What is dnssec
Last updated: April 1, 2026
Key Facts
- DNSSEC uses public-key cryptography to digitally sign DNS records, ensuring the information originates from authorized sources
- Without DNSSEC, attackers can redirect web traffic by providing false DNS responses; DNSSEC prevents this by cryptographically validating responses
- DNSSEC uses a chain of trust starting from root nameservers down through TLD servers to authoritative nameservers for verification
- DNSSEC increases DNS query response times slightly and requires resolvers that support DNSSEC validation to provide protection
- Major registries and domain registrars support DNSSEC, and enabling it is recommended for security-conscious organizations and high-value domains
What is DNSSEC?
DNSSEC, or DNS Security Extensions, is a security protocol that adds cryptographic authentication to the Domain Name System. It protects against DNS spoofing and poisoning attacks where malicious actors attempt to redirect users to fake websites by providing false DNS responses. DNSSEC ensures that the DNS information you receive actually comes from the legitimate source and hasn't been altered in transit.
How DNSSEC Works
DNSSEC uses public-key cryptography to digitally sign DNS records. When a DNS resolver queries for a domain, the authoritative nameserver provides both the requested records and a cryptographic signature that proves the authenticity of that data. The resolver verifies the signature using public keys published in the DNS hierarchy. This creates a chain of trust from the root nameservers through TLD servers to the authoritative nameserver for each domain. If any record has been tampered with or comes from an unauthorized source, the signature verification fails and the client is alerted.
The Trust Chain
DNSSEC establishes a chain of trust through digital key distribution. Root nameservers hold the keys for verifying TLD servers. TLD servers hold keys for verifying authoritative nameservers. Each domain owner holds keys for signing their own DNS records. This hierarchical approach ensures that the entire DNS system can be validated all the way to the root. Domain owners must configure their DS (Delegation Signer) records at their registrar to link their domain's DNSSEC keys to the parent TLD zone.
DNSSEC Adoption and Support
DNSSEC is not enabled by default on all domains. Domain owners must explicitly enable DNSSEC and configure the necessary cryptographic keys through their registrar or DNS hosting provider. Major registries (.com, .org, .net, etc.) support DNSSEC, as do most DNS hosting providers and registrars. However, DNSSEC validation must be supported by the recursive resolver (your ISP's DNS server or public DNS services like Google or Cloudflare) to provide actual protection. Not all resolvers validate DNSSEC by default.
Performance and Implementation Considerations
DNSSEC increases the size of DNS responses and adds computational overhead for signature verification. This results in slightly longer DNS query response times, typically only a few milliseconds but noticeable at scale. Organizations must carefully plan DNSSEC deployment to ensure compatibility with their DNS infrastructure. Key management is important—private keys must be secured, and keys must be rotated periodically. Misconfigured DNSSEC can actually make domains inaccessible, so proper implementation is critical.
DNSSEC vs. Other Security Measures
DNSSEC specifically protects against DNS-level attacks but does not protect against other threats like phishing or compromised websites. DNSSEC should be combined with other security measures such as HTTPS/TLS for encrypting web traffic and end-to-end authentication. Organizations valuing security typically enable DNSSEC alongside HTTPS and other protective measures for defense-in-depth security architecture.
Related Questions
Why isn't DNSSEC enabled by default everywhere?
DNSSEC requires additional computational resources, increases DNS response sizes, adds operational complexity, and has historically had compatibility issues with some DNS systems. However, adoption has been growing as security concerns increase and technology improves.
What is the difference between DNSSEC and HTTPS?
DNSSEC secures DNS lookups to prevent being directed to fake websites, while HTTPS encrypts the actual web traffic between your browser and the website. Both are important for security but operate at different levels of the internet stack.
How do I enable DNSSEC for my domain?
To enable DNSSEC, contact your domain registrar and request DNSSEC activation. They'll generate cryptographic keys and DS records. You then add the DS records to your registrar's system to complete the chain of trust with the TLD.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - DNSSECCC-BY-SA-4.0
- ICANN - What is DNSSEC?Public Domain