Report for kbc.be
NS Records at Parent Servers
We have successfully fetched domain's NS records from parent name server (
c.nsset.be.).
Domain NS records:
-
a1-253.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
-
a13-66.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
-
a16-66.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
-
a24-64.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
-
a26-67.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
-
a9-66.akam.net. TTL=86400
[NO GLUE4]
[NO GLUE6]
Test ignored, name servers are located outside of current zone.
Name Servers Have A Records
OK.
Found A records for all name servers.
- a1-253.akam.net. → 193.108.91.253
- a13-66.akam.net. → 2.22.230.66
- a16-66.akam.net. → 23.211.132.66
- a24-64.akam.net. → 2.16.130.64
- a26-67.akam.net. → 23.74.25.67
- a9-66.akam.net. → 184.85.248.66
To reach your name servers via IPv4 an A record is needed for each name server.
Name Servers Have AAAA Records
OK.
Found AAAA records for all name servers.
- a1-253.akam.net. → 2600:1401:2::fd
- a13-66.akam.net. → 2600:1480:800::42
- a16-66.akam.net. → 2600:1406:1b::42
- a24-64.akam.net. → 2600:1480:9800::40
- a26-67.akam.net. → 2600:1480:b800::43
- a9-66.akam.net. → 2a02:26f0:117::42
To reach your name servers via IPv6 an AAAA record is needed for each name server.
Your name servers returned
6 NS records:
-
a1-253.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
-
a13-66.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
-
a16-66.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
-
a24-64.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
-
a26-67.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
-
a9-66.akam.net. TTL=321
[NO GLUE4]
[NO GLUE6]
All Name Servers Responded
OK.
All your name servers responded. We queried domain's records from all of your name servers and we received them successfully.
OK.
No differences found.
The glue provided by the parent name servers has to match
the data provided by the authoritative name servers.
OK.
Domain name servers are not allowing recursive queries.
On all name servers which acts as caching name servers recursive queries should be restricted to local networks.
Having open DNS servers can lead to abuses such as cache poisoning and DOS (denial of service) attacks.
Cache poisoning attacks allows under certain conditions to redirect legitimate web traffic,
email and other traffic to malicious hosts compromising security.
OK.
Domain has 6 name servers. Recommended number,
between 2 and 7 name servers (RFC 2182 recommends to have at
least 3 authoritative name servers for domains).
OK.
All your name servers reported identical NS records.
Each name server should return identical NS records.
Check for Lame Name servers
OK.
No lame name servers found. All of your name servers are configured to be either master or slave for your domain.
OK.
No private IPs found. Name servers using private IPs
can't be reached from the Internet causing DNS delays.
Name Servers Have A Records
OK.
Found A records for each name servers.
- a1-253.akam.net. → 193.108.91.253
- a13-66.akam.net. → 2.22.230.66
- a16-66.akam.net. → 23.211.132.66
- a24-64.akam.net. → 2.16.130.64
- a26-67.akam.net. → 23.74.25.67
- a9-66.akam.net. → 184.85.248.66
To reach your name servers via IPv4 an A record is needed for each name server.
Name Servers Have AAAA Records
OK.
Found AAAA records for all name servers.
- a1-253.akam.net. → 2600:1401:2::fd
- a13-66.akam.net. → 2600:1480:800::42
- a16-66.akam.net. → 2600:1406:1b::42
- a24-64.akam.net. → 2600:1480:9800::40
- a26-67.akam.net. → 2600:1480:b800::43
- a9-66.akam.net. → 2a02:26f0:117::42
To reach your name servers via IPv6 an AAAA record is needed for each name server.
Name Servers Have Valid Names
OK.
All names are valid.
Name server name should be a valid host name, no partial name or IP address.
Check for Stealth Name Servers
OK.
No stealth name servers found.
All name servers returned by domain name servers should be listed at parent servers.
Check for Missing Name Servers
OK.
No missing name servers found.
All name servers returned by the parent name servers should have an NS record at your name servers.
