Skip to content
Go back

Setting Up DNSSEC with Namecheap and Cloudflare: A Step-by-Step Guide

I recently configured DNSSEC for one of my domains, and while the process isn’t complicated, the documentation scattered across Namecheap and Cloudflare left me piecing together information from multiple sources.

If you’re running a domain registered with Namecheap but using Cloudflare for DNS management, this guide will walk you through the entire DNSSEC setup process—including the parts that aren’t immediately obvious.

Table of contents

Open Table of contents

What is DNSSEC and Why Should You Care?

DNSSEC (Domain Name System Security Extensions) adds a layer of security to the DNS lookup process by using cryptographic signatures to verify that DNS responses haven’t been tampered with.

Without DNSSEC, when someone types your domain into their browser, the DNS response they receive could theoretically be intercepted and modified by an attacker (a DNS spoofing attack). DNSSEC prevents this by allowing DNS resolvers to verify that the response came from the authoritative source and hasn’t been altered in transit.

Think of it as HTTPS for DNS—it doesn’t encrypt the data, but it does verify its authenticity.

Why enable DNSSEC?

If you’re running a business website, handling sensitive data, or just want to follow security best practices, DNSSEC is worth enabling.

The Namecheap + Cloudflare Setup

First, let’s clarify the setup we’re working with:

You might wonder: “Why use Cloudflare when Namecheap offers DNS?”

Cloudflare provides:

Many developers register domains with Namecheap (competitive pricing, good support) but point nameservers to Cloudflare for DNS management and performance benefits.

For DNSSEC, this means:

Step 1: Enable DNSSEC in Cloudflare

Start by enabling DNSSEC in Cloudflare, which will generate the cryptographic keys needed.

  1. Log into your Cloudflare dashboard
  2. Select the domain you want to secure
  3. Navigate to DNS in the left sidebar
  4. Scroll down to the DNSSEC section (it’s usually at the bottom of the DNS settings page)
  5. Click “Enable DNSSEC”

Cloudflare will generate DNSSEC keys and present you with DS record information. This is where things get important, don’t close this page yet.

You’ll see information that looks like this:

Key Tag: 12345
Algorithm: 13 (ECDSA Curve P-256 with SHA-256)
Digest Type: 2 (SHA-256)
Digest: a1b2c3d4e5f6...

What are these values?

These values are what you’ll add to Namecheap. Keep this tab open—you’ll need to copy these values in the next step.

Step 2: Add DS Records to Namecheap

Now we need to tell Namecheap about Cloudflare’s DNSSEC keys by adding DS records at the registrar level.

  1. Log into your Namecheap account
  2. Go to Domain List and find your domain
  3. Click “Manage” next to the domain
  4. Navigate to the “Advanced DNS” tab
  5. Scroll down to the “DNSSEC” section
  6. Activate DNSSEC (or “Manage DNSSEC” if records already exist)

You’ll see a form asking for:

Here’s where confusion often happens: Namecheap shows dropdown menus with algorithm and digest type options, but the numbers don’t always match what Cloudflare displays.

Matching the values:

Cloudflare shows: Algorithm: 13 (ECDSA Curve P-256 with SHA-256) Namecheap dropdown: Look for “13” or “ECDSAP256SHA256”

Cloudflare shows: Digest Type: 2 (SHA-256) Namecheap dropdown: Look for “2” or “SHA-256”

Copy the exact values from Cloudflare:

  1. Key Tag: Copy the number exactly
  2. Algorithm: Select “13” from the dropdown
  3. Digest Type: Select “2” (SHA-256) from the dropdown
  4. Digest: Copy the entire digest string (it’s long—make sure you get all of it)

Click “Save Changes”

Step 3: Wait for Propagation

Once you’ve added the DS records to Namecheap, nothing happens immediately.

DNSSEC changes require propagation through the DNS hierarchy:

  1. Namecheap submits your DS records to the domain’s registry (e.g., Verisign for .com)
  2. The registry updates the parent zone
  3. DNS resolvers worldwide pick up the changes

How long does this take?

During this time:

Don’t panic if DNSSEC validation doesn’t work immediately. This is expected.

Step 4: Verify DNSSEC is Working

After waiting for propagation, verify that DNSSEC is active and working correctly.

Method 1: Cloudflare Dashboard

The easiest way:

  1. Go back to your Cloudflare DNS settings
  2. Find the DNSSEC section
  3. Look for a status indicator

If everything is working, you should see something like:

Method 2: Online DNSSEC Validators

Use a third-party tool to verify:

Enter your domain and run the check. A successful DNSSEC configuration will show:

Method 3: Command Line (dig)

If you’re comfortable with the terminal:

dig +dnssec yourdomain.com

Look for the ad flag (authenticated data) in the response. If DNSSEC is working, you’ll see flags like ad in the response header.

Troubleshooting Common Issues

DS Records Not Detected

Symptom: Cloudflare still shows “DS records not detected” after 24 hours

Possible causes:

Fix: Log back into Namecheap, go to Advanced DNS → DNSSEC, and verify the DS records match exactly what Cloudflare provided.

DNSSEC Validation Failures

Symptom: DNSSEC validators show errors or warnings

Possible causes:

Fix: Remove the DS records in Namecheap, wait a few hours, then re-add them with fresh values from Cloudflare.

Site Still Accessible Despite Errors

Important note: If DNSSEC is misconfigured, your site will still be accessible to most users. DNSSEC failures result in warnings or validation errors, but most DNS resolvers will still return the IP address.

However, security-conscious resolvers and tools may refuse to connect, so it’s important to fix any validation errors.

Key Takeaways

DNSSEC with Namecheap and Cloudflare is straightforward, but requires patience:

  1. Enable DNSSEC in Cloudflare first—this generates the keys
  2. Copy the DS record values exactly (especially the digest)
  3. Add DS records to Namecheap’s Advanced DNS settings
  4. Wait 24-48 hours for full propagation
  5. Verify using Cloudflare dashboard or external validators

The most common mistakes:

Once it’s set up, DNSSEC runs automatically. Cloudflare handles key rotation and signing, you don’t need to touch it again unless you change DNS providers.

Why This Matters

DNSSEC isn’t a silver bullet for security, but it’s an important layer of defense against DNS-based attacks. For projects handling sensitive data, business domains, or anything where trust matters, enabling DNSSEC is a simple step that meaningfully improves security posture.

If you’re already using Cloudflare for DNS, enabling DNSSEC costs nothing and takes 15 minutes (plus propagation time). It’s one of those “set it and forget it” security improvements that’s absolutely worth doing.


Questions or issues setting up DNSSEC? Reach out at [email protected] or on Twitter, happy to help troubleshoot.

Resources:


Share this post on:

Next Post
Building Clefi: A Password Manager for the French and EU Market