since 1999


3 minutes estimated reading time.

Security Quick-Wins: Use DNS CAA records to avoid fraudulent certificates

Brandon Dees

It’s ordinarily possible for a CA to sign a certificate for your domain without properly validating it. We essentially have to trust them to take security seriously and to not make mistakes in their process.

Unfortunately, this has been happening with frightening frequency among major CAs around the world, and user agents can’t immediately distrust some of those CAs because it would break too many legitimate websites for users. This can enable man-in-the-middle atttacks and other nefarious hijinks.

DNS CAA records are just a special DNS entry that lists which certificate authorities are authorized to sign certs for your domain, and they’re honored when present. This system provides standard and easy way for your site to specify to CAs whether they are authorized to issue a cert for your domain. Respecting this directive is now actually mandatory among legitimate public certificate authorities, as of , so it’s worth using for all websites considering how trivial it is to enable, even if it can’t provide a perfect guarantee against fraudulent certificate issuance.

For most sites under most circumstances, there should only be one CA at a time being used to sign certificates for a given web domain, but it’s possible to authorize multiple CAs if appropriate. It’s also possible to use CAA to authorize NO CAs, to prevent unintended issuance of any certs at all, which could be used as further hardening technique whenever your existing certs are still valid and no new certificates are expected.

To enable CAA for your domain, simply add an appropriate CAA record to your domain’s DNS. A typical example should look something like 0 issue "". Here’s what the output from dig caa currently looks like for our site:

$ dig caa

; <<>> DiG 9.10.6 <<>> caa
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7348
;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1

; EDNS: version: 0, flags:; udp: 512
;                    IN      CAA

;; ANSWER SECTION:             300     IN      CAA     0 issuewild ""             300     IN      CAA     0 issuewild ""             300     IN      CAA     0 issuewild ""             300     IN      CAA     0 issue ""             300     IN      CAA     0 issue ""             300     IN      CAA     0 issue ""             300     IN      CAA     0 issue ""

;; Query time: 57 msec
;; SERVER: 2601:483:4a80:1800::1#53(2601:483:4a80:1800::1)
;; WHEN: Mon Jul 23 15:33:59 CDT 2018
;; MSG SIZE  rcvd: 275

We added an entry for Let’s Encrypt manually and Cloudflare auto-configured the rest for us to support their automated TLS management.

Before executing this change, I recommend reading up a little more about the specific options available. The Wikipedia article on DNS Certificate Authority Authorization is a reasonable starting point in my opinion. Adding and verifying the DNS entry should be fairly trivial for most sites, as seen in my example above, and shoudn’t be too tricky to plan correctly even for sites with more specialized requirements such as supporting multiple authorities or wildcard certs.