Skip to content

Commit a75cb1c

Browse files
committed
edit
1 parent 819f7a8 commit a75cb1c

File tree

3 files changed

+19
-11
lines changed

3 files changed

+19
-11
lines changed

articles/dns/dnssec-how-to.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ ms.author: greglin
1010

1111
# How to sign your Azure Public DNS zone with DNSSEC (Preview)
1212

13-
This article shows you how to sign your DNS zone with Domain Name System Security Extensions (DNSSEC).
13+
This article shows you how to sign your DNS zone with [Domain Name System Security Extensions (DNSSEC)](dnssec.md).
1414

15-
Also see: [DNSSEC overview (Preview)](dnssec.md)
15+
To remove DNSSEC signing from a zone, see [How to unsign your Azure Public DNS zone](dnssec-unsign.md).
1616

1717
## Prerequisites
1818

@@ -53,6 +53,8 @@ To sign your zone with DNSSEC using the Azure portal:
5353
**Digest Type**: 2<br>
5454
**Digest**: 7A1C9811A965C46319D94D1D4BC6321762B632133F196F876C65802EC5089001
5555

56+
When you provide the DS record to your registrar, the registrar adds the DS record to the parent zone, such as the Top Level Domain (TLD) zone.
57+
5658
2. If you own the parent zone, you can add a DS record directly to the parent yourself. The following example shows how to add a DS record to the DNS zone **adatum.com** for the child zone **secure.adatum.com** when both zones are hosted using Azure Public DNS:
5759

5860
[ ![Screenshot of adding a DS record to the parent zone.](./media/dnssec-how-to/ds-add.png) ](./media/dnssec-how-to/ds-add.png#lightbox)

articles/dns/dnssec-unsign.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,9 @@ ms.author: greglin
1010

1111
# How to unsign your Azure Public DNS zone (Preview)
1212

13-
This article shows you how to remove Domain Name System Security Extensions (DNSSEC) from your Azure Public DNS zone.
13+
This article shows you how to remove [Domain Name System Security Extensions (DNSSEC)](dnssec.md) from your Azure Public DNS zone.
14+
15+
To sign a zone with DNSSEC, see [How to sign your Azure Public DNS zone with DNSSEC](dnssec-how-to.md).
1416

1517
## Prerequisites
1618

@@ -24,9 +26,11 @@ This article shows you how to remove Domain Name System Security Extensions (DNS
2426
2527
## [Azure portal](#tab/sign-portal)
2628

27-
To unsign your zone using the Azure portal:
29+
To unsign a zone using the Azure portal:
2830

29-
1.
31+
1. On the Azure portal Home page, search for and select **DNS zones**.
32+
2. Select your DNS zone, and then from the zone's **Overview** page, select **DNSSEC**. You can select **DNSSEC** from the menu at the top, or under **DNS Management**.
33+
3. If you have successfully removed the DS record at your registrar for this zone, you see that the DNSSEC status is **Signed but not delegated**. Do not proceed until you see this status.
3034

3135
## [Azure CLI](#tab/sign-cli)
3236

articles/dns/dnssec.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: greg-lindsay
55
manager: KumuD
66
ms.service: azure-dns
77
ms.topic: article
8-
ms.date: 10/02/2024
8+
ms.date: 10/09/2024
99
ms.author: greglin
1010
---
1111

@@ -71,18 +71,20 @@ DNSSEC works to prevent DNS hijacking by performing validation on DNS responses.
7171

7272
If a DNS server is DNSSEC-aware, it can set the DNSSEC OK (DO) flag in a DNS query to a value of `1`. This value tells the responding DNS server to include DNSSEC-related resource records with the response. These DNSSEC records are Resource Record Signature (RRSIG) records that are used to validate that the DNS response is genuine.
7373

74-
A recursive DNS server performs DNSSEC validation on RRSIG records using a trust anchor (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
74+
A recursive (non-authoritative) DNS server performs DNSSEC validation on RRSIG records using a trust anchor (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
7575

7676
![A diagram showing how DNSSEC validation works.](media/dnssec/dnssec-validation.png)
7777

78-
If hash values aren't the same, the recursive DNS server replies with a SERVFAIL message. In this way, DNSSEC-capable resolving DNS servers with a valid trust anchor installed can protect against DNS hijacking. This protection doesn't require DNS client devices to be DNSSEC-aware.
78+
If hash values aren't the same, the recursive DNS server replies with a SERVFAIL message. In this way, DNSSEC-capable resolving DNS servers with a valid trust anchor installed can protect against DNS hijacking. This protection doesn't require DNS client devices to be DNSSEC-aware.
7979

80-
> [!NOTE]
81-
> DNSSEC validation is not performed by the default Azure-provided resolver.
80+
Windows 11 client devices are [nonvalidating security-aware stub resolvers](#dnssec-terminology).
8281

8382
### Trust anchors and DNSSEC validation
8483

85-
A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone.
84+
> [!NOTE]
85+
> DNSSEC validation is not performed by the default Azure-provided resolver. The information in this section is helpful if you are setting up your own recursive DNS servers for DNSSEC validation or troubleshooting validation issues.
86+
87+
Trust anchors operate based on the DNS namespace hierarchy. A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single child DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone.
8688

8789
The DNSSEC validation process works with trust anchors as follows:
8890
- If a recursive DNS server doesn't have a DNSSEC trust anchor for a zone or the zone's parent hierarchical namespace, it will not perform DNSSEC validation on that zone.

0 commit comments

Comments
 (0)