Threat Intelligence 101

What is DNSSEC?

Posted: 1st April 2024
By: Esteban Borges

DNSSEC, short for Domain Name System Security Extensions, ensures the reliability of the internet by authenticating DNS query responses. If you’re concerned about cyber threats such as DNS spoofing, this article breaks down how DNSSEC works to secure your domain and why it’s a critical component of modern internet security, without delving into complicated technical details.

Key Takeaways

  • DNSSEC, or Domain Name System Security Extensions, is designed to provide origin authentication, data integrity, and authenticated denial of existence for the data within the DNS system.
  • The protocol enhances DNS integrity and security through digital signatures and cryptographic keys but does not encrypt DNS data, offering authenticity without altering underlying DNS processes.
  • Despite the inherent complexities and challenges in implementing and managing DNSSEC, its critical security benefits make it an essential component in protecting online presence and domain integrity against common threats like DNS cache poisoning and spoofing.

What is DNSSEC? (Domain Name System Security Extensions)

The DNS protocol, a hierarchical and decentralized system, powers internet connectivity by translating domain names into numerical IP addresses. This unseen giant of the online world ensures our digital communications reach their intended destinations by associating various information with domain names.

However, despite its criticality, DNS is not immune to threats. Enter DNSSEC, or Domain Name System Security Extensions. DNSSEC is a suite of specifications designed to fortify DNS data with origin authentication, data integrity, and authenticated denial of existence.

Think of DNSSEC as a shield, protecting the DNS from different types of cybercrime and maintaining the integrity of the DNS data.

The Mechanics of DNS Queries

A DNS query is the starting point of our journey, initiating when a client requests the IP address of a domain. The DNS Client service, functioning as a DNS resolver, attempts to resolve the query using locally cached information, much like a captain consulting their trusty map. In this process, dns requests play a crucial role in obtaining the desired information, and dns resolvers ensure the efficient retrieval of that information.

If the local map is insufficient, the resolver starts a grand journey across the internet’s vast expanse, reaching out first to the DNS root servers, then proceeding through a chain of DNS servers down to the intended Top-Level Domain (TLD) server. This follows a hierarchical structure until the authoritative DNS server for the queried hostname supplies the desired IP address, signifying the quest’s end.

Anatomy of a DNS Zone

To navigate the DNS, one must comprehend its various regions, referred to as DNS zones. Each DNS zone is an administrative space granting detailed control over DNS components. It manages a specific area within the DNS namespace.

Every DNS zone, including the dns root zone, begins with a global Time to Live (TTL) and a Start of Authority (SOA) record, which defines the primary authoritative name server for the zone. The zone contains various types of resource records such as Name Server records (NS), Address Mapping records (A), and Canonical Name records (CNAME), each serving a unique purpose.

Inside the DNS Database

The DNS database is our treasure chest, holding a variety of crucial information, such as IP addresses and domain name aliases, which are vital for the internet’s functionality. This treasure trove, however, is a potential target for emerging cyber threats, making its security paramount.

DNSSEC steps in here, offering an additional layer of protection to the database. DNSSEC, by authenticating DNS data, verifies the authenticity of DNS query responses and safeguards them from tampering, thus preserving the integrity of these responses.

DNSSEC: What Does It Mean? And How Does it Work?

DNSSEC, an acronym for Domain Name System Security Extensions, is a set of specifications designed to secure DNS information. DNSSEC, akin to an experienced seafarer, braves the internet’s turbulent seas, guaranteeing the authenticity and integrity of DNS data by authenticating responses with digital signatures. It introduces new records for securely indicating non-existent domains, enhancing the safety of our digital communication.

While DNSSEC strengthens the integrity and authenticity of DNS data, it does not offer confidentiality. DNS data remains unencrypted but is authenticated using the DNSSEC protocol. This cohabitation with traditional DNS mechanisms implies that there’s no need to alter the basic query and response procedures. As such, DNSSEC offers a harmonious blend of old and new, enhancing the security of our digital travels without disrupting the existing infrastructure.

