# | Type | Answer(s) | TTL | Query ms | Copy |
---|---|---|---|---|---|
{{ i + 1 }} | {{ row.type }} | {{ row.answer }} | {{ row.ttl }} | {{ row.time }} |
DNSSEC Checks | Status |
---|---|
{{ c.label }} |
Domain Name System security validation is a practical way to confirm whether a domain publishes signed records and that signatures align across the chain. When people talk about key status and trust they mean these checks in plain terms. The page labels the result as Configured or Partial or Incomplete or Missing so you can judge at a glance and decide what to address first.
Provide a domain and you receive an overall verdict plus a human readable breakdown of what passed and what failed. The report also lists the answers it saw and how long each lookup took so you can relate the result to expected change windows and caching effects, all without opening specialist tools.
For example you might check research.example after adding a new signing key at your registrar. The page could show Configured with both key roles present and future expiration times visible in the details. If you rerun soon after a change you may see a brief swing because different servers cache answers for different periods.
Start by checking the parent zone after you publish the linking record, then check the name itself. Take note of the time to live if you plan a key change and allow for caches to drain. If results look odd, try again from another network and include the quick status summary when reporting progress.
Domain Name System Security Extensions (DNSSEC) add digital signatures to name data so resolvers can detect tampering. A zone publishes public keys in DNSKEY, links those keys to its parent using DS, and attaches signatures to record sets as RRSIG. Operators commonly use two roles: a key signing key (KSK) to sign the key set and a zone signing key (ZSK) to sign everyday answers.
This validator queries five record types over DNS over HTTPS and evaluates practical checks. It confirms that DNSKEY and DS exist, that at least one KSK (flag 257) and one ZSK (flag 256) are present, and that all DNSKEY entries use protocol 3. It also verifies that RRSIG(DNSKEY) is present and currently valid, compares algorithms, accepts DS digests of SHA‑256 or SHA‑384, notes NSEC or NSEC3PARAM, and records whether the resolver set the AD bit.
Interpret the overall label as a readiness signal. Configured means the zone publishes keys and parent linkage with distinct signing roles; Partial indicates progress but one core element is missing; Incomplete shows only a fragment. Review the per‑check results to spot mismatches such as algorithm differences or expired signatures, and compare lookup times and time to live with recent deployment changes.
Symbol | Meaning | Unit/Datatype | Source |
---|---|---|---|
T | Time to live from the first answer | seconds (integer) | Derived |
t_ms | Per‑record lookup duration | milliseconds (integer) | Derived |
AD | Authenticated Data flag on the reply | boolean | Derived |
alg | Algorithm identifiers seen | set of integers | Derived |
digest | DS digest type codes | set of integers | Derived |
tag | Key tag identifiers | set of integers | Derived |
KSK | Count of keys with flag 257 | count | Derived |
ZSK | Count of keys with flag 256 | count | Derived |
Status Band | Condition rule | Interpretation |
---|---|---|
Configured | DNSKEY present and DS present and KSK≥1 and ZSK≥1 | Key material and parent linkage are in place. |
Partial | DNSKEY and DS present, or DNSKEY with KSK or ZSK present | Setup underway; at least one essential piece still missing. |
Incomplete | DNSKEY present or DS present, but not Partial | Only a fragment is published; continue configuration work. |
Missing | Neither DNSKEY nor DS present | No signing material found at the name. |
Constant | Value | Notes |
---|---|---|
Acceptable DNSKEY algorithms | 8, 13, 14, 15, 16 | Presence of any marks acceptable. |
Modern signature algorithms | 13, 14, 15, 16 | Used to flag contemporary coverage on RRSIG(DNSKEY). |
Acceptable DS digest types | 2, 4 | SHA‑256 or SHA‑384 accepted. |
DNSKEY protocol value | 3 | All DNSKEY entries must list 3. |
Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
---|---|---|---|---|---|---|
Domain | text | 1 | 253 | ^(?=.{1,253}$)(?!-)([A-Za-z0-9-]{1,63}(?<!-)\.)+[A-Za-z]{2,63}$ plus localhost and names starting xn-- |
Enter a valid domain like example.com | example.com |
Input | Accepted Families | Output | Encoding/Precision | Rounding |
---|---|---|---|---|
Domain name (FQDN or Punycode) | ASCII labels; Punycode prefixes (xn-- ) accepted |
Record list, pass/fail checks, optional JSON and CSV | Text; integer TTL and ms timings | Lookup time to nearest 1 ms |
YYYYMMDDhhmmss
and interpreted in UTC.accept: application/dns-json
header.Scenario: dnssec‑demo.example publishes keys and a parent link. A lookup records T = 3 600
and a 28 ms query time. The signature window is active.
Result: Configured, with KSK and ZSK present, DS linked, and RRSIG(DNSKEY) valid now.
localhost
; international names require Punycode.Queries are issued from the client to a DNS over HTTPS resolver; no application server stores your inputs or results. Use with non‑sensitive domain names and follow your organization’s network policies.
Domain security validation returns a clear configuration label and a checklist you can act on.
Example: zone.example returns Partial because DNSKEY and DS exist but only KSK is present. After adding a ZSK, rerun and confirm Configured.
You now know whether the signing setup is ready and what to adjust next.
No. Inputs are sent to a resolver for lookups and results are kept on the device for display and optional download.
Network queries are necessary to retrieve records.It reflects the resolver’s live answers and metadata. It does not perform full cryptographic validation of every signature in the chain.
Use it to guide fixes, then confirm with authoritative tooling if required.Time to live appears in seconds. Lookup duration appears in milliseconds. Status checks show pass or fail in plain text.
No. It needs network access to request records from a resolver.
No licensing terms are presented here. Use according to your organization’s policies.
Partial means progress is visible but at least one core element is missing such as a DS link or one of the key roles.
It indicates that the resolver claims to have validated the data it returned. Policies vary, so treat it as advisory.
Generate signing material, publish keys at the zone, then submit the DS to the parent through your registry or registrar workflow.
Exact steps vary by provider.