Norid AS

Abels gt. 5, Teknobyen

Phone +47 73 55 73 55

Published December 2016, updated July 2020
As the Internet assumes an ever more critical role in society’s infrastructure, it is becoming increasingly more important to ensure that information is not falsified or ends up in the wrong hands. DNSSEC is an important contribution to more secure communication online.
Cartoon bandit cheers when money fly out of the PC screen

Why is DNSSEC important?

The Internet has become a key platform for value-creation in modern society. Online retailers in Norway had a total turnover exceeding NOK 25 billion in 2019 1. Three percent of all Norwegian domain names with a website has shopping basket functionality built in 2 and for many businesses, online sales is the primary sales channel. The Internet is also a primary channel of communication between public agencies and the nation’s inhabitants and businesses, e.g. in connection with tax returns, employer's contributions and access to public services. In all these circumstances, it is extremely important that users actually end up on the website they intended to reach.

Domain names and top-level domains

All devices connected to the Internet have their own unique IP address, which consist of a long sequence of numbers. The Domain Name System links IP addresses to unique domain names.

Examples of domain names many use daily:,, and

The last part of the domain name – its “last name” – is the top-level domain the domain name is registered under. There are two different types of top-level domains: country code top-level domains (such as .no or .se) and generic top-level domains (such as .com, .org or .shop).

A website can be accessed in different ways: Clicking a link, via an app, via hits from a search engine, or entering the URL into a browser. All these methods of access entail looking up a domain name. The lookup initiates a search for an IP address used to contact the server operating the service you are requesting access to. Originally, the domain name system was not designed to ensure that the return for a lookup actually came from the right source. This means it is possible for attackers to falsify returns and direct a user to another IP address than the one associated with the domain name. For example, a user may be directed to a website that looks like the online retailer they intended to visit, but instead, the website is located on a server controlled by scammers.

What happens behind the scenes when you look up a domain name?

Each domain name has a set of servers handling queries about addresses under the domain name in question. These servers are called name servers.

  1. A small application in your device contacts a dedicated server set up to handle queries in the domain name system, a so-called recursive resolver (often operated by your Internet service provider).
  2. The recursive resolver is tasked with finding the IP address of It forwards the query to one of the name servers for the top level of the domain name system (called the root). Root name servers only know the level below them in the hierarchy, and therefore returns a list of name servers for the top-level domain .no.
  3. The resolver then forwards the query to one of the name servers for .no. These servers also only know the level below them, and therefore return a list of name servers for
  4. The resolver repeats the query to one of the name servers for, which returns the IP address for
  5. The resolver then forwards the IP address to your device. Once your browser is provided with the IP address, it contacts the web server at this address, and downloads the website you requested.

The resolver normally accepts the first response to its query, and does not verify that it comes from the right source.

DNSSEC (DNS Security Extensions) is a security mechanism that offers a solution to this problem. When a domain name is secured by DNSSEC, all returns to domain queries will be signed cryptographically. This makes it possible to verify both that the response comes from the right source, and that it has not been changed along the way.

The signature is created by a private key accessible only to the operator of the domain name. The signature is validated by the device making the query in the domain name system retrieving a public key for the domain. It then pairs the key and signature to validate the answer. Given the hierarchy of the domain name system, a scammer cannot enter false keys in addition to false responses. The public key of a domain is part of an unbroken chain of keys validating each other, all the way to the top level. In order for DNSSEC to work, all levels have to be secured by DNSSEC. A chain is only as strong as its weakest link.

DNSSEC solves the problem of false responses to queries. It is important to be aware, however, that DNSSEC is only a small piece in a large puzzle of security measures needed to keep us safe online. DNSSEC ensures that we reach the address we wanted to reach, not that the contents of the site are safe.

Norway a world leader in securing the domain name system

Norid considers DNSSEC to be a key security component in the domain name system, and believes that the technology should be standard for Norwegian domain names.

