Domain Name System Security Extensions โ Learning Hub
route53.jideaws.ai
Curated video resources from internal SME sessions on DNSSEC:
Presenter: Jorge Prada (Technical Account Manager)
Topics Covered: DNSSEC theory, enabling DNSSEC signing in Route 53, creating KSK, establishing chain of trust with DS records, enabling DNSSEC validation in VPC
Key demo steps: Enable DNSSEC signing โ Create KSK with CMK โ Add DS record to registrar โ Verify chain of trust via DNSViz โ Enable DNSSEC validation on VPC
Topics Covered: Automating DNSSEC setup via CloudFormation
Topics Covered: DNSSEC internals, troubleshooting, key rotation
Topics Covered: DNS fundamentals, DNSSEC architecture, Route 53 DaaS internals
Broadcast Channel: Route 53 DNSSEC Channel
A suite of extensions that add cryptographic authentication to DNS responses. Prevents DNS spoofing and cache poisoning.
RRSIG โ Signature for each RRSet
DNSKEY โ Public key for verification
DS โ Delegation Signer (hash of KSK)
NSEC โ Authenticated denial of existence
ZSK (Zone Signing Key) โ Signs all record sets
KSK (Key Signing Key) โ Signs the DNSKEY records
DS record in parent zone โ validates KSK โ validates ZSK โ validates all records. Anchored at the DNS root.
Uses KMS for key management. KSK backed by asymmetric CMK (ECC_NIST_P256). Uses "black-lies" for negative responses.
Broken KMS key policy, deleted CMK, DS record mismatch, key rotation failures, chain of trust breaks.
When you type "youtube.com" in your browser, it's like sending a letter asking: "Hey, where does YouTube live?"
A helper (called a DNS resolver) looks up the address for you and says: "YouTube lives at house number 142.250.80.46!"
Your browser then goes to that house to show you the website.
What if a bad person changed the address book? They could write: "YouTube lives at MY house!"
Then when you try to go to YouTube, you'd end up at the bad person's fake website instead! This is called DNS Spoofing โ like someone putting a fake sign on the wrong house.
DNSSEC adds a special sticker (a digital signature) to every address in the address book.
Think of it like this:
So there's a chain of trust โ like a chain of grown-ups all vouching for each other, all the way up to the top!
โ Does: Makes sure the address you get is the REAL address (not a fake one)
โ Does: Tells you if someone tried to change the address
โ Doesn't: Hide what websites you visit (that's a different job for HTTPS!)
It's like checking that a letter really came from your friend by recognizing their special sticker โ but anyone can still see the envelope!
Ask a grown-up to help you visit dnsviz.net โ type in any website name and you can SEE the chain of trust drawn as a picture! Green means everything is good. Red means something is broken.
Practice questions based on real Route 53 support scenarios from the R53 ticket queue.
Based on: Customer outreach for broken KMS key/KSK scenarios
Based on: KMS key accessibility issues and chain of trust establishment
Based on: Zone resolution failures and DNSSEC validation issues
Based on: R53 DNSSEC operational procedures and customer guidance
Based on: Multi-account KMS key outreach tickets and domain transfer scenarios