diff --git a/daemon/README.rst b/daemon/README.rst
index 0a4d27a56609ded92dff55f02e32950fc72dac9a..975c01c1bf4dea08a7387365a89204dcd21ee407 100644
--- a/daemon/README.rst
+++ b/daemon/README.rst
@@ -1024,6 +1024,8 @@ The daemon also supports `systemd socket activation`_, it is automatically detec
 
 See ``kresd.systemd(7)`` for details.
 
+.. _enabling-dnssec:
+
 Enabling DNSSEC
 ===============
 
diff --git a/daemon/bindings.c b/daemon/bindings.c
index b9045b358ac4e2f81d9c88dd0b44092253f39377..e3dd725849a5d69c55a6402830f16b60637508f9 100644
--- a/daemon/bindings.c
+++ b/daemon/bindings.c
@@ -26,6 +26,7 @@
 #include "daemon/bindings.h"
 #include "daemon/worker.h"
 #include "daemon/tls.h"
+#include "daemon/zimport.h"
 
 #define xstr(s) str(s)
 #define str(s) #s
@@ -1149,6 +1150,90 @@ static int cache_ns_tout(lua_State *L)
 	return 1;
 }
 
+/** Zone import completion callback.
+ * Deallocates zone import context. */
+static void cache_zone_import_cb(int state, void *param)
+{
+	assert (param);
+	(void)state;
+	struct worker_ctx *worker = (struct worker_ctx *)param;
+	assert (worker->z_import);
+	zi_free(worker->z_import);
+	worker->z_import = NULL;
+}
+
+/** Import zone from file. */
+static int cache_zone_import(lua_State *L)
+{
+	int ret = -1;
+	char msg[128];
+
+	struct worker_ctx *worker = wrk_luaget(L);
+	if (!worker) {
+		strncpy(msg, "internal error, empty worker pointer", sizeof(msg));
+		goto finish;
+	}
+
+	if (worker->z_import && zi_import_started(worker->z_import)) {
+		strncpy(msg, "import already started", sizeof(msg));
+		goto finish;
+	}
+
+	struct engine *engine = engine_luaget(L);
+	if (!engine) {
+		strncpy(msg, "internal error, empty engine pointer", sizeof(msg));
+		goto finish;
+	}
+	struct kr_cache *cache = &engine->resolver.cache;
+	if (!kr_cache_is_open(cache)) {
+		strncpy(msg, "cache isn't open", sizeof(msg));
+		goto finish;
+	}
+
+	/* Check parameters */
+	int n = lua_gettop(L);
+	if (n < 1 || !lua_isstring(L, 1)) {
+		strncpy(msg, "expected 'cache.zone_import(path to zone file)'", sizeof(msg));
+		goto finish;
+	}
+
+	/* Parse zone file */
+	const char *zone_file = lua_tostring(L, 1);
+
+	const char *default_origin = NULL; /* TODO */
+	uint16_t default_rclass = 1;
+	uint32_t default_ttl = 0;
+
+	if (worker->z_import == NULL) {
+		worker->z_import = zi_allocate(worker, cache_zone_import_cb, worker);
+		if (worker->z_import == NULL) {
+			strncpy(msg, "can't allocate zone import context", sizeof(msg));
+			goto finish;
+		}
+	}
+
+	ret = zi_zone_import(worker->z_import, zone_file, default_origin,
+			     default_rclass, default_ttl);
+
+	lua_newtable(L);
+	if (ret == 0) {
+		strncpy(msg, "zone file successfully parsed, import started", sizeof(msg));
+	} else if (ret == 1) {
+		strncpy(msg, "TA not found", sizeof(msg));
+	} else {
+		strncpy(msg, "error parsing zone file", sizeof(msg));
+	}
+
+finish:
+	msg[sizeof(msg) - 1] = 0;
+	lua_newtable(L);
+	lua_pushstring(L, msg);
+	lua_setfield(L, -2, "msg");
+	lua_pushnumber(L, ret);
+	lua_setfield(L, -2, "code");
+
+	return 1;
+}
 
 int lib_cache(lua_State *L)
 {
@@ -1165,6 +1250,7 @@ int lib_cache(lua_State *L)
 		{ "max_ttl", cache_max_ttl },
 		{ "min_ttl", cache_min_ttl },
 		{ "ns_tout", cache_ns_tout },
+		{ "zone_import", cache_zone_import },
 		{ NULL, NULL }
 	};
 
diff --git a/daemon/daemon.mk b/daemon/daemon.mk
index cf28be0ff010c8e11a22bea21914d6454ef93962..3d655f0ceed9eee1d7e6f32cdd1c1a8cdfe09441 100644
--- a/daemon/daemon.mk
+++ b/daemon/daemon.mk
@@ -7,6 +7,7 @@ kresd_SOURCES := \
 	daemon/ffimodule.c   \
 	daemon/tls.c         \
 	daemon/tls_ephemeral_credentials.c \
+	daemon/zimport.c     \
 	daemon/main.c
 
 kresd_DIST := daemon/lua/kres.lua daemon/lua/kres-gen.lua \
diff --git a/daemon/worker.c b/daemon/worker.c
index 4392dbd001dd72527d3cebb3b038eedce31f5604..f91b95cf75c86c7fde17d16df2d0e2bee157e0e6 100644
--- a/daemon/worker.c
+++ b/daemon/worker.c
@@ -35,6 +35,7 @@
 #include "daemon/engine.h"
 #include "daemon/io.h"
 #include "daemon/tls.h"
+#include "daemon/zimport.h"
 
 #define VERBOSE_MSG(qry, fmt...) QRVERBOSE(qry, "wrkr", fmt)
 
@@ -484,6 +485,18 @@ static inline void pool_release(struct worker_ctx *worker, struct mempool *mp)
 	}
 }
 
+/** Create a key for an outgoing subrequest: qname, qclass, qtype.
+ * @param key Destination buffer for key size, MUST be SUBREQ_KEY_LEN or larger.
+ * @return key length if successful or an error
+ */
+static const size_t SUBREQ_KEY_LEN = KR_RRKEY_LEN;
+static int subreq_key(char *dst, knot_pkt_t *pkt)
+{
+	assert(pkt);
+	return kr_rrkey(dst, knot_pkt_qclass(pkt), knot_pkt_qname(pkt),
+			knot_pkt_qtype(pkt), knot_pkt_qtype(pkt));
+}
+
 /** Create and initialize a request_ctx (on a fresh mempool).
  *
  * handle and addr point to the source of the request, and they are NULL
@@ -1403,35 +1416,6 @@ static int timer_start(struct session *session, uv_timer_cb cb,
 	return 0;
 }
 
-/** Create a key for an outgoing subrequest: qname, qclass, qtype.
- * @param key Destination buffer for key size, MUST be SUBREQ_KEY_LEN or larger.
- * @return key length if successful or an error
- */
-static int subreq_key(char *dst, knot_pkt_t *pkt)
-{
-	assert(dst && pkt);
-	const char * const dst_begin = dst;
-
-	int ret = knot_dname_to_wire((uint8_t *)dst, knot_pkt_qname(pkt), KNOT_DNAME_MAXLEN);
-	if (ret <= 0) {
-		assert(false); /*EINVAL*/
-		return kr_error(ret);
-	}
-	knot_dname_to_lower((knot_dname_t *)dst);
-	dst += ret;
-
-	const uint16_t qclass = knot_pkt_qclass(pkt);
-	memcpy(dst, &qclass, sizeof(qclass));
-	dst += sizeof(qclass);
-
-	const uint16_t qtype = knot_pkt_qtype(pkt);
-	memcpy(dst, &qtype, sizeof(qtype));
-	dst += sizeof(qtype);
-
-	return dst - dst_begin;
-}
-static const size_t SUBREQ_KEY_LEN = KNOT_DNAME_MAXLEN + 2 * sizeof(uint16_t);
-
 static void subreq_finalize(struct qr_task *task, const struct sockaddr *packet_source, knot_pkt_t *pkt)
 {
 	/* Close pending timer */
@@ -2385,6 +2369,11 @@ struct kr_request *worker_task_request(struct qr_task *task)
 	return &task->ctx->req;
 }
 
+int worker_task_finalize(struct qr_task *task, int state)
+{
+	return qr_task_finalize(task, state);
+}
+
 void worker_session_close(struct session *session)
 {
 	session_close(session);
@@ -2434,6 +2423,10 @@ void worker_reclaim(struct worker_ctx *worker)
 	worker->subreq_out = NULL;
 	map_clear(&worker->tcp_connected);
 	map_clear(&worker->tcp_waiting);
+	if (worker->z_import != NULL) {
+		zi_free(worker->z_import);
+		worker->z_import = NULL;
+	}
 }
 
 struct worker_ctx *worker_create(struct engine *engine, knot_mm_t *pool,
diff --git a/daemon/worker.h b/daemon/worker.h
index 7d50c74df0cbe6b8c8e736ac68bb70c9afbf28aa..ec3e0f8857481988bf5625faa696b37d59a3ad71 100644
--- a/daemon/worker.h
+++ b/daemon/worker.h
@@ -29,6 +29,8 @@ struct qr_task;
 struct worker_ctx;
 /** Transport session (opaque). */
 struct session;
+/** Zone import context (opaque). */
+struct zone_import_ctx;
 
 /** Create and initialize the worker. */
 struct worker_ctx *worker_create(struct engine *engine, knot_mm_t *pool,
@@ -94,6 +96,9 @@ ssize_t worker_gnutls_push(gnutls_transport_ptr_t h, const void *buf, size_t len
 
 ssize_t worker_gnutls_client_push(gnutls_transport_ptr_t h, const void *buf, size_t len);
 
+/** Finalize given task */
+int worker_task_finalize(struct qr_task *task, int state);
+
 /** @cond internal */
 
 /** Number of request within timeout window. */
@@ -140,6 +145,7 @@ struct worker_ctx {
 		size_t timeout;
 	} stats;
 
