Keeping the DNS Reliable: Understanding the KSK Rollover

May 11, 2026

Keeping the DNS Reliable: Understanding the KSK Rollover

By Kim Davies, VP, IANA Services & President, PTI.

This article was originally published on the ICANN Blog

The Domain Name System (DNS) is built on a simple expectation: When you look up a domain name, you get the right answer. Part of ensuring that reality is through an array of security measures that allows software to validate DNS data using security protections known as DNS Security Extensions (DNSSEC). They work by ensuring that all the component pieces of a domain name are cryptographically verifiable through a chain of signatures, each of which can be validated through a chain that starts with the root zone key signing key (KSK). This cryptographic key is operated by us through the IANA functions we manage.

As with all security systems, from time to time the keys need to be replaced. When the key at the top of the DNS hierarchy – known as the “trust anchor” – needs to change, it is a process known as a root zone KSK rollover. This change needs to be carefully coordinated to preserve the security, stability, and ongoing unified operation of the DNS.

(Free access, no subscription required)

Additional reading:

Unlike many updates to Internet infrastructure, a KSK rollover does not add new functionality. Instead, it keeps a critical piece of the system up to date with best cryptographic practices. Cryptographic keys that remain in use for too long can become a liability. Updating the KSK helps ensure that the root zone continues to rely on strong cryptographic material; a way of staying ahead of that risk is by periodically changing keys, rather than reacting to news that a key has become too weak to use.

What makes the rollover notable is not the act of generating a new key, but how it is introduced. The DNS is global and highly distributed, with validating resolvers operated by a wide range of organizations.

As the KSK acts as the trust anchor for DNSSEC validation, when DNS resolver software needs to check whether DNS data is authentic, it needs to check against this specific key. Because of that central role, any change has to be introduced carefully. A sudden switch would risk disrupting validation for systems that are not prepared to recognize the new trust anchor, because resolvers that haven’t updated fail validation. To guard against this, the rollover is a coordinated effort over a long period of time to ensure widespread adoption.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments