UnveilTech

UnveilScan Blog

← All articles

Try UnveilScan free

DNSSEC contrarian: when not to enable it

Posted 2026-04-29 · 7 min read · DNSopinion

DNSSEC has been "the right thing to do" for two decades. ICANN promotes it. SSL Labs / Mozilla Observatory both flag its absence. NIS2 references it. Yet the actual deployment rate, after 25 years, sits at ~5% of .com domains. There's a reason, and it's worth being honest about.

What DNSSEC protects against

DNSSEC signs DNS records. A validating resolver can verify that the example.com IN A 1.2.3.4 answer it received was actually published by example.com's authoritative server, and wasn't tampered with on the wire. The threats:

What DNSSEC does NOT protect against

The failure mode that costs you

DNSSEC is a double-edged sword: incorrect signatures take you offline. A few real outages:

A weak TLS config gives you a finding. A botched DNSSEC config gives you a Twitter incident.

Operational cost: what you sign up for

Running DNSSEC properly involves:

When DNSSEC IS the right call

When DNSSEC is NOT the right call

Our position at UnveilScan

We flag DNSSEC absence as LOW, not HIGH. Compare to SSL Labs which caps your grade at A- without DNSSEC. We think this is wrong: DNSSEC is a future-proofing and TLD-hardening measure, not a basic hygiene defect. We would rather flag a botched DNSSEC config (expired signatures, broken chain, RSA-1024 keys) at HIGH — those are critical because they take you offline.

Our dns checker reports DNSSEC presence and health. tls_extended separately covers DANE if you've gone that far. The score impact of "no DNSSEC" is deliberately small. If we flagged it MEDIUM, every well-run small business website would lose 5 points for not running infrastructure they don't need.

What's actually on your domain

Free Basic scan reports DNSSEC presence + health. Extended adds DANE TLSA verification.

Run a scan