Digital Signatures and Cryptography in DNSSEC

The cornerstone of DNSSEC’s security prowess is its use of public key cryptography and digital signatures. Each authoritative server has a linked private and public key, akin to a captain and their trusted first mate. Digital signatures are born from hashing DNS records and encrypting the resultant hash with the zone’s private key, thereby creating a cryptic map that only the legitimate owner can decrypt.

DNSSEC validation involves using the public key to verify the authenticity of digital signatures attached to DNS data. This procedure guarantees the data’s origin in the legitimate zone, thus providing data origin authentication. Moreover, it provides data integrity protection by enabling resolvers to detect alterations in DNS data since it was signed, shielding our digital voyages from tampering and forgery.

The Role of DNSSEC Records

DNSSEC brings in new DNS resource record types to authenticate and secure DNS data. The RRSIG record type holds the cryptographic signature for an associated set of DNS records, acting as a verified stamp of authenticity. The DNSKEY record type contains the public signing key necessary for verifying DNSSEC signatures, serving as the cypher to our encrypted map.

Furthermore, NSEC and NSEC3 records provide authenticated responses for non-existent DNS queries, with the latter offering additional security by hashing the next secure name to prevent zone walking. These new record types augment the security of DNS data, reinforcing the protective shield that DNSSEC provides.

Establishing Trust with DNSSEC Validation

In DNSSEC, trust anchors kick-start the chain of trust, beginning from the root zone and extending down to individual domain zones. This chain of trust model ensures a secure and authenticated path throughout the DNS hierarchy, much like a celestial path guiding us through the vast cosmos of the digital world.

However, building trust with DNSSEC comes with its own set of challenges. It necessitates DNSSEC-aware recursive or forwarding DNS servers that demand DNSSEC records from authoritative DNS servers to validate responses. Additionally, the involvement of multiple parties, like domain owners and service providers, can complicate DNSSEC implementation and management, making it crucial to support DNSSEC effectively.

Chain of Trust Model

In DNSSEC, the chain of trust constitutes a hierarchical model wherein each DNS zone’s authenticity is verified by the zone directly above it, thereby guaranteeing a secure and authenticated path from the top-level root zone to individual domain zones. It’s akin to a chain of command in a naval fleet, with each ship in the fleet verifying the one directly below it.

To bridge the trust between parent and child zones, DNSSEC employs the Delegation Signer record, which includes a hash of the child zone’s Key Signing Key (KSK) authenticated by the parent zone’s private key. Resolvers then use this information to validate the public KSK of a child zone by hashing the child zone’s KSK and comparing it to the hash value in the DS record. This process forms a continuous and unbroken chain of trust, ensuring the security of our voyage through the digital cosmos.

Key Management and Rotation

In DNSSEC, key management employs Zone Signing Keys (ZSKs) and Key Signing Keys (KSKs), each serving a distinct role in our digital navigation. The KSK is updated less frequently due to its critical role, whereas the ZSK is rotated more often, like a ship’s compass being regularly calibrated to ensure accurate navigation.

Key rollovers are essential for replacing outdated keys, much like changing a ship’s crew at the end of their shift. However, managing these cryptographic keys adds complexity to DNS server management due to additional record types and the need for regular key rollovers.

Furthermore, domains protected by DNSSEC require annual key changes, presenting a significant management effort, especially for companies with multiple domains.

How to Protect Your Company Against DNS Threats?

DNSSEC functions as an impenetrable stronghold against DNS cache poisoning and spoofing, guaranteeing the information provided by the DNS resolver originates from the authoritative nameserver. By using cryptographic signatures, DNSSEC validates that the responses to DNS queries are authentic and have not been tampered with, ensuring the integrity of the DNS responses.

Moreover, DNSSEC reduces the risk of users being directed by cybercriminals to malicious websites by authenticating the DNS data, inhibiting traffic redirection through DNS queries. While it does not protect against all cyber threats, including DDoS attacks, it enhances internet security by ensuring the authenticity of DNS data.