+	struct zone_import_ctx* z_import;
 	bool too_many_open;
 	size_t rconcurrent_highwatermark;
 	/** List of active outbound TCP sessions */
diff --git a/daemon/zimport.c b/daemon/zimport.c
new file mode 100644
index 0000000000000000000000000000000000000000..24f3f3971b7d582fd6e38691dcb9b8230e333e21
--- /dev/null
+++ b/daemon/zimport.c
@@ -0,0 +1,803 @@
+/*  Copyright (C) 2018 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz>
+
+    This program is free software: you can redistribute it and/or modify
+    it under the terms of the GNU General Public License as published by
+    the Free Software Foundation, either version 3 of the License, or
+    (at your option) any later version.
+
+    This program is distributed in the hope that it will be useful,
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+    GNU General Public License for more details.
+
+    You should have received a copy of the GNU General Public License
+    along with this program.  If not, see <https://www.gnu.org/licenses/>.
+ */
+
+/* Module is intended to import resource records from file into resolver's cache.
+ * File supposed to be a standard DNS zone file
+ * which contains text representations of resource records.
+ * For now only root zone import is supported.
+ *
+ * Import process consists of two stages.
+ * 1) Zone file parsing.
+ * 2) Import of parsed entries into the cache.
+ *
+ * These stages are implemented as two separate functions
+ * (zi_zone_import and zi_zone_process) which runs sequentially with the
+ * pause between them. This is done because resolver is a single-threaded
+ * application, so it can't process user's requests during the whole import
+ * process. Separation into two stages allows to reduce the
+ * continuous time interval when resolver can't serve user requests.
+ * Since root zone isn't large it is imported as single
+ * chunk. If it would be considered as necessary, import stage can be
+ * split into shorter stages.
+ *
+ * zi_zone_import() uses libzscanner to parse zone file.
+ * Parsed records are stored to internal storage from where they are imported to
+ * cache during the second stage.
+ *
+ * zi_zone_process() imports parsed resource records to cache.
+ * It imports rrset by creating request that will never be sent to upstream.
+ * After request creation resolver creates pseudo-answer which must contain
+ * all necessary data for validation. Then resolver process answer as if he had
+ * been received from network.
+ */
+
+#include <stdlib.h>
+#include <uv.h>
+#include <ucw/mempool.h>
+#include <libknot/rrset.h>
+#include <zscanner/scanner.h>
+
+#include "lib/utils.h"
+#include "lib/dnssec/ta.h"
+#include "daemon/worker.h"
+#include "daemon/zimport.h"
+#include "lib/generic/map.h"
+#include "lib/generic/array.h"
+
+#define VERBOSE_MSG(qry, fmt...) QRVERBOSE(qry, "zimport", fmt)
+
+/* Pause between parse and import stages, milliseconds.
+ * See comment in zi_zone_import() */
+#define ZONE_IMPORT_PAUSE 100
+
+typedef array_t(knot_rrset_t *) qr_rrsetlist_t;
+
+struct zone_import_ctx {
+	struct worker_ctx *worker;
+	bool started;
+	knot_dname_t *origin;
+	knot_rrset_t *ta;
+	knot_rrset_t *key;
+	uint64_t start_timestamp;
+	size_t rrset_idx;
+	uv_timer_t timer;
+	map_t rrset_indexed;
+	qr_rrsetlist_t rrset_sorted;
+	knot_mm_t pool;
+	zi_callback cb;
+	void *cb_param;
+};
+
+typedef struct zone_import_ctx zone_import_ctx_t;
+
+static int RRSET_IS_ALREADY_IMPORTED = 1;
+
+/** @internal Allocate zone import context.
+ * @return pointer to zone import context or NULL. */
+static zone_import_ctx_t *zi_ctx_alloc()
+{
+	return (zone_import_ctx_t *)malloc(sizeof(zone_import_ctx_t));
+}
+
+/** @internal Free zone import context. */
+static void zi_ctx_free(zone_import_ctx_t *z_import)
+{
+	if (z_import != NULL) {
+		free(z_import);
+	}
+}
+
+/** @internal Reset all fields in the zone import context to their default values.
+ * Flushes memory pool, but doesn't reallocate memory pool buffer.
+ * Doesn't affect timer handle, pointers to callback and callback parameter.
+ * @return 0 if success; -1 if failed. */
+static int zi_reset(struct zone_import_ctx *z_import, size_t rrset_sorted_list_size)
+{
+	mp_flush(z_import->pool.ctx);
+
+	z_import->started = false;
+	z_import->start_timestamp = 0;
+	z_import->rrset_idx = 0;
+	z_import->pool.alloc = (knot_mm_alloc_t) mp_alloc;
+	z_import->rrset_indexed = map_make(&z_import->pool);
+
+	array_init(z_import->rrset_sorted);
+
+	int ret = 0;
+	if (rrset_sorted_list_size) {
+		ret = array_reserve_mm(z_import->rrset_sorted, rrset_sorted_list_size,
+				       kr_memreserve, &z_import->pool);
+	}
+
+	return ret;
+}
+
+/** @internal Close callback for timer handle.
+ * @note Actually frees zone import context. */
+static void on_timer_close(uv_handle_t *handle)
+{
+	zone_import_ctx_t *z_import = (zone_import_ctx_t *)handle->data;
+	if (z_import != NULL) {
+		zi_ctx_free(z_import);
+	}
+}
+
+zone_import_ctx_t *zi_allocate(struct worker_ctx *worker,
+			       zi_callback cb, void *param)
+{
+	if (worker->loop == NULL) {
+		return NULL;
+	}
+	zone_import_ctx_t *z_import = zi_ctx_alloc();
+	if (!z_import) {
+		return NULL;
+	}
+	void *mp = mp_new (8192);
+	if (!mp) {
+		zi_ctx_free(z_import);
+		return NULL;
+	}
+	memset(z_import, 0, sizeof(*z_import));
+	z_import->pool.ctx = mp;
+	z_import->worker = worker;
+	int ret = zi_reset(z_import, 0);
+	if (ret < 0) {
+		mp_delete(mp);
+		zi_ctx_free(z_import);
+		return NULL;
+	}
+	uv_timer_init(z_import->worker->loop, &z_import->timer);
+	z_import->timer.data = z_import;
+	z_import->cb = cb;
+	z_import->cb_param = param;
+	return z_import;
+}
+
+void zi_free(zone_import_ctx_t *z_import)
+{
+	z_import->started = false;
+	z_import->start_timestamp = 0;
+	z_import->rrset_idx = 0;
+	mp_delete(z_import->pool.ctx);
+	z_import->pool.ctx = NULL;
+	z_import->pool.alloc = NULL;
+	z_import->worker = NULL;
+	z_import->cb = NULL;
+	z_import->cb_param = NULL;
+	uv_close((uv_handle_t *)&z_import->timer, on_timer_close);
+}
+
+/** @internal Mark rrset that has been already imported
+ *  to avoid repeated import. */
+static inline void zi_rrset_mark_as_imported(knot_rrset_t *rr)
+{
+	rr->additional = (void *)&RRSET_IS_ALREADY_IMPORTED;
+}
+
+/** @internal Check if rrset is marked as "already imported".
+ * @return true if marked, false if isn't */
+static inline bool zi_rrset_is_marked_as_imported(knot_rrset_t *rr)
+{
+	return (rr->additional == &RRSET_IS_ALREADY_IMPORTED);
+}
+
+/** @internal Try to find rrset with given requisites amongst parsed rrsets
+ * and put it to given packet. If there is RRSIG which covers that rrset, it
+ * will be added as well. If rrset found and successfully put, it marked as
+ * "already imported" to avoid repeated import. The same is true for RRSIG.
+ * @return -1 if failed
+ *          0 if required record been actually put into the packet
+ *          1 if required record could not be found */
+static int zi_rrset_find_put(struct zone_import_ctx *z_import,
+			     knot_pkt_t *pkt, const knot_dname_t *owner,
+			     uint16_t class, uint16_t type, uint16_t additional)
+{
+	if (type != KNOT_RRTYPE_RRSIG) {
+		/* If required rrset isn't rrsig, these must be the same values */
+		additional = type;
+	}
+
+	char key[KR_RRKEY_LEN];
+	int err = kr_rrkey(key, class, owner, type, additional);
+	if (err <= 0) {
+		return -1;
+	}
+	knot_rrset_t *rr = map_get(&z_import->rrset_indexed, key);
+	if (!rr) {
+		return 1;
+	}
+	err = knot_pkt_put(pkt, 0, rr, 0);
+	if (err != KNOT_EOK) {
+		return -1;
+	}
+	zi_rrset_mark_as_imported(rr);
+
+	if (type != KNOT_RRTYPE_RRSIG) {
+		/* Try to find corresponding rrsig */
+		err = zi_rrset_find_put(z_import, pkt, owner,
+					class, KNOT_RRTYPE_RRSIG, type);
+		if (err < 0) {
+			return err;
+		}
+	}
+
+	return 0;
+}
+
+/** @internal Try to put given rrset to the given packet.
+ * If there is RRSIG which covers that rrset, it will be added as well.
+ * If rrset successfully put in the packet, it marked as
+ * "already imported" to avoid repeated import.
+ * The same is true for RRSIG.
+ * @return -1 if failed
+ *          0 if required record been actually put into the packet */
+static int zi_rrset_put(struct zone_import_ctx *z_import, knot_pkt_t *pkt,
+			knot_rrset_t *rr)
+{
+	assert(rr);
+	assert(rr->type != KNOT_RRTYPE_RRSIG);
+	int err = knot_pkt_put(pkt, 0, rr, 0);
+	if (err != KNOT_EOK) {
+		return -1;
+	}
+	zi_rrset_mark_as_imported(rr);
+	/* Try to find corresponding RRSIG */
+	err = zi_rrset_find_put(z_import, pkt, rr->owner, rr->rclass,
+				KNOT_RRTYPE_RRSIG, rr->type);
+	return (err < 0) ? err : 0;
+}
+
+/** @internal Try to put DS & NSEC* for rset->owner to given packet.
+ * @return -1 if failed;
+ *          0 if no errors occurred (it doesn't mean
+ *            that records were actually added). */
+static int zi_put_delegation(zone_import_ctx_t *z_import, knot_pkt_t *pkt,
+			     knot_rrset_t *rr)
+{
+	int err = zi_rrset_find_put(z_import, pkt, rr->owner,
+				    rr->rclass, KNOT_RRTYPE_DS, 0);
+	if (err == 1) {
+		/* DS not found, maybe there are NSEC* */
+		err = zi_rrset_find_put(z_import, pkt, rr->owner,
+					rr->rclass, KNOT_RRTYPE_NSEC, 0);
+		if (err >= 0) {
+			err = zi_rrset_find_put(z_import, pkt, rr->owner,
+						rr->rclass, KNOT_RRTYPE_NSEC3, 0);
+		}
+	}
+	return err < 0 ? err : 0;
+}
+
+/** @internal Try to put A & AAAA records for rset->owner to given packet.
+ * @return -1 if failed;
+ *          0 if no errors occurred (it doesn't mean
+ *            that records were actually added). */
+static int zi_put_glue(zone_import_ctx_t *z_import, knot_pkt_t *pkt,
+			     knot_rrset_t *rr)
+{
+	int err = 0;
+	for (uint16_t i = 0; i < rr->rrs.rr_count; ++i) {
+		const knot_dname_t *ns_name = knot_ns_name(&rr->rrs, i);
+		err = zi_rrset_find_put(z_import, pkt, ns_name,
+					rr->rclass, KNOT_RRTYPE_A, 0);
+		if (err < 0) {
+			break;
+		}
+
+		err = zi_rrset_find_put(z_import, pkt, ns_name,
+					rr->rclass, KNOT_RRTYPE_AAAA, 0);
+		if (err < 0) {
+			break;
+		}
+	}
+	return err < 0 ? err : 0;
+}
+
+/** @internal Create query. */
+static knot_pkt_t *zi_query_create(zone_import_ctx_t *z_import, knot_rrset_t *rr)
+{
+	knot_mm_t *pool = &z_import->pool;
+
+	uint32_t msgid = kr_rand_uint(0);
+
+	knot_pkt_t *query = knot_pkt_new(NULL, KNOT_WIRE_MAX_PKTSIZE, pool);
+	if (!query) {
+		return NULL;
+	}
+
+	knot_pkt_put_question(query, rr->owner, rr->rclass, rr->type);
+	knot_pkt_begin(query, KNOT_ANSWER);
+	knot_wire_set_rd(query->wire);
+	knot_wire_set_id(query->wire, msgid);
+	int err = knot_pkt_parse(query, 0);
+	if (err != KNOT_EOK) {
+		knot_pkt_free(&query);
+		return NULL;
+	}
+
+	return query;
+}
+
+/** @internal Import given rrset to cache.
+ * @return -1 if failed; 0 if success */
+static int zi_rrset_import(zone_import_ctx_t *z_import, knot_rrset_t *rr)
+{
+	struct worker_ctx *worker = z_import->worker;
+
+	assert(worker);
+
+	/* Create "pseudo query" which asks for given rrset. */
+	knot_pkt_t *query = zi_query_create(z_import, rr);
+	if (!query) {
+		return -1;
+	}
+
+	knot_mm_t *pool = &z_import->pool;
+	uint8_t *dname = rr->owner;
+	uint16_t rrtype = rr->type;
+	uint16_t rrclass = rr->rclass;
+
+	/* Create "pseudo answer". */
+	knot_pkt_t *answer = knot_pkt_new(NULL, KNOT_WIRE_MAX_PKTSIZE, pool);
+	if (!answer) {
+		knot_pkt_free(&query);
+		return -1;
+	}
+	knot_pkt_put_question(answer, dname, rrclass, rrtype);
+	knot_pkt_begin(answer, KNOT_ANSWER);
+
+	struct kr_qflags options;
+	memset(&options, 0, sizeof(options));
+	options.DNSSEC_WANT = true;
+	options.NO_MINIMIZE = true;
+
+	/* This call creates internal structures which necessary for
+	 * resolving - qr_task & request_ctx. */
+	struct qr_task *task = worker_resolve_start(worker, query, options);
+	if (!task) {
+		knot_pkt_free(&query);
+		knot_pkt_free(&answer);
+		return -1;
+	}
+
+	/* Push query to the request resolve plan.
+	 * Actually query will never been sent to upstream. */
+	struct kr_request *request = worker_task_request(task);
+	struct kr_rplan *rplan = &request->rplan;
+	struct kr_query *qry = kr_rplan_push(rplan, NULL, dname, rrclass, rrtype);
+	int state = KR_STATE_FAIL;
+	bool origin_is_owner = knot_dname_is_equal(rr->owner, z_import->origin);
+	bool is_referral = (rrtype == KNOT_RRTYPE_NS && !origin_is_owner);
+	uint32_t msgid = knot_wire_get_id(query->wire);
+
+	qry->id = msgid;
+
+	/* Prepare zonecut. It must have all the necessary requisites for
+	 * successful validation - matched zone name & keys & trust-anchors. */
+	kr_zonecut_init(&qry->zone_cut, z_import->origin, pool);
+	qry->zone_cut.key = z_import->key;
+	qry->zone_cut.trust_anchor = z_import->ta;
+
+	if (knot_pkt_init_response(request->answer, query) != 0) {
+		goto cleanup;
+	}
+
+	/* Since "pseudo" query asks for NS for subzone,
+	 * "pseudo" answer must simulate referral. */
+	if (is_referral) {
+		knot_pkt_begin(answer, KNOT_AUTHORITY);
+	}
+
+	/* Put target rrset to ANSWER\AUTHORIRY as well as corresponding RRSIG */
+	int err = zi_rrset_put(z_import, answer, rr);
+	if (err != 0) {
+		goto cleanup;
+	}
+
+	if (!is_referral) {
+		knot_wire_set_aa(answer->wire);
+	} else {
+		/* Type is KNOT_RRTYPE_NS and owner is not equal to origin.
+		 * It will be "referral" answer and must contain delegation. */
+		err = zi_put_delegation(z_import, answer, rr);
+		if (err < 0) {
+			goto cleanup;
+		}
+	}
+
+	knot_pkt_begin(answer, KNOT_ADDITIONAL);
+
+	if (rrtype == KNOT_RRTYPE_NS) {
+		/* Try to find glue addresses. */
+		err = zi_put_glue(z_import, answer, rr);
+		if (err < 0) {
+			goto cleanup;
+		}
+	}
+
+	knot_wire_set_id(answer->wire, msgid);
+	answer->parsed = answer->size;
+	err = knot_pkt_parse(answer, 0);
+	if (err != KNOT_EOK) {
+		goto cleanup;
+	}
+
+	/* Importing doesn't imply communication with upstream at all.
+	 * "answer" contains pseudo-answer from upstream and must be successfully
+	 * validated in CONSUME stage. If not, something gone wrong. */
+	state = kr_resolve_consume(request, NULL, answer);
+
+cleanup:
+
+	knot_pkt_free(&query);
+	knot_pkt_free(&answer);
+	worker_task_finalize(task, state);
+	return state == (is_referral ? KR_STATE_PRODUCE : KR_STATE_DONE) ? 0 : -1;
+}
+
+/** @internal Create element in qr_rrsetlist_t rrset_list for
+ * given node of map_t rrset_sorted.  */