OK.
No CNAMEs found in NS records.
RFC 2181, section 10.3 says that host name must map directly to one or more address record (A or AAAA)
and must not point to any CNAME records.
RFC 1034, section 3.6.2 says if a name appears in the right-hand side of RR (Resource Record)
it should not appear in the left-hand name of CNAME RR, thus CNAME records should not be used with
NS and MX records.
Despite this restrictions, there are many working configuration using CNAME with
NS and MX records.
OK.
All name servers are allowing TCP connections.
When response to a DNS query exceeds 512 bytes, TCP is negotiated
and used, all name servers should allow TCP connections (port 53).
Name Servers Distributed on Multiple Networks
OK.
Name servers are dispersed on 6
different C class networks:
-
184.85.248.0/24:
-
193.108.91.0/24:
-
2.16.130.0/24:
-
2.22.230.0/24:
-
23.211.132.0/24:
-
23.74.25.0/24:
Name servers should be dispersed (topologically and geographically)
across the Internet to avoid risk of single point of failure (RFC 2182).
Name Servers Distributed on Multiple ASNs
OK.
Name servers are dispersed on 2
different Autonomous Systems:
-
AS20940:
-
AS21342:
- a1-253.akam.net.
- a13-66.akam.net.
- a16-66.akam.net.
- a24-64.akam.net.
- a26-67.akam.net.
- a9-66.akam.net.
Name servers should be dispersed (topologically and geographically)
across the Internet to avoid risk of single point of failure (RFC 2182).
WARNING:
Name servers software versions are exposed:
- 184.85.248.66: "36198.194"
- 193.108.91.253: "41830.34"
- 2.16.130.64: "42475.168"
- 2.22.230.66: "17146.20"
- 23.211.132.66: "29488.207"
- 23.74.25.67: "36198.195"
- 2600:1401:2::fd: "18626.148"
- 2600:1406:1b::42: "35409.199"
- 2600:1480:800::42: "35409.197"
- 2600:1480:9800::40: "46499.9"
- 2600:1480:b800::43: "36198.191"
- 2a02:26f0:117::42: "36198.191"
Exposing name server's versions may be risky, when a new vulnerability is found
your name servers may be automatically exploited by
script kiddies
until you patch the system.
Learn how to hide version.
Domain SOA Record:
- Primary nameserver: a13-66.akam.net.
- Hostmaster (e-mail): tech.kbc.be.
- Serial: 2023120755
- Refresh: 3600
- Retry: 1800
- Expire: 2592000
- Minimum TTL: 900
Name Servers Agreement on Serial Number
OK.
All name servers (6) have the same
serial number [2023120755].
Having different serials on your name servers may show inconsistencies between name servers
configuration (multiple masters), or communication errors (ACL and firewall issues).
OK.
Serial number format OK [2023120755].
Your serial number is following general convention for
serial number YYYYMMDDnn, where YYYY is four-digit year
number, MM is the month, DD is the day and nn is the
sequence number in case zone file is updated more
than once per day.
OK.
Primary name server is a13-66.akam.net. and is listed at the parent name servers.
The MNAME field defines the Primary Master name server for the zone,
this name server should be found in your NS records.
OK.
Contact email for DNS problems is
[email protected]. (
tech.kbc.be.).
RNAME field defines an administrative email for your zone. RFC2142 recommends using
hostmaster
e-mail for this purpose, but any valid e-mail address can be used.
OK.
Refresh interval is 3600.
Recommended values [1200 .. 43200] (20 min ... 12 hours).
Refresh field from SOA record determines how quickly zone changes are propagated from master to slave.
OK.
Retry interval is 1800.
Recommended values [120 .. 7200] (2 minutes .. 2 hours).
Retry field from SOA record defines how often slave should retry contacting master if connection to master failed during refresh.
WARNING:
Expire interval is 2592000.
Recommended values [604800 .. 1209600] (1 week ... 2 weeks).
