Skip to content

Commit 5d6b987

Browse files
Add section on how to verify NSEC3 is in use
1 parent 89cb1a6 commit 5d6b987

File tree

1 file changed

+23
-1
lines changed

1 file changed

+23
-1
lines changed

src/content/docs/dns/dnssec/enable-nsec3.mdx

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: how-to
3-
title: Enable NSEC3
3+
title: NSEC3 support
44
description: Learn how to enable NSEC3 support with Cloudflare to meet compliance requirements.
55
sidebar:
66
order: 6
@@ -10,6 +10,8 @@ As explained in [our blog](https://blog.cloudflare.com/black-lies/), Cloudflare'
1010

1111
However, if you must use NSEC3 for compliance reasons, you can enable it as explained below.
1212

13+
## Enable NSEC3
14+
1315
Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/), setting `status` to `active` and `dnssec_use_nsec3` to `true`. You should replace the values started by `$` with your zone ID and API token. To learn more about using the Cloudflare API, refer to [Fundamentals](/fundamentals/api/get-started/).
1416

1517
```bash
@@ -23,4 +25,24 @@ https://api.cloudflare.com/client/v4/zones/$ZONE_ID/dnssec \
2325
}'
2426
```
2527

28+
## Verify NSEC3 is in use
29+
30+
To validate that NSEC3 is being used, consider the following scenarios:
31+
32+
### Non-existent zone name
33+
34+
A command like the following would trigger a signed negative response using NSEC3 for proof of non-existence. Look for NSEC3 records under the `Authority Section` of the response.
35+
36+
```sh
37+
dig +dnssec doesnotexist.example.com
38+
```
39+
40+
### Non-existent record type at an existing name
41+
42+
If the name `www` exists but the type TXT does not, the example below would trigger a signed NODATA response using NSEC3. Look for NSEC3 records under the `Authority Section` of the response.
43+
44+
```sh
45+
dig +dnssec www.example.com TXT
46+
```
47+
2648
[^1]: A method where an attacker exploits NSEC negative answers to obtain all names in a given zone. This is possible when such negative answers provide information on the previous and next names in a chain.

0 commit comments

Comments
 (0)