SecureDNS
Resolver alias for privacy-first resolution under a signed zone.
securedns.co.uk
SecureNode
SecureNode is part of a signed security suite: zero-cost, DNSSEC enabled, and enterprise ready. Minimal footprint, maximum credibility.
SecureNode provides a branded, cryptographically signed resolver alias and security demo endpoints for evaluation and showcase. It demonstrates how to achieve practical resilience and trust with minimal complexity and cost.
Resolver alias for privacy-first resolution under a signed zone.
securedns.co.ukHosting and infrastructure pillar for demos and deployments.
cloudgateways.co.ukBranded, DNSSEC signed resolver alias and demo endpoints.
securenode.co.ukPlain‑English explainer: You can point DNS lookups at our branded hostname (dns.securenode.co.uk) and resolve any domain to prove traffic flows through our alias. For DNSSEC, use a signed domain (like securedns.co.uk or cloudgateways.co.uk) and you’ll see the attached cryptographic signatures (RRSIG) and the public keys (DNSKEY). That’s the verifiable “chain of trust” in action.
This shows that queries are flowing through the SecureNode alias (not your system default resolver).
# Windows PowerShell
Resolve-DnsName -Name example.com -Server dns.securenode.co.uk
example.com with any domain you want (e.g. bbc.co.uk, cloudflare.com).dns.securenode.co.uk.Use a DNSSEC‑enabled domain to see the attached RRSIG signature block.
# Ask for the A record and include DNSSEC data
Resolve-DnsName -Name securedns.co.uk -Type A -Server dns.securenode.co.uk -DnssecOk
# Or use another signed zone
Resolve-DnsName -Name cloudgateways.co.uk -Type A -Server dns.securenode.co.uk -DnssecOk
RRSIG section with fields like TypeCovered, Algorithm, Signer, and Expiration.Fetch the zone’s DNSKEY RRset used to verify signatures.
Resolve-DnsName -Name securedns.co.uk -Type DNSKEY -Server dns.securenode.co.uk
Resolve-DnsName -Name cloudgateways.co.uk -Type DNSKEY -Server dns.securenode.co.uk
If you prefer Terminal with dig, you’ll see the AD flag and signatures inline.
dig @dns.securenode.co.uk securedns.co.uk A +dnssec
dig @dns.securenode.co.uk cloudgateways.co.uk A +dnssec
ad (Authenticated Data) flag in the header and the RRSIG alongside the answer.-Type RRSIG may return SERVFAIL — that’s expected.-DnssecOk with a normal record type (e.g. A) to see attached signatures; direct -Type RRSIG can fail on some resolvers.Bottom line: You can point queries at dns.securenode.co.uk to prove resolution flows through the branded alias, and you can verify DNSSEC by viewing RRSIG and DNSKEY on signed zones. It’s a practical, zero‑cost pattern you can replicate under your own brand.
SecureNode is also a pattern. You don’t need enterprise hardware to explore DNSSEC, resolvers, or branded aliases. A simple home lab setup lets you experiment safely and understand how the pieces fit together. It’s the perfect environment to simulate misconfigurations, DNSSEC failures or firewall rules and to see how real‑world issues surface and can be fixed without risking production. You can replicate this setup under your own brand in two different ways:
This is how dns.securenode.co.uk works today:
1.1.1.1, Quad9 9.9.9.9, Google 8.8.8.8).dns.yourbrand.co.uk) and point that hostname at your chosen resolver’s IP using an A record eg: dns.yourbrand.co.uk has an A record of 1.1.1.1This is the quickest way to demonstrate “engineered trust” without running your own server, exactly what SecureNode does.
If you want to operate the resolver yourself, here’s the recipe:
# Install (Ubuntu/Debian)
sudo apt-get update && sudo apt-get install unbound
# Minimal /etc/unbound/unbound.conf excerpts
server:
verbosity: 1
interface: 0.0.0.0
interface: ::0
port: 53
do-ip4: yes
do-ip6: yes
do-udp: yes
do-tcp: yes
harden-dnssec-stripped: yes
qname-minimisation: yes
prefetch: yes
hide-identity: yes
hide-version: yes
rrset-cache-size: 256m
msg-cache-size: 128m
# Enable and start
sudo systemctl enable unbound
sudo systemctl start unbound
# Open firewall (example, ufw)
sudo ufw allow 53/tcp
sudo ufw allow 53/udp
# Point dns.yourdomain.co.uk A/AAAA to your VM IP when ready
This option gives you maximum autonomy and lets you experiment with DNSSEC, DoT/DoH, and custom policies under your own brand.
Bottom line: Whether you alias an existing resolver or run your own, the pattern is the same, a branded, DNSSEC‑signed hostname that demonstrates trust and resilience with minimal overhead.
By default, DNS uses UDP/TCP on port 53. If you want to offer encrypted DNS under your brand, you can also run:
/dns-query.You can alias any public resolver (Google 8.8.8.8, Quad9 9.9.9.9, Cloudflare 1.1.1.1) the same way we’ve done with dns.securenode.co.uk.