Enable DNSSEC on Cloudflare
Enable DNSSEC for your domain on Cloudflare with automatic key management.
Cloudflare makes DNSSEC easy with one-click activation and automatic key management. This guide walks you through enabling DNSSEC and configuring your registrar.
Time required: 10 minutes (plus propagation time)
Prerequisites: Domain on Cloudflare DNS, registrar access
Why Enable DNSSEC?
DNSSEC adds cryptographic signatures to your DNS records, preventing attackers from:
- Redirecting your email to malicious servers
- Spoofing your MX records
- Tampering with DMARC, SPF, or DKIM records
- Performing DNS cache poisoning attacks
Required for DANE
DNSSEC is a prerequisite for DANE. If you want to use DANE for additional TLS security, you must enable DNSSEC first.
Step 1: Enable DNSSEC in Cloudflare
- Log into the Cloudflare Dashboard
- Select your domain
- Navigate to DNS → Settings
- Find the DNSSEC section
- Click Enable DNSSEC
Cloudflare will generate the necessary keys and display a DS record that you need to add at your registrar.
Step 2: Copy DS Record Details
After enabling DNSSEC, Cloudflare displays the DS record information:
Key Tag: 12345 Algorithm: 13 (ECDSAP256SHA256) Digest Type: 2 (SHA-256) Digest: E8C6A7B3F5D2A1B4C8D9E0F1A2B3C4D5E6F7...
Copy these values—you'll need them for your registrar.
Step 3: Add DS Record at Your Registrar
The process varies by registrar. Here are instructions for common ones:
Cloudflare Registrar
If your domain is registered with Cloudflare, DS records are added automatically. You're done!
GoDaddy
- Go to My Products → DNS
- Select your domain
- Scroll to DNSSEC
- Click Add
- Enter the Key Tag, Algorithm, Digest Type, and Digest from Cloudflare
- Click Save
Namecheap
- Go to Domain List → Manage
- Select the Advanced DNS tab
- Scroll to DNSSEC
- Click Add new DS Record
- Fill in the values from Cloudflare
- Click Save All Changes
Google Domains / Squarespace
- Go to DNS settings
- Click DNSSEC
- Click Custom name servers tab
- Add the DS record with values from Cloudflare
- Save
AWS Route 53
If your domain is registered with Route 53:
- Go to Route 53 → Registered Domains
- Select your domain
- Click Manage Keys under DNSSEC
- Click Add Key
- Paste the full DS record from Cloudflare
- Save
Step 4: Wait for Propagation
DNSSEC propagation typically takes 24-48 hours. During this time:
- Cloudflare will show "Pending" status
- DNS resolution will continue to work normally
- Once propagated, status will change to "Active"
Step 5: Verify DNSSEC is Working
Use online tools to verify your DNSSEC configuration:
# Using dig dig yourdomain.com +dnssec +short # Should show RRSIG records alongside regular records
Online verification tools:
Don't Disable DNSSEC Hastily
Once enabled, disabling DNSSEC can cause DNS resolution failures during propagation. Only disable if absolutely necessary, and allow 48 hours for changes to propagate.
Troubleshooting
Status stuck on "Pending"
Verify the DS record was added correctly at your registrar. Double-check Key Tag, Algorithm, and Digest values match exactly.
DNSSEC validation failures
Ensure you're using Cloudflare's nameservers and the DS record matches what Cloudflare provided.
Registrar doesn't support DNSSEC
Consider transferring your domain to a registrar that supports DNSSEC, or using Cloudflare Registrar.