This approach to DNSSEC, however, requires sufficiently sophisticated technology so that there is extensive support for it. Norid has chosen to introduce DNSSEC as an infrastructure upgrade. A domain name holder is not supposed either to know about this technology or to order it for her or his domain name to benefit from this security upgrade.

Key DNSSEC milestones

2007: .se is the first top-level domain in the world to allow use of DNSSEC to secure its domain names. Because the top level of the domain name system had not yet been secured, .se had to create a temporary solution to compensate for this.

2010: The top level of the domain name system is secured by DNSSEC.

2014: Support for the technology is available in the most common software for domain name system queries. DNSSEC is implemented for Norwegian domain names.

Despite the need for sophisticated technology and limited room for errors, many registrars quickly came on board. In May 2015, six months after Norid introduced the technology, the Norwegian top-level domain was among the world’s leading top-level domains regarding percentage of secure domains, where it has remained since 3. As of 16 June 2020, 480,151 Norwegian domain names have been signed using DNSSEC, which accounts for 60.7 percent of all Norwegian domain names 4. Three other European country code top-level domains also stand out with a large percentage of secured domain names: Czech Republic (.cz), at 59.6 percent 5, the Netherlands (.nl), at 55.5 percent  6, and Sweden (.se), at 49.4 percent 7.

Norwegian domain names secured with DNSSEC

Year Number of secured domains
2014 28634
2015 383046
2016 416518
2017 433527
2018 443277
2019 462072
2020 479359
Updated at 9 June 2020
Development in the number of Norwegian domain names secured with DNSSEC (source: Norid)

Even though .no has a very high percentage of secured domain names overall, the degree of implementation among registrars varies considerably. As of June 2020, 18 of 335 registrars offering Norwegian domain names offer secure domains through DNSSEC 8. Only 23 of these have signed more than 30 percent of their domain name portfolio, and 97.7 percent of all signed domain names belongs to 10 registrars 9.

Distribution of signed domain names across registrars

Provider Percentage
Domeneshop AS 65.54 A/S 12.84 AS 6.96
Digital Garden AS 5.41
Syse AS 3.85
Telenor Norge AS 1.84
Globalconnect AS 0.5
Domenia Norge AS 0.33
ISPHuset Nordic AS 0.27
Active Data Norge avd Ssynnes 0.18
Other 2.29
Updated at 7 October 2021
Source: Norid

Key domain names still not signed

With more than half of all Norwegian domain names secured with DNSSEC, this technology has become a new standard here. Even so, only three out of ten of the most popular Norwegian domains are signed 10.

The ten most popular Norwegian domain names
1. not signed
2. not signed
3. signed
4. not signed
5. not signed
6. not signed
7. not signed
8. signed
9. signed
10. not signed
Updated at 7 October 2021
Source:, Norid

DNSSEC is a recommended standard for domain names registered by public administrative agencies in Norway 11. However, we see that public agencies lag behind in securing their domains, although the share of DNSSEC signing for domain names held by public agencies have increased during the last years from 47.3 percent in September 2018 to 52.4 percent in June 2020 12. It is a concern that the governmental domain categories ( and and the domain category reserved for the Armed Forces ( have not implemented the new technology. This means that domain names under one of these domain categories, e.g., cannot choose to secure their site using DNSSEC, because the links above them in the chain are not secured.

At the forefront of validation as well

The large share of DNSSEC secured Norwegian domains means many domain lookups yield signed returns. In order for this to protect the individual user, however, the server retrieving the return for the domain query must check (validate) it, ensuring that returns containing false or inadequate signatures are rejected. This is handled by dedicated servers (recursive resolvers), which are often operated by Internet service providers, hosting providers and service supervisors of internal networks within an organization. In order to fully utilize the potential of DNSSEC, as many as possible of these providers must secure their users by enabling validation.

The degree of validation in Norway has increased considerably since DNSSEC was introduced for Norwegian domain names in 2014. As of 16 June 2020, approx. 83 percent of domain lookups in Norway are validated, which is a high degree on a world-wide basis as well 13.

