Adding DNSsec to a route 53 registered domain
Over in my post about domains and DNS domains and DNS I talked about what DNSsec is, but here I want to show you how to set it up in AWS Route 53. If you want to do some deeper dives into what it is and how it’s used, the wiki page wiki page is fairly complete. <br The basic outline is;
- Name Server Provider issues key and provides encryption details
- We supply this to the Domain Registrar and they publish it in our domain
- When a client requests a DNS record they can check the key matches between both the name servers and Registrar info.
Generating the Key
I will be using Cloudflare for my name servers but this process and the details you need should be fairly similar across name server providers. In the Cloudflare console open up to the DNS heading and scroll down to Enable DNSsec this will bring up a list of details about the DNSsec record you need to publish into your registrar’s records. You will also want to open up your AWS Console side by side and jump into the registered domains part of Route 53.
Adding the Key to R53 (console)
Once you have the R53 console open, select the domain you would like to manage that matches the one you started the config on in Cloudflare. Over to the left you will see an option for DNSSEC status under that is an option to Manage Keys
This option will allow you to add a new DNSsec key to the domain. In R53 the following info translates from Cloudflare,
- Key Type (R53) = Flags (Cloudflare)
- Algorithm (R53) = Algorithm (Cloudflare)
- Public Key (R53) = Public key (Cloudflare)
With the Algorithm you could be able to just match the numbers, In cloudflare mine shows
13 in R53 it shows as
13 - ECDSAP256SHA256
Flags (Cloudflare) is the hardest one to match with
Key Type in R53. But once you have copied over the relevant info you can just hit apply in R53.
You should then be able to see the Add DNSSEC Job under Pending Requests in R53, feel free to hit confirm in Cloudflare to kick off their record creation.
Wait 10-15 min and Cloudflare should show DNSsec as active.
AWS CLI Notes
DnsSec -> (string)
Reserved for future use.
If I find a way to do it in the future, I will post an update to this post.
Thanks for reading.