xDNSGuard: DNS Root Zone Integrity
XorIDA splits DNSSEC root zone signing keys across geographically distributed registrars. Strengthens the existing key ceremony model with threshold secret sharing.
The Problem
DNSSEC root zone signing keys (KSK/ZSK) are single points of failure for the entire internet. Key ceremonies are infrequent and rely on physical security alone.
The current DNSSEC key ceremony model concentrates root zone signing authority in two physical facilities. While the ceremonies themselves are well-secured, the underlying key material remains a monolithic secret. If either facility is compromised, the trust anchor for the global DNS hierarchy is undermined.
Country-code TLDs face similar challenges: ccTLD operators must protect zone signing keys with limited budgets and infrastructure. Many rely on single-HSM deployments with manual backup procedures that introduce human error and insider threat risk.
The Old Way
The PRIVATE.ME Solution
XorIDA splits root zone signing keys across geographically distributed registrars. No single registrar, facility, or jurisdiction holds complete key material.
The threshold sharing model transforms the DNSSEC key ceremony from a physical-security-dependent process into a cryptographic-guarantee-backed protocol. Key ceremonies become distributed events where K-of-N registrars cooperate to sign, but no single participant can act alone.
Each share is HMAC-SHA256 tagged, ensuring tamper detection at every stage. The split operation uses GF(2) arithmetic for sub-millisecond performance, making it feasible to integrate into existing ceremony workflows without introducing latency.
The New Way
How It Works
The root zone integrity pipeline integrates with existing DNSSEC key ceremony processes while replacing the single-point-of-trust model with threshold cryptographic guarantees.
Fast Onboarding: 3 Acceleration Levels
Traditional DNS security requires manual resolver configuration, DNSSEC key generation, and custodian coordination. xDNSGuard collapses this to 15 seconds with zero-click accept, 90 seconds with one-line CLI, and 10 minutes with deploy buttons.
// .env file XDNS_INVITE_CODE=XDNS-abc123 // Auto-accept on first query import { createDNSGuardManager } from '@private.me/xdnsguard'; const manager = createDNSGuardManager({ zone: 'example.com', resolvers: ['8.8.8.8', '1.1.1.1', '9.9.9.9'], queryThreshold: 2, queryShares: 3 }); // ✅ Invite auto-accepted, ready to query
# Install and initialize npx @private.me/xdnsguard init # Output: # ✅ DNS Guard DID generated # ✅ Saved to .env # ✅ Resolvers configured # Ready to protect zones # Configure your first zone npx @private.me/xdnsguard setup \ --zone example.com \ --resolvers 8.8.8.8,1.1.1.1 \ --threshold 2 --shares 3
- ✓ Split-channel DNS resolver (2-of-3)
- ✓ DNSSEC key custody coordinator
- ✓ Encrypted query logging
- ✓ DDoS mitigation dashboard
Example: Zero-Click Accept
Set invite code in environment, configure zone on first query. No manual setup required.
// 1. Set environment variable // .env file: XDNS_INVITE_CODE=https://xdns.private.me/invite/XDNS-abc123 // 2. Configure zone (auto-accepts invite) import { createDNSGuardManager } from '@private.me/xdnsguard'; const manager = await createDNSGuardManager({ zone: 'example.com', enableSplitChannel: true, queryThreshold: 2, queryShares: 3, resolvers: ['8.8.8.8', '1.1.1.1', '9.9.9.9'], enableDNSSEC: true, enableQueryLog: true, onProgress: (percent, msg) => console.log(`[${percent}%]`, msg) }); // 3. Execute split-channel query const queryResult = await manager.query({ id: 'q1', domain: 'www.example.com', type: 'A', timestamp: new Date(), client: 'did:key:z6Mk...', dnssecValidation: true }); if (queryResult.ok) { console.log('✅ Query protected via 2-of-3 split'); console.log('✅ DNSSEC validated'); console.log('✅ Query encrypted in logs'); console.log('Response:', queryResult.value.records); } // What happened: // 1. Invite auto-accepted from XDNS_INVITE_CODE env var // 2. DNS Guard DID generated and saved to .env // 3. Query split via XorIDA (2-of-3) // 4. Shares sent to 3 independent resolvers // 5. Responses verified with HMAC-SHA256 // 6. Query logged with AES-256-GCM encryption // Total time: ~15 seconds
Example: CLI Setup
One command generates DNS Guard DID, configures resolvers, and protects your first zone.
