
DNS was designed in the 1980s without security in mind. Responses aren't authenticated — nothing stops an attacker from intercepting a DNS query and returning a forged answer pointing your domain to a server they control. This attack is known as DNS spoofing or DNS cache poisoning.
DNSSEC (DNS Security Extensions) addresses this by adding cryptographic signatures to DNS responses. A resolver that validates DNSSEC signatures can verify that a DNS answer came from the authoritative nameserver and hasn't been tampered with.
DNSSEC creates a chain of trust from the DNS root zone down to your domain:
.com, .net, etc.When a DNSSEC-validating resolver looks up your domain, it checks each signature in this chain. If any signature is missing or invalid, the resolver returns SERVFAIL rather than an unauthenticated answer.
# Check if DNSSEC is enabled for a domain
dig yourdomain.com +dnssec
# Look for the 'ad' flag (Authenticated Data) in the response
# "flags: qr rd ra ad" = DNSSEC validation succeeded
# Check for DNSKEY records
dig yourdomain.com DNSKEY +short
# Check for DS record at the parent (TLD) nameserver
dig yourdomain.com DS +short
DNS cache poisoning — An attacker injects forged DNS records into a resolver's cache. Without DNSSEC, there's no way for the resolver to know the answer was forged. With DNSSEC, the missing signature causes the resolver to reject the forged answer.
Man-in-the-middle DNS attacks — An attacker intercepts DNS queries and returns a different IP. DNSSEC signatures are tied to the zone, not the network path — a signature from a different zone is invalid.
What DNSSEC does NOT protect against:
DNSSEC and HTTPS are complementary: DNSSEC ensures you reach the right server; HTTPS ensures the connection is encrypted and the server is authenticated.
DNSSEC introduces real operational complexity. The security community generally recommends it, but with clear awareness of the failure modes.
Key rollover — DNSSEC signing keys need periodic rotation. If a key rollover is performed incorrectly, your domain becomes unresolvable for DNSSEC-validating resolvers (roughly 30–35% of global DNS traffic uses DNSSEC validation, according to APNIC measurements).
Nameserver migration — If you change nameservers (see how to change nameservers without downtime), you must update the DS record at your registrar to match the new nameserver's keys. If you forget this step, DNSSEC validation fails for your domain.
Registrar support — Not all registrars support DNSSEC. You need a registrar that can publish DS records to the TLD zone. ICANN maintains a list of registrars supporting DNSSEC.
Most managed DNS providers handle key generation and signing automatically. The only step you usually need to take manually is adding the DS record to your registrar.
With Cloudflare:
With Route 53:
Verify after enabling:
# Check DS record propagated to the TLD
dig yourdomain.com DS +short
# Validate the DNSSEC chain
dig yourdomain.com +dnssec +cd=no
# The 'ad' flag in the response confirms validation succeeded
Enable DNSSEC if:
Consider waiting if:
A broken DNSSEC configuration silently breaks your domain for a significant portion of the internet — those users just get SERVFAIL and see nothing. Domain Monitor monitors your domain's DNS health including DNSSEC validity. Create a free account.
A subdomain takeover lets an attacker claim your subdomain by exploiting dangling DNS records. Learn how it happens, real-world examples, and how DNS monitoring detects it.
Read moreMean time to detect (MTTD) measures how long it takes to discover an incident after it starts. Reducing MTTD is one of the highest-leverage improvements in reliability engineering.
Read moreBlack box monitoring tests your systems from the outside, the way users experience them — without access to internal code or infrastructure. Learn how it works and when to use it.
Read moreLooking to monitor your website and domains? Join our platform and start today.