+static int zi_mapwalk_preprocess(const char *k, void *v, void *baton)
+{
+	zone_import_ctx_t *z_import = (zone_import_ctx_t *)baton;
+
+	int ret = array_push_mm(z_import->rrset_sorted, v, kr_memreserve, &z_import->pool);
+
+	return (ret < 0);
+}
+
+/** @internal Iterate over parsed rrsets and try to import each of them. */
+static void zi_zone_process(uv_timer_t* handle)
+{
+	zone_import_ctx_t *z_import = (zone_import_ctx_t *)handle->data;
+
+	assert(z_import->worker);
+
+	size_t failed = 0;
+	size_t ns_imported = 0;
+	size_t other_imported = 0;
+
+	/* At the moment import of root zone only is supported.
+	 * Check the name of the parsed zone.
+	 * TODO - implement importing of arbitrary zone. */
+	char zone_name_str[KNOT_DNAME_MAXLEN];
+	knot_dname_to_str(zone_name_str, z_import->origin, sizeof(zone_name_str));
+	if (strcmp(".", zone_name_str) != 0) {
+		kr_log_error("[zimport] unexpected zone name `%s` (root zone expected), fail\n",
+			     zone_name_str);
+		failed = 1;
+		goto finish;
+	}
+
+	if (z_import->rrset_sorted.len <= 0) {
+		VERBOSE_MSG(NULL, "zone is empty\n");
+		goto finish;
+	}
+
+	/* TA have been found, zone is secured.
+	 * DNSKEY must be somewhere amongst the imported records. Find it.
+	 * TODO - For those zones that provenly do not have TA this step must be skipped. */
+	char key[KR_RRKEY_LEN];
+	int err = kr_rrkey(key, KNOT_CLASS_IN, z_import->origin,
+			   KNOT_RRTYPE_DNSKEY, KNOT_RRTYPE_DNSKEY);
+	if (err <= 0) {
+		failed = 1;
+		goto finish;
+	}
+
+	knot_rrset_t *rr = map_get(&z_import->rrset_indexed, key);
+	if (!rr) {
+		/* DNSKEY MUST be here. If not found - fail. */
+		kr_log_error("[zimport] DNSKEY not found for `%s`, fail\n", zone_name_str);
+		failed = 1;
+		goto finish;
+	}
+	z_import->key = rr;
+
+	VERBOSE_MSG(NULL, "started: zone: '%s'\n", zone_name_str);
+
+	z_import->start_timestamp = kr_now();
+
+	/* Import DNSKEY at first step. If any validation problems will appear,
+	 * cancel import of whole zone. */
+	char qname_str[KNOT_DNAME_MAXLEN], type_str[16];
+	knot_dname_to_str(qname_str, rr->owner, sizeof(qname_str));
+	knot_rrtype_to_string(rr->type, type_str, sizeof(type_str));
+	VERBOSE_MSG(NULL, "importing: qname: '%s' type: '%s'\n",
+		    qname_str, type_str);
+
+	int res = zi_rrset_import(z_import, rr);
+	if (res != 0) {
+		VERBOSE_MSG(NULL, "import failed: qname: '%s' type: '%s'\n",
+			    qname_str, type_str);
+		failed = 1;
+		goto finish;
+	}
+
+	/* Import all NS records */
+	for (size_t i = 0; i < z_import->rrset_sorted.len; ++i) {
+		knot_rrset_t *rr = z_import->rrset_sorted.at[i];
+
+		if (rr->type != KNOT_RRTYPE_NS) {
+			continue;
+		}
+
+		knot_dname_to_str(qname_str, rr->owner, sizeof(qname_str));
+		knot_rrtype_to_string(rr->type, type_str, sizeof(type_str));
+		VERBOSE_MSG(NULL, "importing: qname: '%s' type: '%s'\n",
+			    qname_str, type_str);
+		int res = zi_rrset_import(z_import, rr);
+		if (res == 0) {
+			++ns_imported;
+		} else {
+			VERBOSE_MSG(NULL, "import failed: qname: '%s' type: '%s'\n",
+				    qname_str, type_str);
+			++failed;
+		}
+		z_import->rrset_sorted.at[i] = NULL;
+	}
+
+	/* NS records have been imported as well as relative DS, NSEC* and glue.
+	 * Now import what's left. */
+	for (size_t i = 0; i < z_import->rrset_sorted.len; ++i) {
+
+		knot_rrset_t *rr = z_import->rrset_sorted.at[i];
+		if (rr == NULL) {
+			continue;
+		}
+
+		if (zi_rrset_is_marked_as_imported(rr)) {
+			continue;
+		}
+
+		if (rr->type == KNOT_RRTYPE_DNSKEY || rr->type == KNOT_RRTYPE_RRSIG) {
+			continue;
+		}
+
+		knot_dname_to_str(qname_str, rr->owner, sizeof(qname_str));
+		knot_rrtype_to_string(rr->type, type_str, sizeof(type_str));
+		VERBOSE_MSG(NULL, "importing: qname: '%s' type: '%s'\n",
+			    qname_str, type_str);
+		res = zi_rrset_import(z_import, rr);
+		if (res == 0) {
+			++other_imported;
+		} else {
+			VERBOSE_MSG(NULL, "import failed: qname: '%s' type: '%s'\n",
+				    qname_str, type_str);
+			++failed;
+		}
+	}
+
+	uint64_t elapsed = kr_now() - z_import->start_timestamp;
+	elapsed = elapsed > UINT_MAX ? UINT_MAX : elapsed;
+
+	VERBOSE_MSG(NULL, "finished in %lu ms; zone: `%s`; ns: %zd; other: %zd; failed: %zd\n",
+		    elapsed, zone_name_str, ns_imported, other_imported, failed);
+
+finish:
+
+	uv_timer_stop(&z_import->timer);
+	z_import->started = false;
+
+	int import_state = 0;
+
+	if (failed != 0) {
+		if (ns_imported == 0 && other_imported == 0) {
+			import_state = -1;
+			VERBOSE_MSG(NULL, "import failed; zone `%s` \n", zone_name_str);
+		} else {
+			import_state = 1;
+		}
+	} else {
+		import_state = 0;
+	}
+
+	if (z_import->cb != NULL) {
+		z_import->cb(import_state, z_import->cb_param);
+	}
+}
+
+/** @internal Store rrset that has been imported to zone import context memory pool.
+ * @return -1 if failed; 0 if success. */
+static int zi_record_store(zs_scanner_t *s)
+{
+	if (s->r_data_length > UINT16_MAX) {
+		/* Due to knot_rrset_add_rdata(..., const uint16_t size, ...); */
+		kr_log_error("[zscanner] line %lu: rdata is too long\n", s->line_counter);
+		return -1;
+	}
+
+	if (knot_dname_size(s->r_owner) != strlen((const char *)(s->r_owner)) + 1) {
+		kr_log_error("[zscanner] line %lu: owner name contains zero byte, skip\n", s->line_counter);
+		return 0;
+	}
+
+	zone_import_ctx_t *z_import = (zone_import_ctx_t *)s->process.data;
+
+	knot_rrset_t *new_rr = knot_rrset_new(s->r_owner, s->r_type, s->r_class,
+					      &z_import->pool);
+	if (!new_rr) {
+		kr_log_error("[zscanner] line %lu: error creating rrset\n", s->line_counter);
+		return -1;
+	}
+	int res = knot_rrset_add_rdata(new_rr, s->r_data, s->r_data_length,
+				       s->r_ttl, &z_import->pool);
+	if (res != KNOT_EOK) {
+		kr_log_error("[zscanner] line %lu: error adding rdata to rrset\n", s->line_counter);
+		return -1;
+	}
+
+	/* Records in zone file may not be grouped by name and RR type.
+	 * Use map to create search key and
+	 * avoid ineffective searches across all the imported records. */
+	char key[KR_RRKEY_LEN];
+	uint16_t additional_key_field = kr_rrset_type_maysig(new_rr);
+
+	res = kr_rrkey(key, new_rr->rclass, new_rr->owner, new_rr->type,
+		       additional_key_field);
+	if (res <= 0) {
+		kr_log_error("[zscanner] line %lu: error constructing rrkey\n", s->line_counter);
+		return -1;
+	}
+
+	knot_rrset_t *saved_rr = map_get(&z_import->rrset_indexed, key);
+	if (saved_rr) {
+		res = knot_rdataset_merge(&saved_rr->rrs, &new_rr->rrs,
+					  &z_import->pool);
+	} else {
+		res = map_set(&z_import->rrset_indexed, key, new_rr);
+	}
+	if (res != 0) {
+		kr_log_error("[zscanner] line %lu: error saving parsed rrset\n", s->line_counter);
+		return -1;
+	}
+
+	return 0;
+}
+
+/** @internal zscanner callback. */
+static int zi_state_parsing(zs_scanner_t *s)
+{
+	while (zs_parse_record(s) == 0) {
+		switch (s->state) {
+		case ZS_STATE_DATA:
+			if (zi_record_store(s) != 0) {
+				return -1;
+			}
+			zone_import_ctx_t *z_import = (zone_import_ctx_t *) s->process.data;
+			if (z_import->origin == 0) {
+				z_import->origin = knot_dname_copy(s->zone_origin,
+								  &z_import->pool);
+			} else if (!knot_dname_is_equal(z_import->origin, s->zone_origin)) {
+				kr_log_error("[zscanner] line: %lu: zone origin changed unexpectedly\n",
+					     s->line_counter);
+				return -1;
+			}
+			break;
+		case ZS_STATE_ERROR:
+			kr_log_error("[zscanner] line: %lu: parse error; code: %i ('%s')\n",
+				     s->line_counter, s->error.code, zs_strerror(s->error.code));
+			return -1;
+		case ZS_STATE_INCLUDE:
+			kr_log_error("[zscanner] line: %lu: INCLUDE is not supported\n",
+				     s->line_counter);
+			return -1;
+		case ZS_STATE_EOF:
+		case ZS_STATE_STOP:
+			return (s->error.counter == 0) ? 0 : -1;
+		default:
+			kr_log_error("[zscanner] line: %lu: unexpected parse state: %i\n",
+				     s->line_counter, s->state);
+			return -1;
+		}
+	}
+
+	return -1;
+}
+
+int zi_zone_import(struct zone_import_ctx *z_import,
+		   const char *zone_file, const char *origin,
+		   uint16_t rclass, uint32_t ttl)
+{
+	assert (z_import != NULL && "[zimport] empty <z_import> parameter");
+	assert (z_import->worker != NULL && "[zimport] invalid <z_import> parameter\n");
+	assert (zone_file != NULL && "[zimport] empty <zone_file> parameter\n");
+
+	zs_scanner_t *s = malloc(sizeof(zs_scanner_t));
+	if (s == NULL) {
+		kr_log_error("[zscanner] error creating instance of zone scanner (malloc() fails)\n");
+		return -1;
+	}
+
+	/* zs_init(), zs_set_input_file(), zs_set_processing() returns -1 in case of error,
+	 * so don't print error code as it meaningless. */
+	int res = zs_init(s, origin, rclass, ttl);
+	if (res != 0) {
+		kr_log_error("[zscanner] error initializing zone scanner instance, error: %i (%s)\n",
+			     s->error.code, zs_strerror(s->error.code));
+		free(s);
+		return -1;
+	}
+
+	res = zs_set_input_file(s, zone_file);
+	if (res != 0) {
+		kr_log_error("[zscanner] error opening zone file `%s`, error: %i (%s)\n",
+			     zone_file, s->error.code, zs_strerror(s->error.code));
+		zs_deinit(s);
+		free(s);
+		return -1;
+	}
+
+	/* Don't set processing and error callbacks as we don't use automatic parsing.
+	 * Parsing as well error processing will be performed in zi_state_parsing().
+	 * Store pointer to zone import context for further use. */
+	if (zs_set_processing(s, NULL, NULL, (void *)z_import) != 0) {
+		kr_log_error("[zscanner] zs_set_processing() failed for zone file `%s`, "
+				"error: %i (%s)\n",
+				zone_file, s->error.code, zs_strerror(s->error.code));
+		zs_deinit(s);
+		free(s);
+		return -1;
+	}
+
+	uint64_t elapsed = 0;
+	int ret = zi_reset(z_import, 4096);
+	if (ret == 0) {
+		z_import->started = true;
+		z_import->start_timestamp = kr_now();
+		VERBOSE_MSG(NULL, "[zscanner] started; zone file `%s`\n",
+			    zone_file);
+		ret = zi_state_parsing(s);
+		/* Try to find TA for worker->z_import.origin. */
+		map_t *trust_anchors = &z_import->worker->engine->resolver.trust_anchors;
+		knot_rrset_t *rr = kr_ta_get(trust_anchors, z_import->origin);
+		if (rr) {
+			z_import->ta = rr;
+		} else {
+			/* For now - fail.
+			 * TODO - query DS and continue after answer had been obtained. */
+			char zone_name_str[KNOT_DNAME_MAXLEN];
+			knot_dname_to_str(zone_name_str, z_import->origin, sizeof(zone_name_str));
+			kr_log_error("[zimport] no TA found for `%s`, fail\n", zone_name_str);
+			ret = 1;
+		}
+		elapsed = kr_now() - z_import->start_timestamp;
+		elapsed = elapsed > UINT_MAX ? UINT_MAX : elapsed;
+	}
+	zs_deinit(s);
+	free(s);
+
+	if (ret != 0) {
+		kr_log_error("[zscanner] error parsing zone file `%s`\n", zone_file);
+		z_import->started = false;
+		return ret;
+	}
+
+	VERBOSE_MSG(NULL, "[zscanner] finished in %lu ms; zone file `%s`\n",
+			    elapsed, zone_file);
+	map_walk(&z_import->rrset_indexed, zi_mapwalk_preprocess, z_import);
+
+	/* Zone have been parsed already, so start the import. */
+	uv_timer_start(&z_import->timer, zi_zone_process,
+		       ZONE_IMPORT_PAUSE, ZONE_IMPORT_PAUSE);
+
+	return 0;
+}
+
+bool zi_import_started(struct zone_import_ctx *z_import)
+{
+	return z_import ? z_import->started : false;
+}
diff --git a/daemon/zimport.h b/daemon/zimport.h
new file mode 100644
index 0000000000000000000000000000000000000000..57b246e95bdc08925b2a3f453ba3c09f2c38ff74
--- /dev/null
+++ b/daemon/zimport.h
@@ -0,0 +1,68 @@
+/*  Copyright (C) 2018 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz>
+
+    This program is free software: you can redistribute it and/or modify
+    it under the terms of the GNU General Public License as published by
+    the Free Software Foundation, either version 3 of the License, or
+    (at your option) any later version.
+
+    This program is distributed in the hope that it will be useful,
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+    GNU General Public License for more details.
+
+    You should have received a copy of the GNU General Public License
+    along with this program.  If not, see <https://www.gnu.org/licenses/>.
+ */
+
+#pragma once
+
+#include <stdbool.h>
+
+struct worker_ctx;
+/** Zone import context (opaque).  */
+struct zone_import_ctx;
+
+/**
+ * Completion callback
+ *
+ * @param state -1 - fail
+ *               0 - success
+ *               1 - success, but there are non-critical errors
+ * @param pointer to user data
+ */
+typedef void (*zi_callback)(int state, void *param);
+
+/**
+ * Allocate and initialize zone import context.
+ *
+ * @param worker pointer to worker state
+ * @return NULL or pointer to zone import context.
+ */
+struct zone_import_ctx *zi_allocate(struct worker_ctx *worker,
+				    zi_callback cb, void *param);
+
+/** Free zone import context. */
+void zi_free(struct zone_import_ctx *z_import);
+
+/**
+ * Import zone from file.
+ *
+ * @note only root zone import is supported; origin must be NULL or "."
+ * @param z_import pointer to zone import context
+ * @param zone_file zone file name
+ * @param origin default origin
+ * @param rclass default class
+ * @param ttl    default ttl
+ * @return 0 or an error code
+ */
+int zi_zone_import(struct zone_import_ctx *z_import,
+		   const char *zone_file, const char *origin,
+		   uint16_t rclass, uint32_t ttl);
+
+/**
+ * Check if import already in process.
+ *
+ * @param z_import pointer to zone import context.
+ * @return true if import already in process; false otherwise.
+ */
+bool zi_import_started(struct zone_import_ctx *z_import);
diff --git a/doc/modules.rst b/doc/modules.rst
index f109b3c8850b28f7fd42fb5e4592a5629013a198..1d4491f0e25c7c6b2d3d38a5e5b9d635cae1f6e2 100644
--- a/doc/modules.rst
+++ b/doc/modules.rst
@@ -31,3 +31,4 @@ Knot DNS Resolver modules
 .. include:: ../modules/serve_stale/README.rst
 .. include:: ../modules/detect_time_skew/README.rst
 .. include:: ../modules/detect_time_jump/README.rst
+.. include:: ../modules/prefill/README.rst
diff --git a/lib/generic/array.h b/lib/generic/array.h
index fb10c0cd13462aa36192223efb5115f629fbc480..ece4dd147667162ecd412db00e7b37c4f1a2b855 100644
--- a/lib/generic/array.h
+++ b/lib/generic/array.h
@@ -124,14 +124,6 @@ static inline void array_std_free(void *baton, void *p)
 #define array_reserve_mm(array, n, reserve, baton) \
 	(reserve)((baton), (char **) &(array).at, sizeof((array).at[0]), (n), &(array).cap)
 
