DNSSEC is an extension of the Domain Name System (DNS) that serves to guarantee the authenticity and integrity of data from DNS responses.

DNSSEC uses cryptographic signatures to ensure that any manipulation of DNS responses does not go unnoticed, enabling data to be published securely on the DNS. Virtually every transaction on the internet begins with a DNS request, whether it's accessing a website, sending an email, instant messaging, or online banking. DNSSEC prevents a connection from being redirected to the wrong server via fraudulent DNS responses.

DNSSEC is also the basis for other security mechanisms. For example, DANE makes it possible to send encrypted emails to the correct destination server without involving a third party (certificate authority). In combination with technologies such as TLS, internet transactions are secured on multiple levels.

Online communication predominantly uses the DNS to look up information. As the DNS protocol dates back to the beginning of the internet, however, the design did not take security aspects into account. DNSSEC secures an otherwise unprotected DNS protocol, thereby improving the security of overall online communication.

As an internet user you do not need to do anything. If your internet access provider supports DNSSEC, then all the checks on the signatures will be made on your provider's DNS servers.

If you as the holder would like to protect your domain name with DNSSEC, the operator of the name servers has to set this up for you. If the name servers are operated by your webhosting provider, please contact them. If your company operates their own name servers please contact your internal IT department.

The chart shows the number of DNSSEC-signed domain names on the first of each month since SWITCH introduced DNSSEC in 2010.

Number of .ch domain names with DNSSEC

The current DNSSEC keys for the top level domains .ch and .li are published here for name server operators.

NB: The keys for the top level domains .ch and .li should not be directly configured as trust anchors in your name servers. Instead, you should make sole use of the root-zone keys. Our keys are only set out here for checking purposes.

Current DNSSEC keys

CH: Key 10, expected to be replaced during November 2023

DS 10 13 2 0E175543A74D9083EA977BAB2BEE98A771995F80982FB796B2B0B9CC6413D1A6

LI: Key 43984, expected to be replaced during November 2023

DS 43984 13 2 844E2B8C231F43692D319A33657A9A83C9F22BAF53F276EF23F8405E20A0F1FA

The "Key Management Practice Statement" document describes how SWITCH handles the cryptographic key material associated with DNSSEC. It explains how the keys are generated and saved and when they lose their validity.

Key Management Practice Statement