# Step 1: Install CLI globally npm install -g @private.me/xdnsguard # Step 2: Initialize (generates DID, configures resolvers) xdnsguard init # Output: # Generating DNS Guard DID... # ✅ DNS Guard DID: did:key:z6Mk... # ✅ Saved to .env # ✅ Resolvers configured: 8.8.8.8, 1.1.1.1, 9.9.9.9 # Ready to protect zones # Step 3: Configure your first zone xdnsguard setup \ --zone example.com \ --resolvers 8.8.8.8,1.1.1.1,9.9.9.9 \ --threshold 2 \ --shares 3 \ --dnssec-algorithm ED25519 # Output: # [0%] Validating configuration... # [20%] Generating DNSSEC key pair... # [40%] Splitting private key via XorIDA... # [70%] Distributing shares to custodians... # [100%] Zone configuration complete # # ✅ Zone configured with 2-of-3 split-channel # ✅ DNSSEC key generated (ED25519) # ✅ Key shares distributed to 3 custodians # ✅ Query logging encrypted # Ready to serve queries: xdnsguard serve # Total time: ~90 seconds
Example: Deploy Button
Click one button to provision split-channel resolver infrastructure with DNSSEC key custody, encrypted logging, and DDoS mitigation.
Provisions complete DNS security infrastructure in one click. Environment variables auto-configured, DNS Guard DID auto-generated, ready to serve queries immediately.
- ✓ Split-channel DNS resolver with XorIDA query distribution
- ✓ DNSSEC key custody coordinator (2-of-3 default)
- ✓ Encrypted query logging (AES-256-GCM)
- ✓ DDoS mitigation with per-client rate limiting
- ✓ Resolver health monitoring dashboard
Use Cases
Split root KSK across global registrar sites. Threshold signing ceremony replaces single-facility model. Backward-compatible with existing DNSSEC infrastructure.
3-of-7 thresholdNational registries split zone signing keys across government facilities. Ensures continuity even if one facility is compromised or unavailable.
2-of-3 thresholdLarge organizations split internal DNS signing keys across security teams. Prevents single-admin DNS hijacking. Integrates with existing BIND/PowerDNS deployments.
2-of-3 thresholdDomain registrars distribute DNSSEC signing keys across data centers. Automated key rotation with threshold reconstruction at signing time.
3-of-5 thresholdIntegration
import { splitRootKey, performCeremony } from '@private.me/xdnsguard'; // Split root KSK across 5 registrars (3 needed) const shares = await splitRootKey(rootKsk, registrars, { n: 5, k: 3, }); // Distribute to geographically separated sites await Promise.all(shares.map((s, i) => deliverToRegistrar(registrars[i], s) )); // Perform threshold signing ceremony const result = await performCeremony({ shares: [shares[0], shares[2], shares[4]], zone: '.', });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Confidentiality | XorIDA GF(2) splitting | Information-theoretic (unconditional) |
| Integrity | HMAC-SHA256 per share | Tamper detection pre-reconstruction |
| Geographic Isolation | Multi-jurisdiction distribution | No single-seizure compromise |
| Ceremony Audit | Witness logs + share tracking | Full provenance chain |
| Quantum Resistance | Information-theoretic model | Immune to quantum attacks |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xDNSGuard?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xDnsguard generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xdnsguard- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xDNSGuard is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.