-/**
- * Push value at the end of the array, resize it if necessary (plain malloc/free).
- * @note May fail if the capacity is not reserved.
- * @return element index on success, <0 on failure
- */
-#define array_push(array, val) \
-	array_push_mm(array, val, array_std_reserve, NULL)
-
 /**
  * Push value at the end of the array, resize it if necessary.
  * Mempool usage: pass kr_memreserve and a knot_mm_t* .
@@ -143,6 +135,14 @@ static inline void array_std_free(void *baton, void *p)
 		: (array_reserve_mm(array, ((array).cap + 1), reserve, baton) < 0 ? -1 \
 			: ((array).at[(array).len] = val, (array).len++)))
 
+/**
+ * Push value at the end of the array, resize it if necessary (plain malloc/free).
+ * @note May fail if the capacity is not reserved.
+ * @return element index on success, <0 on failure
+ */
+#define array_push(array, val) \
+	array_push_mm(array, val, array_std_reserve, NULL)
+
 /**
  * Pop value from the end of the array.
  */
diff --git a/lib/utils.c b/lib/utils.c
index 922ac3a9b1cb9b2624223dae17f87686da458a71..9a60b4356f80f2f2054bc196a6f9f4d85b4e8ff3 100644
--- a/lib/utils.c
+++ b/lib/utils.c
@@ -581,21 +581,33 @@ int kr_bitcmp(const char *a, const char *b, int bits)
 	return ret;
 }
 
