# | Type | Answer(s) | TTL | Query ms |
---|---|---|---|---|
{{ i + 1 }} | {{ row.type }} | {{ row.answer }} | {{ row.ttl }} | {{ row.time }} |
DNSSEC Checks | |
---|---|
{{ c.label }} |
DNS Security Extensions (DNSSEC) add cryptographic signatures to Domain Name System responses so resolvers can confirm that records come directly from an authoritative zone and have not been altered in transit. By binding public keys to zones, DNSSEC mitigates cache-poisoning attacks, prevents fraudulent redirections, and strengthens the integrity layer that underpins every internet service.
This tool queries a standards-compliant DNS-over-HTTPS resolver for the fully qualified domain you enter, retrieves the current DNSKEY
and DS
resource records, and applies straightforward rule checks to verify that key-signing (flag 257) and zone-signing (flag 256) keys are present. The resulting report highlights missing records, mismatched flags, and timing information in milliseconds.
Network engineers can run the checker before delegating a newly signed zone, while incident responders can isolate DNSSEC breakage when websites suddenly stop resolving for certain users. Changes to parent-zone DS records often require up to forty-eight hours to propagate through recursive resolver caches; consider repeat tests during that window for authoritative results.
DNSSEC augments traditional DNS by publishing cryptographically signed resource record sets (RRsets). A zone owner generates a long-term Key-Signing Key (KSK, flag 257) that signs the DNSKEY RRset and a shorter-lived Zone-Signing Key (ZSK, flag 256) that signs all other RRsets. Parent zones publish the child’s KSK digest in a DS record, forming a verifiable chain of trust from the root through every delegation level. Resolvers validate each answer by walking this chain and confirming digital signatures.
DNSKEY
RRset.DS
RRset published by its parent zone.DNSKEY
dataset.Flag Value | Key Role | Operational Purpose |
---|---|---|
256 | Zone-Signing Key (ZSK) | Signs individual RRsets for day-to-day updates. |
257 | Key-Signing Key (KSK) | Signs the DNSKEY RRset; anchor for DS linkage. |
Example (example.com
):
DNSKEY
RRset containing two records; one carries flag .DS
record matches the displayed KSK digest.Based on RFC 4033, RFC 4034, and RFC 4035, plus operational guidance from ICANN security workshops.
No personal data is processed; only publicly available DNS records are queried over an encrypted channel.
Follow these actions to generate a fresh DNSSEC status snapshot.
DNSKEY
and DS
answers.No – the tool performs stateless lookups inside your browser and discards results when you close the page.
Passing checks confirm signed records exist but do not guarantee recursive resolvers validate every response end-to-end.
Intermediary caches can retain unsigned data until the previous TTL expires; wait or flush caches before retrying.
The domain is unsigned; add DNSSEC at the registrar and publish a DS record in the parent zone.
A standards-compliant public service operating a DNS-over-HTTPS interface supplies the authoritative answers.