DNSSEC validation percentages by country

0-10 11-20 21-30 31-40 41-50 51-60 61-70 71-80 81-90 91-100
Country Percentage
SA 97.77
TC 96.96
DJ 96.69
SL 96.39
KI 96.35
GG 95.13
FO 94.67
BT 94.57
AI 93.59
IS 93.39
FM 93.31
AD 93.1
GI 92.8
FI 92.65
GL 92.18
AP 91.67
PW 89.88
IO 89.86
MH 89.33
NR 88.52
NZ 87.06
SE 86.85
PF 85.44
SO 85.41
NO 82.92
EU 80.65
YE 78.81
LU 78.04
DK 77.66
TV 74.39
BS 72.91
LI 72.14
IQ 71.56
CZ 71.21
BQ 68.97
DM 65.5
AZ 65.35
SC 63.88
CH 62.66
SG 62.57
MF 61.07
PT 60.82
MN 60.7
AM 59.52
EE 59.39
HT 57.78
KM 57.5
PS 56.85
ER 56.45
MP 56.35
PG 56.07
DE 56.03
NE 55.96
AF 55.81
CF 55.52
UG 55.43
UZ 55.21
KH 54.94
ZA 54.81
VG 54.71
LV 54.64
IN 54.35
BR 53.87
PR 51.55
GE 51.38
TM 51.22
HK 50.94
NL 50.67
NC 49.65
GQ 47.87
SI 47.58
TO 47.21
IL 46.98
AL 44.93
MW 44.54
CV 43.42
EG 42.82
GU 41.77
BE 41.74
KN 41.14
RW 40.81
JE 40.49
TD 40.2
HN 40.13
PL 40.06
FJ 39.99
KZ 39.07
BB 38.58
MV 37.57
PM 36.98
UA 36.67
BM 36.41
BD 35.94
ZW 35.83
LR 35.43
FR 34.59
GH 34.07
LT 34.05
AO 32.98
MM 32.97
VU 31.69
VA 31.53
KY 30.73
CR 30.69
CI 30.58
LY 30.27
US 30.07
JM 29.71
TG 27.98
RS 27.3
BJ 27.26
AU 27.15
SY 27.05
TJ 27.03
TR 26.82
BG 26.64
MK 26.12
EC 25.99
SS 25.76
IE 25.73
CY 25.5
BA 25.41
VE 25.24
AS 24.97
TZ 24.67
PY 24.61
NP 23.19
BH 23.18
MR 22.86
IM 22.57
GM 22.27
KE 22
BN 21.41
HR 21.14
DO 20.76
SX 20.68
CW 20.42
BZ 20.37
BF 20.25
MZ 20.2
AR 20.13
BY 20.11
MY 19.95
PK 19.81
AT 18.82
RU 18.47
CD 17.71
CG 17.44
SR 17
CO 16.96
BI 16.58
RE 16.4
YT 16.32
PH 15.8
LB 15.43
VN 15.39
PA 15.16
LC 15.1
GR 15.02
SK 15.02
VI 15.01
CA 14.89
SB 13.97
AG 13.69
MD 12.83
GF 12.78
GP 12.01
DZ 11.95
IR 11.9
GT 11.78
AX 11.72
AW 11.47
NA 11.2
JP 11.08
IT 11.01
ID 10.92
ES 10.75
LA 10.28
LS 9.79
GB 9.3
GY 9.3
BO 9.18
MG 9.1
HU 9
NI 8.57
ET 8.3
BW 8.21
WS 8.17
CK 7.93
AE 7.85
SZ 7.36
TL 6.95
SV 6.94
ST 6.82
PE 6.59
MX 6.51
BL 6.49
MC 6.33
GD 6.13
CL 6.04
MO 5.86
TN 5.79
MA 5.53
SM 5.49
KG 5.46
TW 5.27
MU 5.15
WF 5.13
ML 5.06
RO 4.92
NG 4.58
FK 4.52
ME 4.36
EH 4.35
GA 3.9
MT 3.86
KR 3.55
TH 3.43
TT 3.42
SD 3.02
CM 2.92
KW 2.78
QA 2.73
ZM 2.6
JO 2.59
OM 2.57
VC 2.55
SN 2.35
LK 2.29
UY 2.25
GN 1.96
CU 1.33
GW 1.3
MQ 1.14
CN 1.08
AQ 0
CC 0
CX 0
KP 0
MS 0
NF 0
NU 0
SH 0
SJ 0
TK 0
Updated at 16 June 2020