-int kr_rrkey(char *key, const knot_dname_t *owner, uint16_t type, uint8_t rank)
+int kr_rrkey(char *key, uint16_t class, const knot_dname_t *owner,
+	     uint16_t type, uint16_t additional)
 {
 	if (!key || !owner) {
 		return kr_error(EINVAL);
 	}
-	key[0] = (rank << 2) | 0x01; /* Must be non-zero */
-	uint8_t *key_buf = (uint8_t *)key + 1;
-	int ret = knot_dname_to_wire(key_buf, owner, KNOT_DNAME_MAXLEN);
+	uint8_t *key_buf = (uint8_t *)key;
+	int ret = u16tostr(key_buf, class);
+	if (ret <= 0) {
+		return ret;
+	}
+	key_buf += ret;
+	ret = knot_dname_to_wire(key_buf, owner, KNOT_DNAME_MAXLEN);
 	if (ret <= 0) {
 		return ret;
 	}
 	knot_dname_to_lower(key_buf);
 	key_buf += ret - 1;
-	/* Must convert to string, as the key must not contain 0x00 */
 	ret = u16tostr(key_buf, type);
+	if (ret <= 0) {
+		return ret;
+	}
+	key_buf += ret;
+	ret = u16tostr(key_buf, additional);
+	if (ret <= 0) {
+		return ret;
+	}
 	key_buf[ret] = '\0';
 	return (char *)&key_buf[ret] - key;
 }
diff --git a/lib/utils.h b/lib/utils.h
index 306830cae6699a8fed3c07fb266b1921f21e65e2..e47ee7aee36227341c36f5aa081e371e2581a1d1 100644
--- a/lib/utils.h
+++ b/lib/utils.h
@@ -286,17 +286,20 @@ static inline uint8_t KEY_FLAG_RANK(const char *key)
 static inline bool KEY_COVERING_RRSIG(const char *key)
 	{ return ((uint8_t)(key[0])) & KEY_FLAG_RRSIG; }
 
