
; onUlLw+QU0hR4HnbPf4wz875VpgT
; NZaS8MpzgSfnZFoVrGQiHOLkIHzU
; 7Penf1NhEDip/R6UkvHiS/x747iD
; WjOc9MwV0XDDzngNftd5iyxfmAnB
; Pbjah5aX56C0+Wov1WXDXjnbOtop
; pbACwy3j40/hTcaHnNgRoE7K/c2n
; hwiHn9skSMxwlB1EsUcHa/Jvflba
; u5Jcqp0IlYEqwQt/BrtWFiTLOc2K
; G7/mmSc2Kv5//4odTL6jBIjT0Oi0
; /cYD1oOiRTJpHgd08OqcOEuVvls+
; sXFNZA== )
;; validating de/DNSKEY: starting
;; validating de/DNSKEY: attempting positive response validation
;; fetch: de/DS
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47427
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;de. IN DS
;; ANSWER SECTION:
;de. 83507 IN DS 39227 8 2 (
; AAB73083B9EF70E4A5E94769A418
; AC12E887FC3C0875EF206C3451DC
; 40B6C4FA )
;de. 83507 IN RRSIG DS 8 1 86400 (
; 20180924190000 20180911180000 41656 .
; QOoEXnZGx6/uVqle8BODQWPhwb+b
; MT3SNTGRSWNc54JDkwsRilPfF29E
; zqyL7KDzoKdQ+nF063SHDf+PrOkh
; wgprZ2XGj+yp2FSiWiu2LfjkiOJ2
; DLFzO4niUSvQTX/Px3RG/ctYLMuf
; 7PK3KtkN1h8FeN1/j7QrJZiFnqYp
; /fdgh8CREY5vkzNPdBOcBqdmvO9e
; se2NXWUlIf1KD+iqE3a5Gh7+OYI0
; VCXiywB1sFSpIU8CKsDBcxCeRF7k
; XkRHbLqMWPaQQeod+NARo4xQsi+D
; 3SoShqi3zbkRLSnFbCxH1caLVBqI
; MOxybsb4quyi3zVDmkmhrnYxWLbn
; 9wLe+w== )
;; validating de/DS: starting
;; validating de/DS: attempting positive response validation
;; fetch: ./DNSKEY
;; received packet from 192.168.1.4#53
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5555
;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1252
;; QUESTION SECTION:
;. IN DNSKEY
;; ANSWER SECTION:
;. 169897 IN DNSKEY 257 3 8 (
; AwEAAaz/tAm8yTn4Mfeh5eyI96WS
; VexTBAvkMgJzkKTOiW1vkIbzxeF3
; +/4RgWOq7HrxRixHlFlExOLAJr5e
; mLvN7SWXgnLh4+B5xQlNVz8Og8kv
; ArMtNROxVQuCaSnIDdD5LKyWbRd2
; n9WGe2R8PzgCmr3EgVLrjyBxWezF
; 0jLHwVN8efS3rCj/EWgvIWgb9tar
; pVUDK/b58Da+sqqls3eNbuv7pr+e
; oZG+SrDK6nWeL3c6H5Apxz7LjVc1
; uTIdsIXxuOLYA4/ilBmSVIzuDWfd
; RUfhHdY6+cn8HFRm+2hM8AnXGXws
; 9555KrUB5qihylGa8subX2Nn6UwN
; R1AkUTV74bU=
; ) ; KSK; alg = RSASHA256 ; key id = 20326
;. 169897 IN DNSKEY 257 3 8 (
; AwEAAagAIKlVZrpC6Ia7gEzahOR+
; 9W29euxhJhVVLOyQbSEW0O8gcCjF
; FVQUTf6v58fLjwBd0YI0EzrAcQqB
; GCzh/RStIoO8g0NfnfL2MTJRkxoX
; bfDaUeVPQuYEhg37NZWAJQ9VnMVD
; xP/VHL496M/QZxkjf5/Efucp2gaD
; X6RS6CXpoY68LsvPVjR0ZSwzz1ap
; AzvN9dlzEheX7ICJBBtuA6G3LQpz
; W5hOA2hzCTMjJPJ8LbqF6dsV6DoB
; Qzgul0sGIcGOYl7OyQdXfZ57relS
; Qageu+ipAdTTJ25AsRTAoub8ONGc
; LmqrAmRLKBP1dfwhYB4N7knNnulq
; QxA+Uk1ihz0=
; ) ; KSK; alg = RSASHA256 ; key id = 19036
;. 169897 IN DNSKEY 256 3 8 (
; AwEAAfaifSqh+9ItxYRCwuiY0FY2
; NkaEwd/zmyVvakixDgTOkgG/PUzl
; EauAiKzlxGwezjqbKFPSwrY3qHmb
; bsSTY6G8hZtna8k26eCwy59Chh57
; 3cu8qtBkmUIXMYG3fSdlUReP+uhB
; WBfKI2aGwhRmQYR0zSmg7PGOde34
; c/rOItK1ebJhjTAJ6TmnON7qMfk/
; lKvH4qOvYtzstLhr7Pn9ZOVLx/WU
; KQpU/nEyFyTduRbz1nZqkp6yMuHw
; WVsABK8lUYXSaUrDAsuMSldhafmR
; /A15BxNhv9M7mzJj7UH2RVME9JbY
; inBEzWwW9GpnY+ZmBWgZiRVTaDue
; mCTJ5ZJWLRs=
; ) ; ZSK; alg = RSASHA256 ; key id = 41656
;. 169897 IN RRSIG DNSKEY 8 0 172800 (
; 20180930000000 20180909000000 19036 .