Securing Critical DNS Information

DNSSEC serves as an enhanced security protocol, offering vital protection for sensitive DNS records. The validation process of DNSSEC uses digital signatures, which are verified by resolving DNS servers, safeguarding data integrity for records such as TXT and MX records.

In this way, DNSSEC reduces risks by safeguarding against the creation of fraudulent DNS zones, thereby amplifying the security of zones, including those housing crucial records. It’s like having a fleet of warships guarding a treasure island, ensuring the safety of our precious digital assets.

The Challenges of DNSSEC Implementation

DNSSEC Validation Rate by Country Source: APNIC DNSSEC World Map

According to APNIC's 2023 report, the DNSSEC deployment landscape shows considerable variation, with an approximate 40% of DNS domains incorporating DNSSEC. Root zone domains have a high adoption rate of 92%, contrasting with the lower rates in .com and .net domains, at 4.3% and 5.3% respectively. The .nl domain is notably higher, with a 60% adoption rate. Furthermore, around 30% of internet users utilize DNSSEC validation, indicating a growing but still partial adoption of this crucial security feature.

According to a Feb 2024 report by StatDNS there are 6,826,211 DNSSEC signed domains out of a total of 157,577,788 .com domains, the DNSSEC adoption rate among .com domains stands at approximately 4.33%. This relatively low percentage indicates that despite the availability and significant security benefits of DNSSEC, a vast majority—over 95%—of .com domain holders have not yet implemented it. This disparity underscores the pressing need for greater awareness and more robust adoption efforts to bolster the security framework of the global internet infrastructure.

As DNSSEC deployment escalates in complexity, it relies heavily on the establishment of compatible connections among various entities, including domain registrars, DNS services, and domain registries. Additionally, the intricacies involved in managing the DNSSEC chain of trust, which encompasses a range of stakeholders such as domain owners and service providers, further complicate its adoption.

This situation is exacerbated by a shortage of staff expertise in DNS security, necessitating significant manual administrative efforts. Consequently, the effective implementation of DNSSEC becomes a costly and resource-intensive endeavor, presenting substantial challenges for widespread adoption.

The Complexity of Enabling DNSSEC

Enabling DNSSEC requires a detailed setup process and involves various operating modes, adding complexity to DNS server management and security. Once DNSSEC is enabled, the changes might take up to 24 hours to fully propagate and activate the security features across the internet.

However, these challenges do not diminish the importance of DNSSEC. Despite the complexities, the critical security enhancements that DNSSEC offers make it a worthwhile endeavor for organizations committed to bolstering their internet security.

DNSSEC Queries Source: Use of DNSSEC Validation for World (XA)

Despite the challenges, DNSSEC is actively supported by entities such as the U.S. Department of Homeland Security, which funds efforts to mature and deploy DNSSEC within the U.S. federal government.

How to Enable DNSSEC on Your Domain

Enabling DNSSEC on a domain involves a meticulous process, including adjusting settings with the registrar, signing the DNS zone, and publishing Delegation Signer (DS) records. After DNSSEC is enabled with the registrar, it can automatically sign the DNS zone and publish the DS records typically within hours.

Enabling DNSSEC on your domain with BIND requires a series of steps to ensure the security of your DNS information. This guide provides a general overview of the process:

