Skip to content

Hesitating to enable DNSSEC, heard stories of domains going dark

DNSSEC prevents an attacker from injecting forged DNS answers into a resolver cache. The risk on activation lives at the registrar's DS-record handling: set a DS while your zone is no longer signed correctly and validating resolvers see your domain as bogus.

Try this first

  1. 1First pick a DNS host that fully automates DNSSEC (Cloudflare, Vercel DNS, deSEC, NS1). Running BIND with DNSSEC yourself is more maintenance than SMB needs.
  2. 2At the DNS host: enable DNSSEC. It generates KSK + ZSK and gives you a DS record.
  3. 3At the registrar (TransIP, Versio, GoDaddy, etc.): place the DS record. From then on resolvers validate your zone.
  4. 4Wait 48 hours and test with dnssec-analyzer.verisignlabs.com or dnsviz.net that the chain holds: parent (TLD) points to your DS, your NS serves valid RRSIG.
  5. 5Document: DNSSEC changes the procedure for migrating between DNS hosts (first rollover, then transfer, then DS). Do not just flip NS.

When to bring us in

If you want to enable DNSSEC without falling into traps, we can plan the rollout including registrar DS update and monitoring.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.