Skip to content
Cloudflare Docs

Validation and keys

Refer to the sections below for an overview of some technical concepts and how they apply to Cloudflare DNSSEC. For broader content on DNSSEC, refer to How DNSSEC works.

Chain of trust

DNSSEC validation follows a chain of trust from the root DNS servers to your zone:

  1. A resolver queries your parent registry (for example, .com) for your DS record.
  2. The DS record contains a hash of your Key Signing Key (KSK).
  3. The resolver expects all Zone Signing Keys (ZSK) to be signed by that specific KSK.
  4. If Cloudflare uses a different KSK, validation fails when resolvers query Cloudflare nameservers.

This is why you cannot simply keep your existing DS record when migrating to Cloudflare. The cryptographic chain of trust requires either:


Automatic DS record updates

When you enable DNSSEC, Cloudflare automatically publishes CDS (Child Delegation Signer) and CDNSKEY (Child DNSKEY) records in your zone. These records automate the chain of trust management between your domain and the Top-Level Domain registry.

RecordPurposeContents
CDSHigh-level instructionA hashed version of the public key (same data as a DS record)
CDNSKEYPublic key instructionThe full public Key Signing Key (KSK) for the parent to generate its own DS record

Registrars that support RFC 8078 periodically scan your domain for these records and automatically update the DS record at the registry level. This eliminates manual DS record management and ensures seamless key rollovers.


DNSKEY flags

  • ZSKs (Zone Signing Keys): flag 256
  • KSKs (Key Signing Keys): flag 257