What this tool does
This tool walks the DNSSEC chain of trust for any domain and shows you, level by level, whether it is properly signed. You get the root (.), the TLD (like `.com`) and your domain, each with its DNSKEY records, the DS record at the parent zone, the algorithm in use (RSASHA256, ECDSAP256, ED25519, ...) and the key tag.
The actual cryptographic check is done by Cloudflare's validating resolver 1.1.1.1: we set the resolver up to check signatures and read back its AD (Authenticated Data) flag. Green means signed and validated, yellow means the level simply does not use DNSSEC, red means signatures or DS records do not match and the chain is broken.
How to use it
- Type a domain like `cloudflare.com` (no `https://`, no path).
- Click Validate DNSSEC. We query DoH for DNSKEY at each level and DS at the parent.
- Read the chain card top to bottom: root, then TLD, then your domain. Each card is colour coded.
- Green = signed and authenticated. Yellow = no DNSSEC at this level (not an error, just unprotected). Red = broken chain, clients may refuse the domain.
- Inspect the DS / DNSKEY tables: the key tags must match between a child DNSKEY and the parent DS. Algorithm and digest type tell you which crypto is in use.
- Try the sample chips: cloudflare.com, paypal.com, ietf.org are fully signed. example.com is signed but its subzone is not, so it lands in "partial".
When this is useful
Six places where a DNSSEC chain validator beats reading raw `dig +trace +dnssec` output:
- Audit a domain you just enabled DNSSEC for. You toggled the switch in your registrar, you pasted the DS record at the parent, now you need to confirm both sides match. The chain visualisation makes a key-tag mismatch obvious in seconds.
- Debug "DNSSEC validation failure" errors. End users see a sudden `SERVFAIL` only on validating resolvers (Cloudflare, Google, Quad9). The red card pinpoints the level that broke and the message explains why.
- Pre-launch checklist for banking, government and any high-trust domain. Fully signed DNSSEC blocks an entire class of attacks (cache poisoning, on-path DNS spoofing). Confirm before going live.
- Compare two domains side by side. Run `yourbank.com` against a competitor and see who actually deploys DNSSEC.
- Verify a parent zone rotation. You rolled the KSK at the registry, you submitted a new DS, you want to confirm propagation finished and the AD flag is back to true.
- Teach DNSSEC. The three-level chain (root, TLD, SLD) plus per-level records is the cleanest way to explain delegation and trust to someone who has never seen it.
Related tools: DNS lookup, reverse DNS PTR lookup, email DNS checker, WHOIS lookup, DKIM keypair generator.