DNSSEC validation in DNS Monitor tests
DNS was designed in the 1980s when the Internet was much smaller, and security was not a primary consideration in its design. As a result, when a recursive resolver sends a query to an authoritative name server, the resolver has no way to verify the authenticity of the response. DNSSEC was designed to address this issue.
DNSSEC adds two important features to the DNS protocol:
- Data origin authentication allows a resolver to cryptographically verify that the data it received actually came from the zone where it believes the data originated.
- Data integrity protection allows the resolver to know that the data hasn't been modified in transit since it was originally signed by the zone owner with the zone's private key.
Up until today, the DNS Server Monitor Test only allowed a user to monitor the DNS resolution for a given hostname from specified Name Servers. Users can be alerted if the resolution time crosses a particular threshold or if an unexpected DNS response code is received, or a non-allowed IP is answered.
However, these tests previously did not validate the DNSSEC trust chain of the received record.
Enter DNSSEC Validation.
How can you configure DNSSEC validation?
When enabled for a given domain, the test will recursively check the validity of each signing entity in the chain from the authoritative name server up to the root server. The result will be either a positive or a negative response. The DNSSEC record is either fully verified or it isn’t.
When the option is active, the test results will show the DNSSEC validation status for each one of the Agents involved in the test.
Validity of DNSSEC is based on querying DS
and DNSKEY
for any of the successive parts of the domain name: for a DNS test target of subdomain.domain.tld
, each of tld.
, domain.tld.
, subdomain.domain.tld.
and . (root)
will be tested.
Traces for the DNSSEC validation for each agent will be available by clicking on their respective status icon on the previous screengrab.
DNSSEC validation impact on subtest health
Health options remain the same as the DNS Server Monitor test. DNSSEC validation will have a boolean result. If validation is successful it’s a healthy result, if not, it's critical.
If enough agents have a critical results (see screenshot above) to meet the sub-test threshold condition, an alert will be triggered.
IMPORTANT NOTE: App Agents vs Network Agents
Be advised that setting DNSSEC validation is available to all agents except Private Network Agents. As a reminder, our new Private App Agents not only include all of the capabilities of the legacy Network Agents, but also include the capabilities required for advanced Web tests such as Page Load Tests and Transaction Tests.
If you currently run our legacy Network Agents, please consider replacing them with our new App Agents to gain access to all of the feature we will add in the future. Kentik's entire fleet of Network Agents has already been migrated, and support for the Network Agents will be phased out in 2023 (more to come on this soon)