Expiry defines zone expiration time in seconds after which slave must re-validate zone file,
if contacting master fails then slave will stop responding to any queries.
WARNING:
Minimum TTL value is 900.
Recommended values [3600 .. 86400] (1 hour ... 1 day).
Minimum TTL was redefined in RFC 2308, now it defines the period of time used by slaves
to cache negative responses.
Your name servers returned
6 MX records:
-
5 mail80.mailinfra.com. TTL=321
-
5 mail61.mailinfra.com. TTL=321
-
5 mail63.mailinfra.com. TTL=321
-
5 mail60.mailinfra.com. TTL=321
-
5 mail62.mailinfra.com. TTL=321
-
5 mail81.mailinfra.com. TTL=321
OK.
All name servers returned identical MX records.
Mail Servers Have A Records
OK.
Found A records for all mail servers.
- mail60.mailinfra.com. → 193.244.253.162
- mail61.mailinfra.com. → 193.244.253.163
- mail62.mailinfra.com. → 193.244.253.164
- mail63.mailinfra.com. → 193.244.253.165
- mail80.mailinfra.com. → 193.245.87.146
- mail81.mailinfra.com. → 193.245.87.147
To reach your mail servers via IPv4 an A record is needed for each mail server.
Mail Servers Have AAAA Records
NOTICE:
While reading domain NS records at parent mail servers,
we found mail servers without AAAA records.
- mail60.mailinfra.com. → ?
- mail61.mailinfra.com. → ?
- mail62.mailinfra.com. → ?
- mail63.mailinfra.com. → ?
- mail80.mailinfra.com. → ?
- mail81.mailinfra.com. → ?
To reach your mail servers via IPv6 an AAAA record is needed for each mail server.
Reverse Entries for MX records
OK.
All mail servers have reverse DNS entries configured correctly.
|
Server |
IP |
PTR (Reverse) |
IPs |
|
mail80.mailinfra.com. |
193.245.87.146 |
mail80.mailinfra.com. |
193.245.87.146 |
|
mail61.mailinfra.com. |
193.244.253.163 |
mail61.mailinfra.com. |
193.244.253.163 |
|
mail63.mailinfra.com. |
193.244.253.165 |
mail63.mailinfra.com. |
193.244.253.165 |
|
mail60.mailinfra.com. |
193.244.253.162 |
cmail50.mailinfra.com. |
193.244.253.164, 193.244.253.163, 193.244.253.165, 193.244.253.162, 193.245.87.147, 193.245.87.146 |
|
mail60.mailinfra.com. |
193.244.253.162 |
mail60.mailinfra.com. |
193.244.253.162 |
|
mail62.mailinfra.com. |
193.244.253.164 |
mail62.mailinfra.com. |
193.244.253.164 |
|
mail81.mailinfra.com. |
193.245.87.147 |
mail81.mailinfra.com. |
193.245.87.147 |
All mail servers should have a reverse DNS (PTR) entry for
each IP address (RFC 1912). Missing reverse DNS entries will
make many mail servers to reject your e-mails or mark them
as SPAM.
All IP's reverse DNS entries should resolve back to
IP address (IP → PTR → IP).
Many mail servers are configured to reject e-mails from
IPs with inconsistent reverse DNS configuration.
Check MX Records for Invalid Chars
OK.
No invalid characters found.
Name field from MX records should be a valid host name.
Check MX Records IPs are Public
OK.
No private IPs found.
Mail servers using private IPs can't be reached from the Internet causing mail delivery delays.
Check MX Records for Duplicates
OK.
No MX records duplicates (same IP addresses) found.
Although technically valid, duplicate MX records have no benefits and can cause confusion.
Only Host Names in MX Records
OK.
No IPs found in MX records.
IP addresses are not allowed in MX records, only host names.
OK.
No CNAMEs found in MX records.
RFC 2181, section 10.3 says that host name must map directly to one or more address record (A or AAAA)
and must not point to any CNAME records.
