June 2018
Intermediate to advanced
368 pages
11h 1m
English
The Certification Authority Authorization (CAA) RR specifies a mechanism in the DNS to assert which CAs are valid ones to issue any TLS certificates on that domain (think of it as akin to an SPF for TLS certs).
This is a relatively new RR, but CAB (CA Browsers Forum) recently made CAA checks mandatory for CA issuers. What this means is that when CAs receive a request to issue a cert, they will start checking DNS zones for CAA RRs and if they exist, abide by the policy they encode. Said policy is transmitted via the CAA record.
CAA RRs are supported as of BIND 9.10.1, PowerDNS 4.0, NSD 4.0.1, and Knot DNS 2.2.0.
Here is the CAA RR syntax:
<owner-name> IN CAA <flag> <tag> <value>
Read now
Unlock full access