You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When you provide the DS record to your registrar, the registrar adds the DS record to the parent zone, such as the Top Level Domain (TLD) zone.
57
+
56
58
2. If you own the parent zone, you can add a DS record directly to the parent yourself. The following example shows how to add a DS record to the DNS zone **adatum.com** for the child zone **secure.adatum.com** when both zones are hosted using Azure Public DNS:
57
59
58
60
[](./media/dnssec-how-to/ds-add.png#lightbox)
Copy file name to clipboardExpand all lines: articles/dns/dnssec-unsign.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,9 @@ ms.author: greglin
10
10
11
11
# How to unsign your Azure Public DNS zone (Preview)
12
12
13
-
This article shows you how to remove Domain Name System Security Extensions (DNSSEC) from your Azure Public DNS zone.
13
+
This article shows you how to remove [Domain Name System Security Extensions (DNSSEC)](dnssec.md) from your Azure Public DNS zone.
14
+
15
+
To sign a zone with DNSSEC, see [How to sign your Azure Public DNS zone with DNSSEC](dnssec-how-to.md).
14
16
15
17
## Prerequisites
16
18
@@ -24,9 +26,11 @@ This article shows you how to remove Domain Name System Security Extensions (DNS
24
26
25
27
## [Azure portal](#tab/sign-portal)
26
28
27
-
To unsign your zone using the Azure portal:
29
+
To unsign a zone using the Azure portal:
28
30
29
-
1.
31
+
1. On the Azure portal Home page, search for and select **DNS zones**.
32
+
2. Select your DNS zone, and then from the zone's **Overview** page, select **DNSSEC**. You can select **DNSSEC** from the menu at the top, or under **DNS Management**.
33
+
3. If you have successfully removed the DS record at your registrar for this zone, you see that the DNSSEC status is **Signed but not delegated**. Do not proceed until you see this status.
Copy file name to clipboardExpand all lines: articles/dns/dnssec.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: greg-lindsay
5
5
manager: KumuD
6
6
ms.service: azure-dns
7
7
ms.topic: article
8
-
ms.date: 10/02/2024
8
+
ms.date: 10/09/2024
9
9
ms.author: greglin
10
10
---
11
11
@@ -71,18 +71,20 @@ DNSSEC works to prevent DNS hijacking by performing validation on DNS responses.
71
71
72
72
If a DNS server is DNSSEC-aware, it can set the DNSSEC OK (DO) flag in a DNS query to a value of `1`. This value tells the responding DNS server to include DNSSEC-related resource records with the response. These DNSSEC records are Resource Record Signature (RRSIG) records that are used to validate that the DNS response is genuine.
73
73
74
-
A recursive DNS server performs DNSSEC validation on RRSIG records using a trust anchor (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
74
+
A recursive (non-authoritative) DNS server performs DNSSEC validation on RRSIG records using a trust anchor (DNSKEY). The server uses a DNSKEY to decrypt digital signatures in RRSIG records (and other DNSSEC-related records), and then computes and compares hash values. If hash values are the same, it provides a reply to the DNS client with the DNS data that it requested, such as a host address (A) record. See the following diagram:
75
75
76
76

77
77
78
-
If hash values aren't the same, the recursive DNS server replies with a SERVFAIL message. In this way, DNSSEC-capable resolving DNS servers with a valid trust anchor installed can protect against DNS hijacking. This protection doesn't require DNS client devices to be DNSSEC-aware.
78
+
If hash values aren't the same, the recursive DNS server replies with a SERVFAIL message. In this way, DNSSEC-capable resolving DNS servers with a valid trust anchor installed can protect against DNS hijacking. This protection doesn't require DNS client devices to be DNSSEC-aware.
79
79
80
-
> [!NOTE]
81
-
> DNSSEC validation is not performed by the default Azure-provided resolver.
80
+
Windows 11 client devices are [nonvalidating security-aware stub resolvers](#dnssec-terminology).
82
81
83
82
### Trust anchors and DNSSEC validation
84
83
85
-
A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone.
84
+
> [!NOTE]
85
+
> DNSSEC validation is not performed by the default Azure-provided resolver. The information in this section is helpful if you are setting up your own recursive DNS servers for DNSSEC validation or troubleshooting validation issues.
86
+
87
+
Trust anchors operate based on the DNS namespace hierarchy. A recursive DNS server can have any number of trust anchors, or no trust anchors. Trust anchors can be added for a single child DNS zone, or any parent zone. If a recursive DNS server has a root (.) trust anchor, then it can perform DNSSEC validation on any DNS zone.
86
88
87
89
The DNSSEC validation process works with trust anchors as follows:
88
90
- If a recursive DNS server doesn't have a DNSSEC trust anchor for a zone or the zone's parent hierarchical namespace, it will not perform DNSSEC validation on that zone.
0 commit comments