The DNSSEC PQC Posture Audit is the audit you reach for when you already suspect a problem in this dimension and need a fast, copy-paste-able fix list. It reuses the same chrome as every other jwatte.com tool — deep-links from the mega analyzers, AI-prompt export, CSV/PDF/HTML download — but the checks it runs are narrow and specific.
Probes a domain via DNS-over-HTTPS for DS, DNSKEY, and RRSIG records. Reports algorithm IDs (RFC 8624: 8=RSASHA256, 13=ECDSAP256SHA256, 14=ECDSAP384SHA384, 15=ED25519, 16=ED448 — all classical), DS hash algos, NSEC vs NSEC3 posture, and KSK / ZSK rollover cadence. Flags PQC migration paths.
What it actually checks
This is a partial extract of the audit's real findings — the same strings the tool prints when a check trips. Use it as a quick sanity check before you run the audit live:
Fail conditions (fix these same-week):
- DoH lookup failed
- No DNSKEY records returned
- No DS records at parent zone
Warnings (fix these same-month):
- Resolver could not authenticate (AD bit not set)
- NSEC in use (zone-walkable)
Pass signals (keep doing these):
- DNSSEC enabled (DNSKEY records present)
- Resolver authenticated the answer (AD bit set)
- DS record(s) present at parent
- NSEC3 in use (zone-walk-resistant)
Why this dimension matters
NIST finalized post-quantum cryptography standards in 2024 (FIPS 203 = ML-KEM, FIPS 204 = ML-DSA, FIPS 205 = SLH-DSA). CNSA 2.0 mandates PQC for US national-security systems by 2035, and major CAs are already issuing hybrid classical+PQ certificates. Sites that audit their current TLS / DNSSEC / code-signing posture today can migrate incrementally; sites that wait face a forklift migration.
Common failure patterns
- TLS cert issued for > 398 days — browsers enforce a 398-day maximum (since 2020). Audits still find long-dated certs on legacy systems that will simply stop being trusted on renewal.
- RSA-2048 signatures when the CA supports ECDSA-P-256 — ECDSA is faster, smaller, and equally secure today. For PQC readiness, the migration path is easier from ECDSA than from RSA.
- DNSSEC with RSASHA1 (algorithm 5) — deprecated since 2020. Rekey to RSASHA256 (8) or ECDSAP256SHA256 (13) at minimum.
- Code-signing with SHA-1 or MD5 — trust stores have been rejecting these since 2017. Legacy MSI installers and Linux package signatures are the most common offenders.
How to fix it at the source
Run a TLS / DNSSEC / code-signing inventory today. For TLS: use short-lived certs (Let's Encrypt 90-day renewal is optimal) + automate renewal via ACME. For DNSSEC: rekey to ECDSAP256SHA256. For PQC readiness: watch for OpenSSL 3.x + BoringSSL PQC support; migrate to hybrid ML-KEM+X25519 as soon as your CDN supports it (Cloudflare shipped Kyber in 2023, AWS announced PQ TLS in 2024).
When to run the audit
- After a major site change — redesign, CMS migration, DNS change, hosting platform swap.
- Quarterly as part of routine technical hygiene; the checks are cheap to run repeatedly.
- Before an investor / client review, a PCI scan, a SOC 2 audit, or an accessibility-compliance review.
- When a downstream metric drops (rankings, conversion, AI citations) and you need to rule out this dimension as the cause.
Reading the output
Every finding is severity-classified. The playbook is the same across tools:
- Critical / red: same-week fixes. These block the primary signal and cascade into downstream dimensions.
- Warning / amber: same-month fixes. Drag the score, usually don't block.
- Info / blue: context-only. Often what a PR reviewer would flag but that doesn't block merge.
- Pass / green: confirmation — keep the control in place.
Every audit also emits an "AI fix prompt" — paste into ChatGPT / Claude / Gemini for exact copy-paste code patches tied to your stack.
Related tools
- Mega Security Analyzer — Seven security layers in one scan: TLS, PQC hybrid-KEX, HTTP security headers, DNS email-auth (SPF/DKIM/DMARC/CAA), CSP strictness, MITRE ATT&CK tactic mapping, CWE / OWASP / SANS pattern scan.
- TLS Cert Lifecycle Audit — Probes a hostname for cert lifetime (90 / 100 / 397 day buckets), CT-log inclusion via crt.sh, public-key reuse across renewals (the harvest-now-decrypt-later amplifier most cert tools miss), issuer + ACME client signal, and CAA record nudges..
- PQC Migration Plan Generator — Pick the cryptographic surfaces you operate (TLS, SSH, code signing, S/MIME, IPsec, Git signing, validators, wallets, DKIM, DNSSEC, WebAuthn, mTLS, KMS, DB TDE) plus jurisdiction + shelf-life.
- Code Signing Trust Audit — Probes a GitHub repo, npm package, or website for code-signing trust roots: Sigstore Cosign, SLSA provenance level, in-toto attestations, npm --provenance flag, GitHub artifact attestations, signing-key rotation cadence.
Fact-check notes and sources
- NIST: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA)
- CNSA 2.0: NSA commercial suite announcement
- Cloudflare: Post-quantum for TLS in production (2023)
- Let's Encrypt: Certificate lifetime and compatibility
This post is informational and not a substitute for professional consulting. Mentions of third-party platforms in the tool itself are nominative fair use. No affiliation is implied.