DNSSEC Checker
Verify if a domain has DNSSEC enabled and check its DNS security status
Powered by RDAP • Direct registry queries • Instant results
What is DNSSEC?
DNSSEC (Domain Name System Security Extensions) addresses a fundamental vulnerability in DNS: the original protocol from 1983 included no way to verify that DNS responses were authentic. This made DNS vulnerable to spoofing attacks where malicious actors could redirect users to fake websites.
DNSSEC adds cryptographic signatures to DNS records. When a user's DNS resolver queries for your domain, it can verify the response is authentic and unmodified by checking these signatures against public keys published in DNS. This "chain of trust" extends from the root DNS servers all the way to your domain.
How DNSSEC Works: The Chain of Trust
DNSSEC establishes trust through a hierarchical chain from the DNS root to your domain. Here are the key components:
- Zone Signing Key (ZSK): Signs individual DNS records (A, AAAA, MX, etc.). Rotated frequently (every few months).
- Key Signing Key (KSK): Signs the ZSK. Rotated less frequently (yearly or longer). Hash published as DS record.
- DNSKEY Records: Contain the public portions of ZSK and KSK, published in your zone.
- DS Records: Hash of your KSK, published in the parent zone (.com, .org, etc.) to establish trust link.
- RRSIG Records: Cryptographic signatures for each record set, created with the ZSK.
When a validating resolver queries your domain, it verifies the chain: root zone → TLD zone (.com) → your zone, checking that each level's keys are vouched for by the level above.
Why DNSSEC Matters for Security
Without DNSSEC, your domain is vulnerable to serious attacks:
- DNS Spoofing: Attackers intercept DNS queries and return false IP addresses, redirecting users to malicious servers.
- Cache Poisoning: Malicious records are injected into DNS resolver caches, affecting all users of that resolver.
- Man-in-the-Middle: Attackers position themselves between users and legitimate servers, intercepting all traffic.
- BGP Hijacking Amplification: Combined with BGP attacks, DNS spoofing can redirect large portions of internet traffic.
Real-world attacks have targeted banks, cryptocurrency exchanges, and government sites. The 2018 DNS hijacking campaign against Brazilian banks affected millions of users. DNSSEC would have prevented these attacks.
DNSSEC for Domain Investors
DNSSEC status can affect domain value and buyer requirements:
- Enterprise Requirements: Large corporate buyers increasingly require DNSSEC capability. Domains at registrars without DNSSEC support may be less attractive.
- Premium Positioning: DNSSEC-enabled domains signal professional management and security awareness.
- Financial Sector: Banks and fintech companies often mandate DNSSEC for acquired domains.
- Government Contracts: Many government agencies require DNSSEC for contractor domains.
How to Enable DNSSEC
Follow these steps to enable DNSSEC for your domain:
- Step 1: Verify your DNS provider supports DNSSEC signing. Cloudflare, Route 53, Google Cloud DNS, and most enterprise providers do.
- Step 2: Enable DNSSEC signing in your DNS provider's dashboard. This generates keys and starts signing your zone.
- Step 3: Copy the DS record information from your DNS provider.
- Step 4: Log into your domain registrar and add the DS record to your domain's settings.
- Step 5: Wait for propagation (up to 48 hours) and verify using DNSViz or our checker.
Tip: Cloudflare makes this especially easy—if your registrar supports it, Cloudflare can automatically push DS records with one click.
DNSSEC Troubleshooting
Common DNSSEC problems and how to diagnose them:
- Domain Not Resolving: If DNSSEC is misconfigured, validating resolvers will refuse to return your domain. Check DS/DNSKEY match with DNSViz.
- Expired Signatures: RRSIG records have expiration dates. If your DNS provider fails to re-sign, signatures expire and validation fails.
- Key Rotation Issues: When rolling keys, the old DS record must remain until the new DNSKEY propagates. Timing matters.
- DS Record Mismatch: If you change DNS providers, the DS record at your registrar must be updated to match the new provider's keys.
- Algorithm Mismatch: Some older registrars don't support modern algorithms like ECDSA. Verify compatibility.