Category | Status | Test name | Information send feedback |
---|---|---|---|
Parent | Domain NS records | Nameserver records returned by the parent servers are: open.auth.studio. ['91.200.176.1'] [TTL=3600] private.auth.studio. ['185.85.196.65'] [TTL=3600] v0n1.nic.studio was kind enough to give us that information.
| |
TLD Parent Check | Good. v0n1.nic.studio, the parent server I interrogated, has information for your TLD. This is a good thing as there are some other domain extensions like "co.us" for example that are missing a direct check. | ||
Your nameservers are listed | Good. The parent server v0n1.nic.studio has your nameservers listed. This is a must if you want to be found as anyone that does not know your DNS servers will first ask the parent nameservers. | ||
DNS Parent sent Glue | Good. The parent nameserver sent GLUE, meaning he sent your nameservers as well as the IPs of your nameservers. Glue records are A records that are associated with NS records to provide "bootstrapping" information to the nameserver.(see RFC 1912 section 2.3) | ||
Nameservers A records | Good. Every nameserver listed has A records. This is a must if you want to be found. | ||
NS | NS records from your nameservers | NS records got from your nameservers listed at the parent NS are: open.auth.studio ['91.200.176.1'] [TTL=172800] private.auth.studio ['109.104.147.1'] [TTL=172800] |
|
Recursive Queries | Good. Your nameservers (the ones reported by the parent server) do not report that they allow recursive queries for anyone. | ||
Same Glue | Looks like the A records (the GLUE) got from the parent zone check are different than the ones got from your nameservers. You have to make sure your parent server has the same NS records for your zone as you do.I detected some problems as follows: For private.auth.studio the parent reported: ['185.85.196.65'] and your nameservers reported: ['109.104.147.1'] |
||
Glue for NS records | OK. When I asked your nameservers for your NS records they also returned the A records for the NS records. This is a good thing as it will spare an extra A lookup needed to find those A records. | ||
Mismatched NS records | OK. The NS records at all your nameservers are identical. | ||
DNS servers responded | ERROR: One or more of your nameservers did not respond: The ones that did not respond are: 185.85.196.65 |
||
Name of nameservers are valid | WARNING: At least one of your NS name does not seem a valid host name The ones that do not seem valid: open.auth.studio private.auth.studio |
||
Multiple Nameservers | Good. You have multiple nameservers. According to RFC2182 section 5 you must have at least 3 nameservers, and no more than 7. Having 2 nameservers is also ok by me. | ||
Nameservers are lame | OK. All the nameservers listed at the parent servers answer authoritatively for your domain. | ||
Missing nameservers reported by parent | OK. All NS records are the same at the parent and at your nameservers. | ||
Missing nameservers reported by your nameservers | OK. All nameservers returned by the parent server v0n1.nic.studio are the same as the ones reported by your nameservers. | ||
Domain CNAMEs | OK. RFC1912 2.4 and RFC2181 10.3 state that there should be no CNAMEs if an NS (or any other) record is present. | ||
NSs CNAME check | OK. RFC1912 2.4 and RFC2181 10.3 state that there should be no CNAMEs if an NS (or any other) record is present. | ||
Different subnets | OK. Looks like you have nameservers on different subnets! | ||
IPs of nameservers are public | Ok. Looks like the IP addresses of your nameservers are public. This is a good thing because it will prevent DNS delays and other problems like | ||
DNS servers allow TCP connection | OK. Seems all your DNS servers allow TCP connections. This is a good thing and useful even if UDP connections are used by default. | ||
Different autonomous systems | OK. It seems you are safe from a single point of failure. You must be careful about this and try to have nameservers on different locations as it can prevent a lot of problems if one nameserver goes down. | ||
Stealth NS records sent | Ok. No stealth ns records are sent | ||
SOA | SOA record | The SOA record is: Primary nameserver: open.auth.studio Hostmaster E-mail address: da.zhao.hu Serial #: 2020825365 Refresh: 7200 Retry: 900 Expire: 1209600 2 weeks Default TTL: 86400 |
|
NSs have same SOA serial | OK. All your nameservers agree that your SOA serial number is 2020825365. | ||
SOA MNAME entry | OK. open.auth.studio That server is listed at the parent servers. | ||
SOA Serial | Your SOA serial number is: 2020825365. This can be ok if you know what you are doing. | ||
SOA REFRESH | OK. Your SOA REFRESH interval is: 7200. That is OK | ||
SOA RETRY | Your SOA RETRY value is: 900. Looks ok | ||
SOA EXPIRE | Your SOA EXPIRE number is: 1209600.Looks ok | ||
SOA MINIMUM TTL | Your SOA MINIMUM TTL is: 86400. This value was used to serve as a default TTL for records without a given TTL value and now is used for negative caching (indicates how long a resolver may cache the negative answer). RFC2308 recommends a value of 1-3 hours. Your value of 86400 is OK. | ||
MX | MX Records | Oh well, I did not detect any MX records so you probably don't have any and if you know you should have then they may be missing at your nameservers! |
|
WWW | WWW A Record |
Your www.auth.studio A record is: www.auth.studio -> auth.studio -> [ 52.58.78.16 ] [Looks like you have CNAME's] |
|
IPs are public | OK. All of your WWW IPs appear to be public IPs. | ||
WWW CNAME | OK. You do have a CNAME record for www.auth.studio.Your CNAME entry also returns the A record for the CNAME entry, which is good. |
Processed in 9.290 seconds.