-/* Stash key = {[1] flags, [1-255] owner, [5] type, [1] \x00 } */
-#define KR_RRKEY_LEN (9 + KNOT_DNAME_MAXLEN)
+/* Stash key = {[5] class, [1-255] owner, [5] type, [5] additional, [1] \x00 } */
+#define KR_RRKEY_LEN (16 + KNOT_DNAME_MAXLEN)
 /** Create unique null-terminated string key for RR.
   * @param key Destination buffer for key size, MUST be KR_RRKEY_LEN or larger.
-  * @param owner RR owner domain name.
+  * @param class RR class.
+  * @param owner RR owner name.
   * @param type RR type.
-  * @param rank RR rank (8 bit tag usable for anything).
+  * @param additional flags (for instance can be used for storing covered type
+  *	   when RR type is RRSIG).
   * @return key length if successful or an error
   * */
 KR_EXPORT
-int kr_rrkey(char *key, const knot_dname_t *owner, uint16_t type, uint8_t rank);
+int kr_rrkey(char *key, uint16_t class, const knot_dname_t *owner,
+	     uint16_t type, uint16_t additional);
 
 /** @internal Add RRSet copy to ranked RR array. */
 KR_EXPORT
diff --git a/modules/modules.mk b/modules/modules.mk
index 864058f679bfcd2271e4ad501462a96b9060d868..e4e5f9268bba84247180ecd8b0dfa025002be610 100644
--- a/modules/modules.mk
+++ b/modules/modules.mk
@@ -38,7 +38,8 @@ modules_TARGETS += etcd \
                    priming \
                    serve_stale \
                    detect_time_skew \
-                   detect_time_jump
+                   detect_time_jump \
+                   prefill
 endif
 
