Check-Host.cc

Global DNSKEY Validation Tool

The DNSKEY resource record is the cryptographic foundation of DNSSEC (Domain Name System Security Extensions). The core DNS protocol is inherently unencrypted and stateless, making it highly susceptible to cache poisoning and Man-in-the-Middle (MitM) spoofing. DNSSEC solves this by attaching mathematical, cryptographic signatures to DNS responses. The DNSKEY record acts as the public key repository; it holds the Base64-encoded public keys that remote resolvers use to verify that a payload of A or MX records genuinely originated from the authoritative nameserver and was not manipulated in transit.

The ZSK and KSK Architecture

A standard DNSSEC implementation deploys two distinct keys to balance security with operational efficiency. The Zone Signing Key (ZSK) is a smaller, lower-overhead cryptographic key used to rapidly sign the individual records (A, TXT, CNAME) within the zone. Because it handles bulk signing, the ZSK is rotated frequently (e.g., every 30 days) to prevent brute-force cracking. The Key Signing Key (KSK) is a much stronger, heavily guarded key. Its sole purpose is to sign the ZSK itself. By separating these keys, administrators can rotate the ZSK locally on the nameserver without needing to constantly communicate with the parent TLD registry.

The Chain of Trust and DS Records

Publishing a DNSKEY record in your zone is useless unless there is a verifiable path of trust extending up to the root of the internet. Once the KSK generates a signature, a mathematical hash of that KSK is submitted to the domain registrar as a DS (Delegation Signer) record. The registrar publishes this DS record in the parent TLD zone (like the .com registry). When a recursive resolver queries your domain, it fetches the DS record from the parent to authenticate the KSK, uses the KSK to authenticate the ZSK, and uses the ZSK to authenticate the final IP address. If any link in this cryptographic chain is broken, validation fails entirely.

Catastrophic SERVFAIL Outages

Managing DNSKEY records requires absolute precision. DNSSEC is designed to "fail closed." If an automated script rotates the ZSK on the server but the corresponding public DNSKEY record is not updated in the global zone, the cryptographic signatures will mismatch. ISPs and public resolvers like Google (8.8.8.8) and Cloudflare (1.1.1.1) will interpret this as an active cyberattack. They will instantly drop the DNS response and return a fatal SERVFAIL status to the client, effectively erasing the domain from the internet until the keys are manually synchronized or DNSSEC is entirely disabled at the registrar level.