DNSSEC is an extension of the Domain Name System (DNS) that serves to guarantee the authenticity and integrity of data from DNS responses.

DNSSEC uses cryptographic signatures to ensure that any manipulation of DNS responses does not go unnoticed, enabling data to be published securely on the DNS. Virtually every transaction on the internet begins with a DNS request, whether it's accessing a website, sending an email, instant messaging, or online banking. DNSSEC prevents a connection from being redirected to the wrong server via fraudulent DNS responses.

DNSSEC is also the basis for other security mechanisms. For example, DANE makes it possible to send encrypted emails to the correct destination server without involving a third party (certificate authority). In combination with technologies such as TLS, internet transactions are secured on multiple levels.

Online communication predominantly uses the DNS to look up information. As the DNS protocol dates back to the beginning of the internet, however, the design did not take security aspects into account. DNSSEC secures an otherwise unprotected DNS protocol, thereby improving the security of overall online communication.

As an internet user you do not need to do anything. If your internet access provider supports DNSSEC, then all the checks on the signatures will be made on your provider's DNS servers.

If you as the holder would like to protect your domain name with DNSSEC, the operator of the name servers has to set this up for you. If the name servers are operated by your webhosting provider, please contact them. If your company operates their own name servers please contact your internal IT department.

The chart shows the number of DNSSEC-signed domain names on the first of each month since SWITCH introduced DNSSEC in 2010.

Number of .ch domain names with DNSSEC

The current DNSSEC keys for the top level domains .ch and .li are published here for name server operators.

NB: The keys for the top level domains .ch and .li should not be directly configured as trust anchors in your name servers. Instead, you should make sole use of the root-zone keys. Our keys are only set out here for checking purposes.

Current DNSSEC keys

CH: Key 58852, intended validity until 26 December 2018

DS 58852 8 2 A14E7E746D70F96F0AA20B326C5903F294AACB2C8C720B73CA369FE611F565C4

LI: Key 13066, intended validity until 26 December 2018

DS 13066 8 2 BAF289902CF37AE48AEB2231596385A7CC3C65ACAA8E5FE9E5294E0C488D5B12

The "Key Management Practice Statement" document describes how SWITCH handles the cryptographic key material associated with DNSSEC. It explains how the keys are generated and saved and when they lose their validity.

Key Management Practice Statement