The Domain Name System (DNS) translates human-friendly domain names into IP addresses, allowing users to access websites. However, DNS was not originally designed with inherent security features, meaning it lacks mechanisms to ensure the authenticity of DNS responses. Without these security measures, users may be redirected to malicious websites rather than the intended destination.
DNSSEC (Domain Name System Security Extensions) was introduced to address this security gap. It verifies the authenticity of DNS data using Public Key Infrastructure (PKI). Note that DNSSEC focuses on authentication and integrity—it does not encrypt DNS queries or responses.
VergeCloud, as an authoritative DNS service, provides DNSSEC support to help safeguard your domain against DNS spoofing attacks, enhancing the security of your website and protecting your users.
Traditional DNS lacks protection mechanisms to verify the legitimacy of the data it processes. DNSSEC helps address this by using digital signatures to authenticate DNS responses, ensuring users receive genuine data and are not misled by unauthorized servers.
Below is an overview of how DNSSEC works after activation:
www.example.com
in their browser. The browser first checks its cache for a corresponding IP address. If unavailable, it sends a request to the configured DNS server, also called the Recursive Resolver.RRSIG
and DNSKEY
records, allowing the recursive resolver to verify authenticity.www.example.com
back to the browser, which then connects to the website securely.Before enabling DNSSEC, ensure that your domain registrar and TLD provider support this feature. To activate DNSSEC in VergeCloud:
Enter the DS record details into your domain registrar’s panel to complete the DNSSEC activation process.
You can also activate DNSSEC using VergeCloud’s API. Below is an example request to enable DNSSEC:
curl --location --request PUT 'https://api.vergecloud.com/domains/example.com/dns-records/dnssec/actions' \ --header 'Authorization: Bearer API_KEY' \ --header 'Content-Type: application/json' \ --data '{"enable":true}'
To disable DNSSEC, change the enable
value to false
in the API request.
Once DNSSEC is enabled, verify its configuration by running the dig
command with the +dnssec
flag to view DNSSEC-specific records:
dig +dnssec example.com
; <<>> DiG 9.16.1-Ubuntu <<>> +dnssec example.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54321 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; QUESTION SECTION: ;example.com. IN A ;; ANSWER SECTION: example.com. 3600 IN A 203.0.113.20 example.com. 3600 IN RRSIG A 13 2 3600 20241001000000 20240901000000 12345 example.com. abcdef123456 ;; Query time: 33 msec ;; SERVER: 8.8.8.8#53(8.8.8.8) ;; WHEN: Thu Sep 26 15:50:12 UTC 2024 ;; MSG SIZE rcvd: 150
The Domain Name System (DNS) translates human-friendly domain names into IP addresses, allowing users to access websites. However, DNS was not originally designed with inherent security features, meaning it lacks mechanisms to ensure the authenticity of DNS responses. Without these security measures, users may be redirected to malicious websites rather than the intended destination.
DNSSEC (Domain Name System Security Extensions) was introduced to address this security gap. It verifies the authenticity of DNS data using Public Key Infrastructure (PKI). Note that DNSSEC focuses on authentication and integrity—it does not encrypt DNS queries or responses.
VergeCloud, as an authoritative DNS service, provides DNSSEC support to help safeguard your domain against DNS spoofing attacks, enhancing the security of your website and protecting your users.
Traditional DNS lacks protection mechanisms to verify the legitimacy of the data it processes. DNSSEC helps address this by using digital signatures to authenticate DNS responses, ensuring users receive genuine data and are not misled by unauthorized servers.
Below is an overview of how DNSSEC works after activation:
www.example.com
in their browser. The browser first checks its cache for a corresponding IP address. If unavailable, it sends a request to the configured DNS server, also called the Recursive Resolver.RRSIG
and DNSKEY
records, allowing the recursive resolver to verify authenticity.www.example.com
back to the browser, which then connects to the website securely.Before enabling DNSSEC, ensure that your domain registrar and TLD provider support this feature. To activate DNSSEC in VergeCloud:
Enter the DS record details into your domain registrar’s panel to complete the DNSSEC activation process.
You can also activate DNSSEC using VergeCloud’s API. Below is an example request to enable DNSSEC:
curl --location --request PUT 'https://api.vergecloud.com/domains/example.com/dns-records/dnssec/actions' \ --header 'Authorization: Bearer API_KEY' \ --header 'Content-Type: application/json' \ --data '{"enable":true}'
To disable DNSSEC, change the enable
value to false
in the API request.
Once DNSSEC is enabled, verify its configuration by running the dig
command with the +dnssec
flag to view DNSSEC-specific records:
dig +dnssec example.com
; <<>> DiG 9.16.1-Ubuntu <<>> +dnssec example.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54321 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; QUESTION SECTION: ;example.com. IN A ;; ANSWER SECTION: example.com. 3600 IN A 203.0.113.20 example.com. 3600 IN RRSIG A 13 2 3600 20241001000000 20240901000000 12345 example.com. abcdef123456 ;; Query time: 33 msec ;; SERVER: 8.8.8.8#53(8.8.8.8) ;; WHEN: Thu Sep 26 15:50:12 UTC 2024 ;; MSG SIZE rcvd: 150