The Domain Name System (DNS) provides a scalable, flexible name resolution service. Unfortunately, its unauthenticated architecture has proven to be the vector for many security attacks. To address this, DNS Security Extensions (DNSSEC) were introduced in 1997. To deploy, DNSSEC requires support from the top-level domain (TLD) registries and registrars, as well as participation by the organization that serves as the DNS operator. Unfortunately, DNSSEC has seen poor deployment thus far: despite being proposed nearly two decades ago, only 1% of .com, .org, and .net domains are properly signed.
In this paper, we investigate the underlying reasons why DNSSEC adoption has been remarkably slow. We focus on registrars, as most TLD registries already support DNSSEC and registrars often serve as DNS operators for their customers.
Our study not only leverages large-scale, longitudinal DNS measurements, but also the first systematic study of the entire domain registration process from the customer's perspective, by purchasing domains from leading domain name registrars and resellers. Overall, we find that a select few registrars are responsible for the (small) DNSSEC deployment today, and that many leading registrars do not support DNSSEC at all, or require customers to take cumbersome steps to deploy DNSSEC. Further frustrating deployment, many of the mechanisms for conveying DNSSEC information to registrars are error-prone or present security vulnerabilities. Finally, we find that using DNSSEC with third-party DNS operators such as Cloudflare requires additional steps that 40% of domain owners do not complete.
Having identified several operational challenges for full DNSSEC deployment, we make recommendations to improve adoption.
Many registrars offer customers two options when purchasing a domain:
Our dataset consists of
Do you have any questions, comments or concern? Feel free to send us an email to Taejoong Chung