Site icon

The Complete Guide to CAA Records

CAA Record

This is the ninth installment In the of a ten-part series outlining the ten most common Domain Name System (DNS) Records.  In this article I will examine CAA Records, or Certification Authority Authorization.  Find links below to the previous articles below:

What is a CAA Record?

Certification Authority Authorization (CAA) records allow domain owners to indicate to certificate authorities they are authorized to issue digital certificates for a particular domain name.  If no CAA record is present, any Certificate Authority is allowed to issue a certificate for the domain. If a CAA record is present, only the CAs listed in the record(s) are allowed to issue certificates for that hostname.  CAA Records are goverened by RFC 6844.  This RFC Authored by Phillip Halam-Baker and Rob Stradling, and further improved upon by the PKIX Working Group.  CAA Records must be honored by CAs effective September 2017.

What is a Certificate Authority?

A certificate authority or certification authority is a trusted third party that issues cryptographic certificates.  

Common uses of CAA Record

Why Use a CAA?

CAs validate domains to make sure every Secured Sockets Layer (SSL) or Transport Layer Security (TLS) certificate request is authorized.  SSL/TLS is a standard security technology that enabled encrypted communication between a web browser and a web server. SSL is used to encrypt payment and other private information.  CA’s place a file on websites that proves the requester controls that site. However, a hacker could gain control of the website allowing them to use that site’s SSL/TLS certificate for mischief and criminal behavior.  To be clear, a SSL certificate only confirms that the certificate owner owns the website, not that the website can be trusted by users.

The Problem CAA REcords solve

There are thousands of Certificate Authorities trusted in today’s computer applications, any one of these CAs can issue a valid SSL certificate for any website.  Many CAs have subordinate CAs or resellers that can also issue certificates for most websites. In order for the internet to remain secure, CAs must first protect their own infrastructure against hackers while enforcing domain ownership checks before issuing certificates.  Doing both of these things has proven impossible in the past.

The Solution provided by CAA Records

CAA blocks exploitation of websites by defining which CAs are allowed to issue certificates for a domain.  If your website is hacked, having a CAA in place will reduce the likelihood that credit card numbers, usernames, passwords, email addresses and other personal identifying information will be compromised. 

How CAA Records Work

Certificate Authorities perform a lookup for CAA resource records, and if any are found, confirm they are listed as an authorized party before issuing a digital certificate.  CAs who are not authorized to issue certificates are not allowed to.  If you want to see who has issued a certificate on your website, go to crt.sh and enter your domain name.

The Downside of CAA Records

There are two vulnerabilities:

  1. Certificate Authorities without strong controls could still issue your website a certificate, which could then be compromised and used nefariously.
  2. If a login to your DNS provider is compromised, then hackers then control the CAA Records.  Use strong passwords and multi-factor authentication to prevent this. You can read more about how to prevent your domains from being compromised here.

How to Add CAA Record

To add a CAA Record, log into the DNS provider of your website and select the equivalent to Manage DNS and select Add Record. Below is an image for adding an CAA record on a domain I own through GoDaddy.  Beneath the image, I have defined each term, and also given the limitations and requirements of each field.

Once you fill out the form, select Save and your CAA has been added.  An example SAA Record in text may look something like this:

jasonofflorida.com.  IN  CAA 0 issue "symantec.com"

If you received some added value from my post, please like and follow us on Facebook, Twitter, and LinkedIn, or subscribe to jasonofflorida.com.  Next in the DNS Records Series I will discuss the ALIAS Record.

Exit mobile version