The high degree of validation in Norway can be attributed to the fact that some major providers, such as Telenor Norge, Altibox and Get, whose total customer base is relatively large, have enabled validation. However, there are still some major providers, including GlobalConnect, that have not enabled validation 14.

Correct DNS lookups are an important part of the digital foundation and a prerequisite for the security of IT services. Several threat actors take advantage of the fact that the DNS system was created at a time when communication protocols were characterized by trust alone. The consequence of this can be that users and systems are led to malicious URLs and exposed to cybercrime. DNSSEC is closing this gap by incorporating mechanisms that ensure the validity of DNS lookups with modern encryption and trust services. It is very gratifying that .no is leading the way and is at the very top of the world for the introduction of DNSSEC. The National Communications Authority supports all measures that highlight the importance of signing and validating communication on the Internet.

Elise Knutssøn Lindeberg, Department Director, Norwegian Communications Authority

DNSSEC and the future – what is possible with a secure infrastructure?

The immediate effect of DNSSEC is to safeguard users from false responses from the domain name system, but a secure domain name system also serves as a foundation on which we can build a whole new set of security features.

We are accustomed to being able to securely send email, even at airports, in Internet cafés and using guest networks, because our devices exchange data with the email server using a secure, encrypted connection that third parties cannot tap into or change. Similarly, we look for the green padlock symbol and HTTPS before transferring data such as credit card numbers, user names and passwords on websites we visit.

In order for these connections to be secure, our device must authenticate that it is communicating with the right service, and exchange the necessary cryptographic data. The authentication process largely relies on certificates issued by certificate authorities. The problem is that there are very many certificate authorities, and the level of security they offer varies considerably. Meanwhile, there has been a shortage of good mechanisms to inform users of which certificate authority is authorized to issue certificates for a given service, or which certificate or key the service in question uses. Google is among those who have experienced problems with this issue. In some cases, certificates have been issued for some of Google’s domain names that have not been authorized by Google 15. Such unauthorized certificates make it possible for someone to hijack or tap into traffic to the service.

The domain name system offers a possible solution to this problem. The system’s main purpose is to respond with the IP addresses of a service under a given domain, but the system can also provide certain types of additional information, such as which certificate authority is authorized to issue certificates for a given service 16. DNSSEC enables the user’s device to trust this information, instead of having to accept certificates from every certificate authority.

This application is particularly relevant in Norway, seeing as we have already implemented DNSSEC to a relatively large degree, and most social critical services are available online. Public authorities have a large number of online services for communication with the nation’s residents. As of October 2018 33 percent 17 of these websites use HTTPS. The Norwegian National Security Authority recommends that all these should be secured with this technology, using certificates issued by certificate authorities subject to Norwegian law 18. The need for public websites to securely be able to communicate which certificate authorities they use is therefore quite pressing.

Email is another service that has started using information from the domain name system to increase security. Email servers that use certificates to prevent tapping need information about which certificates are in use for a domain name. In addition, the domain name system can be used to pass on which IP addresses are authorized to send email from a given domain name. And then how such email should be controlled, which makes it easier for a recipient to identify and reject email with forged sender address 19.

In the future, the distribution of secure information about services through the domain name system may extend the use of more security functionality for existing as well as for new services.

From theory to practice – some tools to check your DNSSEC status

Check to see if a Norwegian domain name is secured using DNSSEC.
Enter the domain name and see if it has been secured by DNSSEC, or enter an organization number to see the DNSSEC status of all the domain names of the organzation.

Find a registrar that can secure your domain names with DNSSEC.
Choose to show only providers that offer DNSSEC.

Check the validation status of your domain name lookups.