Report for yoyo-web.cl
NS Records at Parent Servers
We have successfully fetched domain's NS records from parent name server (
cl1-tld.d-zone.ca.).
Domain NS records:
-
ns1.yoyo-web.cl. TTL=3600
[190.102.238.183]
[NO GLUE6]
-
ns2.yoyo-web.cl. TTL=3600
[190.102.238.183]
[NO GLUE6]
OK.
Parent name servers are offering glue for domain's name
servers. We received name servers list and it's IP addresses
from parent name server (cl1-tld.d-zone.ca.).
Name Servers Have A Records
OK.
Found A records for all name servers.
- ns1.yoyo-web.cl. → 190.102.238.183
- ns2.yoyo-web.cl. → 190.102.238.183
To reach your name servers via IPv4 an A record is needed for each name server.
Name Servers Have AAAA Records
NOTICE:
While reading domain NS records at parent name servers,
we found name servers without AAAA records.
- ns1.yoyo-web.cl. → ?
- ns2.yoyo-web.cl. → ?
To reach your name servers via IPv6 an AAAA record is needed for each name server.
Your name servers returned
2 NS records:
-
ns1.yoyo-web.cl. TTL=3600
[190.102.238.183]
[NO GLUE6]
-
ns2.yoyo-web.cl. TTL=3600
[190.102.238.183]
[NO GLUE6]
All Name Servers Responded
OK.
All your name servers responded. We queried domain's records from all of your name servers and we received them successfully.
OK.
No differences found.
The glue provided by the parent name servers has to match
the data provided by the authoritative name servers.
WARNING:
The following name servers announces themselves as open
DNS servers:
On all name servers which acts as caching name servers recursive queries should be restricted to local networks.
Having open DNS servers can lead to abuses such as cache poisoning and DOS (denial of service) attacks.
Cache poisoning attacks allows under certain conditions to redirect legitimate web traffic,
email and other traffic to malicious hosts compromising security.
OK.
Domain has 2 name servers. Recommended number,
between 2 and 7 name servers (RFC 2182 recommends to have at
least 3 authoritative name servers for domains).
OK.
All your name servers reported identical NS records.
Each name server should return identical NS records.
Check for Lame Name servers
WARNING:
We found name servers which are not authoritative for your domain. Lame name servers:
All of your name server should be configured either as master or slave for your domain,
if a NS records points to a name server that does not answer authoritatively,
name server is called lame name server.
OK.
No private IPs found. Name servers using private IPs
can't be reached from the Internet causing DNS delays.
Name Servers Have A Records
OK.
Found A records for each name servers.
- ns1.yoyo-web.cl. → 190.102.238.183
- ns2.yoyo-web.cl. → 190.102.238.183
To reach your name servers via IPv4 an A record is needed for each name server.
Name Servers Have AAAA Records
NOTICE:
We found name servers without AAAA records.
- ns1.yoyo-web.cl. → ?
- ns2.yoyo-web.cl. → ?
To reach your name servers via IPv6 an AAAA record is needed for each name server.
Name Servers Have Valid Names
OK.
All names are valid.
Name server name should be a valid host name, no partial name or IP address.
Check for Stealth Name Servers
OK.
No stealth name servers found.
All name servers returned by domain name servers should be listed at parent servers.
Check for Missing Name Servers
OK.
No missing name servers found.
All name servers returned by the parent name servers should have an NS record at your name servers.
OK.
No CNAMEs found in NS records.
RFC 2181, section 10.3 says that host name must map directly to one or more address record (A or AAAA)
and must not point to any CNAME records.
RFC 1034, section 3.6.2 says if a name appears in the right-hand side of RR (Resource Record)
it should not appear in the left-hand name of CNAME RR, thus CNAME records should not be used with
NS and MX records.
Despite this restrictions, there are many working configuration using CNAME with
NS and MX records.
OK.
All name servers are allowing TCP connections.
When response to a DNS query exceeds 512 bytes, TCP is negotiated
and used, all name servers should allow TCP connections (port 53).
Name Servers Distributed on Multiple Networks
WARNING:
All name servers are located in one C class network:
-
190.102.238.0/24:
- ns1.yoyo-web.cl.
- ns2.yoyo-web.cl.
Name servers should be dispersed (topologically and geographically)
across the Internet to avoid risk of single point of failure (RFC 2182).
Name Servers Distributed on Multiple ASNs
WARNING:
All name servers are located in one Autonomous System:
-
AS27901:
- ns1.yoyo-web.cl.
- ns2.yoyo-web.cl.
Name servers should be dispersed (topologically and geographically)
across the Internet to avoid risk of single point of failure (RFC 2182).
OK.
Name servers software versions are not exposed:
- 190.102.238.183: "unknown"
Exposing name server's versions may be risky, when a new vulnerability is found
your name servers may be automatically exploited by
script kiddies
until you patch the system.
Learn how to hide version.
Could not get SOA record from your name servers.
Could not get MX records from your name servers.
Could not get MX records from your name servers.
WARNING:
Could not resolve domain yoyo-web.cl..
Domain Name IPs are Public
Could not resolve yoyo-web.cl..
WARNING:
Could not resolve domain www.yoyo-web.cl..
Could not resolve www.yoyo-web.cl..
Report completed in 8.75 seconds.
Recent reports:
herzpraxis-schlieren.ch
neumeier-edv.de
strikeforcesales.com.au
freedsl.tv
yoyo-web.cl