About
Multi-signer DNSSEC looks into the chain of trust that is necessary for DNSSEC validation and leverages that to guarantee that validation is completed even when multiple providers are involved.
An example case where validation would otherwise be an issue is if a resolver has cached a DNSKEY record set ↗ from one provider but receives a response signed by another provider.
To avoid issues in that case, when you set up multi-signer DNSSEC, you adjust:
- The Zone Signing Keys (ZSK) that your DNS providers have in their DNSKEY record sets.
- Who is responsible for the Secure Entry Point (SEP), Key Signing Keys (KSK), and Delegation Signer (DS) record.
When these configurations are adjusted in a way that (a) all involved providers have each other’s public Zone Signing Keys (ZSK), and that (b) Delegation Signer (DS) records reference the necessary Key Signing Keys (KSK), then live-signing of zones by multiple providers is no longer a problem.
Whereas in both models all providers have each other’s Zone Signing Keys (ZSK) added to their DNSKEY record set, in model 1, only one Key Signing Key (KSK) is used to sign such DNSKEY record sets. Management of this KSK and its reference by the DS record (that is, the Secure Entry Point) is the responsibility of the zone owner or only one provider (designated by the zone owner).
In model 2, on the other hand, each provider uses its own KSK to sign its own DNSKEY record set, and these KSKs are then referenced by the DS record (Secure Entry Point).