DNSSEC validation is failing for your domain. The chain of trust from the root zone to your domain is broken, which can cause DNS resolution failures for DNSSEC-validating resolvers.
Verify your DS records match your DNSKEY records, or contact your DNS provider to fix the DNSSEC chain.
DNSSEC adds cryptographic signatures to DNS records. When validation fails, it means the signatures do not verify correctly — typically because the DS record at the parent zone does not match the DNSKEY in your zone, or the signatures have expired.
DNSSEC validation failure is worse than not having DNSSEC at all. Validating resolvers return SERVFAIL, making your domain completely unresolvable for those users. Your website, email, and all DNS-dependent services become unreachable.
The DS record at the parent zone must match the DNSKEY in your zone.
# Check DS records at the parent:
dig DS yourdomain.com +short
# Check DNSKEY in your zone:
dig DNSKEY yourdomain.com +shortUse a DNSSEC debugging tool to trace the chain of trust from root to your domain.
# Use delv (DNSSEC lookup utility):
delv yourdomain.com A +rtrace
# Or use dig with DNSSEC:
dig yourdomain.com A +dnssec +cdGenerate the expected DS record from your current DNSKEY and compare with what is published at the registrar.
# Generate DS from DNSKEY:
dig DNSKEY yourdomain.com | dnssec-dsfromkey -2 yourdomain.com
# Compare with published DS:
dig DS yourdomain.com +shortIf the DS records do not match, update them at your registrar. If signatures have expired, contact your DNS provider to re-sign the zone.
Confirm DNSSEC validation succeeds after the fix.
# Test with a validating resolver:
dig @8.8.8.8 yourdomain.com A +dnssec
# Look for the "ad" (authenticated data) flagAfter making changes, use our free scanner to verify the fix is working correctly. DNS changes can take up to 48 hours to propagate, but most propagate within minutes.
Removing DS records is a valid emergency fix to restore resolution. However, if you want DNSSEC security benefits, fix the validation chain instead. Allow 24-48 hours for caches to clear after removing DS records.
The chain goes from the DNS root zone to the TLD (.com, .org) to your domain. At each level, a DS record authenticates the DNSKEY in the child zone. If any link is broken, validation fails.
Validating resolvers cannot look up your MX, SPF, or DKIM records. Email delivery to and from your domain can fail for senders/receivers using those resolvers.