RFC 1034, section 3.6.2 says if a name appears in the right-hand side of RR (Resource Record)
it should not appear in the left-hand name of CNAME RR, thus CNAME records should not be used with
NS and MX records.
Despite this restrictions, there are many working configuration using CNAME with
NS and MX records.
OK.
Mail servers IPs are not blacklisted.
Check Google Apps Settings
Test ignored, domain is not using Google Apps.
FAIL:
Connection to all mail servers failed.
- mail60.mailinfra.com.:
Server checks disabled due complaints.
- mail61.mailinfra.com.:
Server checks disabled due complaints.
- mail62.mailinfra.com.:
Server checks disabled due complaints.
- mail63.mailinfra.com.:
Server checks disabled due complaints.
- mail80.mailinfra.com.:
Server checks disabled due complaints.
- mail81.mailinfra.com.:
Server checks disabled due complaints.
To receive emails, mail servers should allow TCP connections on port 25.
OK.
No differences between mail server host names and greeting host name.
Accepts Postmaster Address
Temporary error, could not determine if
all mail servers are accepting emails to
[email protected] address:
-
mail60.mailinfra.com.
Server checks disabled due complaints.
-
mail61.mailinfra.com.
Server checks disabled due complaints.
-
mail62.mailinfra.com.
Server checks disabled due complaints.
-
mail63.mailinfra.com.
Server checks disabled due complaints.
-
mail80.mailinfra.com.
Server checks disabled due complaints.
-
mail81.mailinfra.com.
Server checks disabled due complaints.
RFC 822, RFC 1123 and RFC 2821 requires that all domain's mail servers should accept e-mails to postmaster.
To be compliant you can create an alias and forward all postmaster's e-mails to a valid mailbox.
Temporary error, could not determine if
all mail servers are accepting emails to
[email protected] address:
-
mail60.mailinfra.com.
Server checks disabled due complaints.
-
mail61.mailinfra.com.
Server checks disabled due complaints.
-
mail62.mailinfra.com.
Server checks disabled due complaints.
-
mail63.mailinfra.com.
Server checks disabled due complaints.
-
mail80.mailinfra.com.
Server checks disabled due complaints.
-
mail81.mailinfra.com.
Server checks disabled due complaints.
RFC 822, RFC 1123 and RFC 2821 requires that all domain's mail servers should accept e-mails to postmaster.
To be compliant you can create an alias and forward all postmaster's e-mails to a valid mailbox.
OK.
Found SPF record:
- 08ec4bcd2ef845e08ce25e10c15709a3
- 99c807ac3dc24142acbe47833fc2628c
- adobe-idp-site-verification=a54fd5fc436f6c2af077d34f0cf7f00da655b89eeac08b3f3f80f02ed1c01b90
- 06f62d0d-6675-4912-8f55-76d52354595f-07062019
- v=spf1 mx -all
- 7fb80801-4235-4dc2-a3bb-592d6afbbb4a-03062019
- docusign=bce64760-b86e-4dc6-855f-e57e95c9feec
- QuoVadis=0ad92a39-eb2a-4503-adb3-f1c8457d9175
SPF
(Sender Policy Framework) record is designed to prevent e-mail spoofing.
Typical SPF record would be:
v=spf1 a mx ~all
or
v=spf1 a mx include:_spf.google.com ~all if you are using Google Apps.
