Skip to content

Commit b5abf09

Browse files
Add notes and links to new page and fill in API steps
1 parent fae7db3 commit b5abf09

File tree

2 files changed

+19
-2
lines changed

2 files changed

+19
-2
lines changed

src/content/docs/dns/dnssec/enable-nsec3.mdx

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,21 @@ sidebar:
66
order: 6
77
---
88

9-
As explained in [our blog](https://blog.cloudflare.com/black-lies/), Cloudflare's implementation of negative answers with NSEC is protected against zone walking[^1]. This removes the need for NSEC3.
9+
As explained in [our blog](https://blog.cloudflare.com/black-lies/), Cloudflare's implementation of negative answers with NSEC is protected against zone walking[^1]. This implementation removes the need for NSEC3.
1010

1111
However, if you must use NSEC3 for compliance reasons, you can enable it as explained below.
1212

13+
Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/), setting `status` to `active` and `dnssec_use_nsec3` to `true`. You should replace the values started by `$` with your zone ID and API token. To learn more about using the Cloudflare API, refer to [Fundamentals](/fundamentals/api/get-started/).
14+
15+
```bash
16+
curl --request PATCH \
17+
https://api.cloudflare.com/client/v4/zones/$ZONE_ID/dnssec \
18+
--header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \
19+
--header "Content-Type: application/json" \
20+
--data '{
21+
"dnssec_use_nsec3": true,
22+
"status": "active"
23+
}'
24+
```
25+
1326
[^1]: A method where an attacker exploits NSEC negative answers to obtain all names in a given zone. This is possible when such negative answers provide information on the last and next names in a chain.

src/content/docs/dns/zone-setups/zone-transfers/cloudflare-as-secondary/dnssec-for-secondary.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
5555
}'
5656
```
5757

58+
:::note[NSEC or NSEC3]
59+
By default, Cloudflare uses a [safe NSEC implementation](/dns/dnssec/enable-nsec3/) for authenticated denial of existence ([RFC 7129](https://www.rfc-editor.org/rfc/rfc7129.html)). If you are an Enterprise customer and must use NSEC3 for compliance reasons, also set `dnssec_use_nsec3` to `true` when making the API call.
60+
:::
61+
5862
2. Use the [DNSSEC Details endpoint](/api/resources/dns/subresources/dnssec/methods/get/) to get the necessary values to create a **DS** record at your registrar.
5963

6064
3. <Render file="dnssec-registrar-steps" />
@@ -69,7 +73,7 @@ https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec \
6973

7074
- Your secondary zone in Cloudflare already exists and zone transfers from your primary DNS provider are working correctly.
7175
- Your primary DNS provider transfers out DNSSEC related records, such as RRSIG, DNSKEY, and NSEC.
72-
- [Authenticated denial of existence (RFC 7129)](https://www.rfc-editor.org/rfc/rfc7129.html): If your primary DNS provider uses NSEC3 (instead of NSEC), you must manually [enable NSEC3 support](#) via API.
76+
- [Authenticated denial of existence (RFC 7129)](https://www.rfc-editor.org/rfc/rfc7129.html): If your primary DNS provider uses NSEC3 (instead of NSEC), you must manually [enable NSEC3 support](/dns/dnssec/enable-nsec3/) on Cloudflare via API.
7377

7478

7579
### Steps

0 commit comments

Comments
 (0)