; GvFso1C76Dk79nt07sVCwGm/Hw3Q
; ytVpQ0VnxEc2uI3iJnD7Bls2cmyA
; egT1USX4qY/j+1+j88xhwDVnM21w
; 8fyAppbbea0Ri4gfM4562KNIrUBD
; JCybijL+4GbTwwq8Z2RKqDjTkEHx
; vQ7KCV+9ldtzcpzF7FE4ct3rzaEQ
; T6APVR70dxH+lc/JL1PVdM9zeclh
; tmRBrfRJHdU9XfqY3PycubLxWtZL
; NOUqB2gBxwvfK6zg1VCZ8JQCDIfE
; VyWae1WEooBvHAq4obNJs6rF9JC3
; qnc5WxIqBZnWD41NkZMbOqvBxJvk
; Liwvp98qOCkvbKTbneFA0q3ZGtwN
; OBhajA== )
;; validating ./DNSKEY: starting
;; validating ./DNSKEY: attempting positive response validation
;; validating ./DNSKEY: verify rdataset (keyid=19036): success
;; validating ./DNSKEY: signed by trusted key; marking as secure
;; validating de/DS: in fetch_callback_validator
;; validating de/DS: keyset with trust secure
;; validating de/DS: resuming validate
;; validating de/DS: verify rdataset (keyid=41656): success
;; validating de/DS: marking as secure, noqname proof not needed
;; validating de/DNSKEY: in dsfetched
;; validating de/DNSKEY: dsset with trust secure
;; validating de/DNSKEY: verify rdataset (keyid=39227): success
;; validating de/DNSKEY: marking as secure (DS)
;; validating m451.de/DS: in fetch_callback_validator
;; validating m451.de/DS: keyset with trust secure
;; validating m451.de/DS: resuming validate
;; validating m451.de/DS: verify rdataset (keyid=33364): success
;; validating m451.de/DS: marking as secure, noqname proof not needed
;; validating m451.de/DNSKEY: in dsfetched
;; validating m451.de/DNSKEY: dsset with trust secure
;; validating m451.de/DNSKEY: verify rdataset (keyid=16944): success
;; validating m451.de/DNSKEY: marking as secure (DS)
;; validating www.m451.de/A: in fetch_callback_validator
;; validating www.m451.de/A: keyset with trust secure
;; validating www.m451.de/A: resuming validate
;; validating www.m451.de/A: verify rdataset (keyid=13461): success
;; validating www.m451.de/A: marking as secure, noqname proof not needed
; fully validated
www.m451.de. 2796 IN A 185.11.138.5
www.m451.de. 2796 IN RRSIG A 13 3 3600
20180922125042 20180908112042 13461 m451.de. Fw...g==
www.m451.de. 3297 IN A 185.11.138.5
www.m451.de. 3297 IN RRSIG A # Signatur zum A-Record
13 # Signaturverfahren -> ECDSAP256SHA256
3 # Name besteht aus 3 Komponenten
3600 # TTL der Antwort
20180922125042 # not valid before
20180908112042 # not valid after
13461 # Schlüssel ID
m451.de. # Name des Signierers
FwYUGXWl6ThYk...SmfWg== # base64 signatur
_25._tcp.mail.ideas-in-logic.de. 3600 IN TLSA 3 1 1 AD1...28 _25._tcp.mail.ideas-in-logic.de. 3600 IN TLSA 2 1 1 60B...18
policy:
- id: "default"
algorithm: "ecdsap256sha256"
nsec3: "on"
nsec3-iterations: "100"
template:
- id: "default"
storage: "/var/lib/knot/zones"
notify: "slave"
acl: [ "acl_slave", "deny_all" ]
dnssec-signing: "on"
dnssec-policy: "default"
serial-policy: "dateserial"