  1. Update BIND to the Latest Version: Ensure that you're running a version of BIND that supports DNSSEC. Update BIND to the latest version available from your distribution's repository or the ISC website.
  2. Generate the Zone Signing Key (ZSK) and Key Signing Key (KSK):
    • Use the dnssec-keygen command to generate the ZSK and KSK for your domain. The KSK is used to sign the DNSKEY record itself, while the ZSK is used to sign the other records in the zone.
    • Example command for ZSK: dnssec-keygen -a RSASHA256 -b 2048 -n ZONE yourdomain .com
    • Example command for KSK: dnssec-keygen -a RSASHA256 -b 4096 -n ZONE -f KSK yourdomain .com
  3. Add the Public Keys to Your Zone File: Include the generated public keys (.key files) in your zone file. This is done by including statements like $INCLUDE yourdomain .com.+008+xxxxx.key.
  4. Sign the Zone with the ZSK and KSK:
    • Use the dnssec-signzone command to sign your zone file using both the ZSK and KSK. This adds RRSIG and NSEC/NSEC3 records to your zone.
    • Example command: dnssec-signzone -o yourdomain .com -k yourdomain .com.+008+xxxx.key yourdomain .com .zone
  5. Configure BIND to Serve the Signed Zone: Update your BIND configuration to use the signed zone file. This might involve editing the named.conf file to reference the signed zone file instead of the unsigned one.
  6. Enable DNSSEC in the BIND Configuration: Ensure that your named.conf includes options to enable DNSSEC validation. This includes setting dnssec-enable yes; and dnssec-validation auto; in the options section.
  7. Publish the DS Record: Extract the DS record from the KSK and provide it to your domain registrar. The registrar will then publish it in the parent zone. This step is crucial for establishing the chain of trust.
  8. Reload BIND and Test: Reload BIND configuration to apply changes. Use tools like dig +dnssec or online DNSSEC analyzers to test if DNSSEC is working correctly for your domain.
  9. Regularly Rotate Keys: For maintaining security, periodically generate new keys and repeat the signing process. Automate this process as much as possible to reduce the risk of key expiration.
  10. Monitor Your DNSSEC Setup: Regularly check your DNSSEC configuration for any issues or warnings. Use monitoring tools designed for DNSSEC to help with this.

Once DNSSEC settings are adjusted, it may take up to 24 hours for the changes to fully propagate and activate the security features across the internet.

To disable DNSSEC, it must be turned off in the domain settings, and DS records must be removed, with a complete deactivation typically taking up to 48 hours.

Important: this guide provides a general framework for enabling DNSSEC on your domain with BIND. Depending on your specific environment and DNS structure, some steps may require additional customization.

Frequently Asked Questions

How is DNSSEC used to protect against DNS attacks?

DNSSEC protects against DNS attacks by adding cryptographic signatures to DNS records, ensuring data validity and authenticity in the DNS. The signatures are verified by DNS resolvers before serving responses to clients. This helps to prevent unauthorized changes or forgeries in the DNS information.

Do I really need DNSSEC?

Yes, you need DNSSEC to ensure the authenticity of the DNS records and avoid potential DNS hijacking attacks.

What is a chain of trust in DNSSEC?

The chain of trust in DNSSEC is a hierarchical model where each DNS zone is verified by the zone directly above it, ensuring a secure and authenticated path from the top-level root zone down to individual domain zones.

What challenges are faced during DNSSEC implementation?

Challenges in DNSSEC implementation include incompatibility with existing internet infrastructure, complex key management, and resource-intensive deployment processes. These factors can hinder the successful implementation of DNSSEC.


From authenticating DNS data and maintaining data integrity to shielding against DNS threats and enhancing domain security, the importance of DNSSEC is undeniable. Despite the challenges of implementation and the complexities of enabling DNSSEC, the security enhancements it offers make it a worthwhile endeavor.

Take your DNS security to the next level with Recorded Future's Attack Surface Intelligence

With Recorded Future's Attack Surface Intelligence, you'll have a full platform to spot and dodge those sneaky DNS cyber threats. Get ahead of the game by booking your demo with Recorded Future today.

Esteban Borges Blog Author
Esteban Borges

Esteban is a seasoned security researcher and IT professional with over 20 years of experience, specializing in hardening systems and networks, leading blue team operations, and conducting thorough attack surface analysis to bolster cybersecurity defenses. He's also a skilled marketing expert, specializing in content strategy, technical SEO, and conversion rate optimization. His career includes roles as Security Researcher and Head of Marketing at SecurityTrails, before joining the team at Recorded Future.