 # Make C module
diff --git a/modules/prefill/README.rst b/modules/prefill/README.rst
new file mode 100644
index 0000000000000000000000000000000000000000..678e9f2d51113084b638d73d77914fe9daea9095
--- /dev/null
+++ b/modules/prefill/README.rst
@@ -0,0 +1,39 @@
+Cache prefilling
+----------------
+
+This module provides ability to periodically prefill DNS cache by importing root zone data obtained over HTTPS.
+
+Intended users of this module are big resolver operators which will benefit from decreased latencies and smaller amount of traffic towards DNS root servets.
+
+Example configuration is:
+
+.. code-block:: lua
+
+	modules.load('prefill')
+	prefill.config({
+              ['.'] = {
+                      url = 'https://www.internic.net/domain/root.zone',
+                      ca_file = '/etc/pki/tls/certs/ca-bundle.crt',
+                      interval = 86400  -- seconds
+              }
+        })
+
+This configuration downloads zone file from URL `https://www.internic.net/domain/root.zone` and imports it into cache every 86400 seconds (1 day). The HTTPS connection is authenticated using CA certificate from file `/etc/pki/tls/certs/ca-bundle.crt` and signed zone content is validated using DNSSEC.
+
+Root zone to import must be signed using DNSSEC and the resolver must have valid DNSSEC configuration. (For further details please see :ref:`enabling-dnssec`.)
+
+.. csv-table::
+ :header: "Parameter", "Description"
+
+ "ca_file", "path to CA certificate bundle used to authenticate the HTTPS connection"
+ "interval", "number of seconds between zone data refresh attempts"
+ "url", "URL of a file in :rfc:`1035` zone file format"
+
+Only root zone import is supported at the moment.
+
+Dependencies
+^^^^^^^^^^^^
+
+Depends on the luasec_ library.
+
+.. _luasec: https://luarocks.org/modules/brunoos/luasec
diff --git a/modules/prefill/prefill.lua b/modules/prefill/prefill.lua
new file mode 100644
index 0000000000000000000000000000000000000000..d1c372e80fa9973de73568f9124e3324d509eb9b
--- /dev/null
+++ b/modules/prefill/prefill.lua
@@ -0,0 +1,211 @@
+local https = require('ssl.https')
+local ltn12 = require('ltn12')
+local lfs = require('lfs')
+
+local rz_url = "https://www.internic.net/domain/root.zone"
+local rz_local_fname = "root.zone"
+local rz_ca_file = nil
+local rz_event_id = nil
+
+local rz_default_interval = 86400
+local rz_https_fail_interval = 600
+local rz_no_ta_interval = 600
+local rz_cur_interval = rz_default_interval
+local rz_interval_randomizator_limit = 10
+local rz_interval_threshold = 5
+local rz_interval_min = 3600
+
+local prefill = {
+}
+
+
+-- Fetch over HTTPS with peert cert checked
+local function https_fetch(url, ca_file)
+	assert(string.match(url, '^https://'))
+	assert(ca_file)
+
+	local resp = {}
+	local r, c = https.request{
+	       url = url,
+	       verify = {'peer', 'fail_if_no_peer_cert' },
+	       cafile = ca_file,
+	       protocol = 'tlsv1_2',
+	       sink = ltn12.sink.table(resp),
+	}
+	if r == nil then
+		return r, c
+	end
+	return resp, "[prefill] "..url.." downloaded"
+end
+
+-- Write zone to a file
+local function zone_write(zone, fname)
+	local file, errmsg = io.open(fname, 'w')
+	if not file then
+		error(string.format("[prefill] unable to open file %s (%s)",
+			fname, errmsg))
+	end
+	for i = 1, #zone do
+		local zone_chunk = zone[i]
+		file:write(zone_chunk)
+	end
+	file:close()
+end
+
+local function display_delay(time)
+	local days = math.floor(time / 86400)
+	local hours = math.floor((time % 86400) / 3600)
+	local minutes = math.floor((time % 3600) / 60)
+	local seconds = math.floor(time % 60)
+	if days > 0 then
+		return string.format("%d days %02d hours", days, hours)
+	elseif hours > 0 then
+		return string.format("%02d hours %02d minutes", hours, minutes)
+	elseif minutes > 0 then
+		return string.format("%02d minutes %02d seconds", minutes, seconds)
+	end
+	return string.format("%02d seconds", seconds)
+end
+
+-- returns: number of seconds the file is valid for
+-- 0 indicates immediate download
+local function get_file_ttl(fname)
+	local attrs = lfs.attributes(fname)
+	if attrs then
+		local age = os.time() - attrs.modification
+		return math.max(
+			rz_cur_interval - age,
+			0)
+	else
+		return 0  -- file does not exist, download now
+	end
+end
+
+local function download(url, fname)
+	log("[prefill] downloading root zone...")
+	local rzone, err = https_fetch(url, rz_ca_file)
+	if rzone == nil then
+		error(string.format("[prefill] fetch of `%s` failed: %s", url, err))
+	end
+
+	log("[prefill] saving root zone...")
+	zone_write(rzone, fname)
+end
+
+local function import(fname)
+	local res = cache.zone_import(fname)
+	if res.code == 1 then -- no TA found, wait
+		error("[prefill] no trust anchor found for root zone, import aborted")
+	elseif res.code == 0 then
+		log("[prefill] root zone successfully parsed, import started")
+	else
+		error(string.format("[prefill] root zone import failed (%s)", res.msg))
+	end
+end
+
+local function timer()
+	local file_ttl = get_file_ttl(rz_local_fname)
+
+	if file_ttl > rz_interval_threshold then
+		log("[prefill] root zone file valid for %s, reusing data from disk",
+			display_delay(file_ttl))
+	else
+		local ok, errmsg = pcall(download, rz_url, rz_local_fname)
+		if not ok then
+			rz_cur_interval = rz_https_fail_interval
+						- math.random(rz_interval_randomizator_limit)
+			log("[prefill] cannot download new zone (%s), "
+				.. "will retry root zone download in %s",
+				errmsg, display_delay(rz_cur_interval))
+			event.reschedule(rz_event_id, rz_cur_interval * sec)
+			return
+		end
+		file_ttl = rz_default_interval
+	end
+	-- file is up to date, import
+	-- import/filter function gets executed after resolver/module
+	local ok, errmsg = pcall(import, rz_local_fname)
+	if not ok then
+		rz_cur_interval = rz_no_ta_interval
+					- math.random(rz_interval_randomizator_limit)
+		log("[prefill] root zone import failed (%s), retry in %s",
+			errmsg, display_delay(rz_cur_interval))
+	else
+		-- re-download before TTL expires
+		rz_cur_interval = (file_ttl - rz_interval_threshold
+					- math.random(rz_interval_randomizator_limit))
+		log("[prefill] root zone refresh in %s",
+			display_delay(rz_cur_interval))
+	end
+	event.reschedule(rz_event_id, rz_cur_interval * sec)
+end
+
+function prefill.init()
+	math.randomseed(os.time())
+end
+
+function prefill.deinit()
+	if rz_event_id then
+		event.cancel(rz_event_id)
+		rz_event_id = nil
+	end
+end
+
+-- process one item from configuration table
+-- right now it supports only root zone because
+-- prefill module uses global variables
+local function config_zone(zone_cfg)
+	if zone_cfg.interval then
+		zone_cfg.interval = tonumber(zone_cfg.interval)
+		if zone_cfg.interval < rz_interval_min then
+			error(string.format('[prefill] refresh interval %d s is too short, '
+				.. 'minimal interval is %d s',
+				zone_cfg.interval, rz_interval_min))
+		end
+		rz_default_interval = zone_cfg.interval
+		rz_cur_interval = zone_cfg.interval
+	end
+
+	if not zone_cfg.ca_file then
+		error('[prefill] option ca_file must point '
+			.. 'to a directory with CA certificates in PEM format')
+	else
+		local _, dir_obj = lfs.dir(zone_cfg.ca_file)
+		dir_obj:close()
+	end
+	rz_ca_file = zone_cfg.ca_file
+
+	if not zone_cfg.url or not string.match(zone_cfg.url, '^https://') then
+		error('[prefill] option url must contain a '
+			.. 'https:// URL of a zone file')
+	else
+		rz_url = zone_cfg.url
+	end
+end
+
+function prefill.config(config)
+	local root_configured = false
+	if not config or type(config) ~= 'table' then
+		error('[prefill] configuration must be in table '
+			.. '{owner name = {per-zone config}}')
+	end
+	for owner, zone_cfg in pairs(config) do
+		if owner ~= '.' then
+			error('[prefill] only root zone can be imported '
+				.. 'at the moment')
+		else
+			config_zone(zone_cfg)
+			root_configured = true
+		end
+	end
+	if not root_configured then
+		error('[prefill] this module version requires configuration '
+			.. 'for root zone')
+	end
+
+	-- ability to change intervals
+	prefill.deinit()
+	rz_event_id = event.after(0, timer)
+end
+
+return prefill
diff --git a/modules/prefill/prefill.mk b/modules/prefill/prefill.mk
new file mode 100644
index 0000000000000000000000000000000000000000..7b10ba9ec9e9146af9dc1b12263031e1c43e8e91
--- /dev/null
+++ b/modules/prefill/prefill.mk
@@ -0,0 +1,2 @@
+prefill_SOURCES := prefill.lua
+$(call make_lua_module,prefill)