FAIL:
Your name servers returned different TXT records:
- 184.85.248.66 → fm8cyptwf8sjz5s5ynv0f6pcr1yvhwq2
08ec4bcd2ef845e08ce25e10c15709a3
v=spf1 mx -all
vmware-cloud-verification-d842e89a-fefb-4ac4-8eac-f22aa9953442
yfft531vt1f6mslhly0cvbjgffqdn4mm
99c807ac3dc24142acbe47833fc2628c
06f62d0d-6675-4912-8f55-76d52354595f-07062019
7fb80801-4235-4dc2-a3bb-592d6afbbb4a-03062019
- 193.108.91.253 → v=spf1 mx -all
06f62d0d-6675-4912-8f55-76d52354595f-07062019
fm8cyptwf8sjz5s5ynv0f6pcr1yvhwq2
99c807ac3dc24142acbe47833fc2628c
vmware-cloud-verification-d842e89a-fefb-4ac4-8eac-f22aa9953442
yfft531vt1f6mslhly0cvbjgffqdn4mm
apple-domain-verification=DZiTfqFZm2LL9aPU
docusign=4113f7a2-a5b4-4cbe-95fb-6fa001b03528
08ec4bcd2ef845e08ce25e10c15709a3
- 2.16.130.64 →
QuoVadis=28be7f96-8e10-44bb-9365-6775b3374c3e
yfft531vt1f6mslhly0cvbjgffqdn4mm
apple-domain-verification=DZiTfqFZm2LL9aPU
docusign=bce64760-b86e-4dc6-855f-e57e95c9feec
vmware-cloud-verification-d842e89a-fefb-4ac4-8eac-f22aa9953442
7fb80801-4235-4dc2-a3bb-592d6afbbb4a-03062019
adobe-sign-verification=e1b9fd8f4f3127253053643cd86338dc
- 2.22.230.66 → 06f62d0d-6675-4912-8f55-76d52354595f-07062019
QuoVadis=3517eee8-d1d4-4fd0-a5f4-bb9a12a01e8a
08ec4bcd2ef845e08ce25e10c15709a3
adobe-sign-verification=e1b9fd8f4f3127253053643cd86338dc
7fb80801-4235-4dc2-a3bb-592d6afbbb4a-03062019
QuoVadis=28be7f96-8e10-44bb-9365-6775b3374c3e
yfft531vt1f6mslhly0cvbjgffqdn4mm
vmware-cloud-verification-d842e89a-fefb-4ac4-8eac-f22aa9953442
- 23.211.132.66 → 08ec4bcd2ef845e08ce25e10c15709a3
99c807ac3dc24142acbe47833fc2628c
adobe-idp-site-verification=a54fd5fc436f6c2af077d34f0cf7f00da655b89eeac08b3f3f80f02ed1c01b90
06f62d0d-6675-4912-8f55-76d52354595f-07062019
v=spf1 mx -all
7fb80801-4235-4dc2-a3bb-592d6afbbb4a-03062019
docusign=bce64760-b86e-4dc6-855f-e57e95c9feec
QuoVadis=0ad92a39-eb2a-4503-adb3-f1c8457d9175
- 23.74.25.67 → vmware-cloud-verification-d842e89a-fefb-4ac4-8eac-f22aa9953442
QuoVadis=3517eee8-d1d4-4fd0-a5f4-bb9a12a01e8a
QuoVadis=0ad92a39-eb2a-4503-adb3-f1c8457d9175
apple-domain-verification=DZiTfqFZm2LL9aPU
v=spf1 mx -all
QuoVadis=28be7f96-8e10-44bb-9365-6775b3374c3e
fm8cyptwf8sjz5s5ynv0f6pcr1yvhwq2
yfft531vt1f6mslhly0cvbjgffqdn4mm
docusign=bce64760-b86e-4dc6-855f-e57e95c9feec
Only SPF records are compared, all name servers should return identical SPF records.
No SPF type records found.
All name servers should return identical SPF records.
OK.
Found DMARC record:
DMARC
(Domain-based Message Authentication, Reporting & Conformance)
helps reducing potential of email-based abuse such as spam and
phishing e-mails.
OK.
Domain
kbc.be. resolves to:
Domain Name IPs are Public
OK.
No private IPs found for kbc.be..
Web servers using private IPs can't be reached from the Internet.
OK.
Domain
www.kbc.be. resolves to:
OK.
No private IPs found for www.kbc.be..
Web servers using private IPs can't be reached from the Internet.
Report completed in 4.98 seconds.
Recent reports:
cs.uni-saarland.de
mccbph.com
mi.uni-saarland.de
groupeais.fr
groupeais.fr