Skip to content

Commit 6657ce7

Browse files
[SSL] Add multiple perspective CAA to DCV troubleshooting (#25388)
* [SSL] Update troubleshooting.mdx PCX-19339 * Adjust line breaks and add missing periods --------- Co-authored-by: Rebecca Tamachiro <[email protected]>
1 parent 3bb6243 commit 6657ce7

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

src/content/docs/ssl/edge-certificates/changing-dcv-method/troubleshooting.mdx

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,13 +45,14 @@ When using [Redirect Rules](/rules/url-forwarding/single-redirects/) the `/.well
4545

4646
The errors below refer to situations that have to be addressed at the authoritative DNS provider:
4747

48-
- `the Certificate Authority had trouble performing a DNS lookup: dns problem: looking up caa for nsheiapp.codeacloud.com: dnssec: bogus`
48+
- `the Certificate Authority had trouble performing a DNS lookup: dns problem: looking up caa for <hostname>: dnssec: bogus`
4949
- `Certificate authority encountered a SERVFAIL during DNS lookup, please check your DNS reachability.`
5050

5151
Consider the following when troubleshooting:
5252

5353
- [DNSSEC](https://www.cloudflare.com/learning/dns/dns-security/) must be configured correctly. You can use [DNSViz](https://dnsviz.net/) to understand and troubleshoot the deployment of DNSSEC.
5454
- Your [CAA records](/ssl/edge-certificates/caa-records/) should allow Cloudflare's partner [certificate authorities (CAs)](/ssl/reference/certificate-authorities/) to issue certificates on your behalf.
55+
- Your [CAA records](/ssl/edge-certificates/caa-records/) must be resolvable from all locations.
5556
- The HTTP verification process is done preferably over **IPv6**, so if any AAAA record exists and does not point to the same dual-stack location as the A record, the validation will fail.
5657
- If an [NS record](/dns/manage-dns-records/reference/dns-record-types/#ns) is present for the hostname or its parent, DNS resolution will be managed externally by the DNS provider defined in the NS target. In this case, you must either add the DCV TXT record at the external DNS provider, or remove the NS record at Cloudflare.
5758

@@ -61,6 +62,15 @@ Consider the following when troubleshooting:
6162

6263
<Render file="error-rate-limiting" product="ssl" />
6364

65+
### Multiple perspective CAA check error
66+
67+
The error `Certificate authority encountered a multiple perspective CAA check error, please ensure your DNS is configured to allow CAA queries` means that the CA was not able to resolve the CAA records related to your domain from specific geographic locations.
68+
69+
You can investigate for resolution error using the [ping.pe tool](https://dig.ping.pe/).
70+
For example, for a [Google Trust Services](/ssl/reference/certificate-authorities/#google-trust-services) certificate encountering this issue, you can check for: `<hostname>:CAA:8.8.8.8`.
71+
72+
Read more from Certificate Authorities specific documentation: [SSL.com](https://www.ssl.com/blogs/multi-perspective-issuance-corroboration-mpic-arrives/), [Let's Encrypt](https://letsencrypt.org/2020/02/19/multi-perspective-validation), and [Google Trust Services](https://pki.goog/faq/#faq-mpic).
73+
6474
### Internal errors
6575

6676
When the certificate authority finds an issue during the CA check portion of the [DCV flow](/ssl/edge-certificates/changing-dcv-method/dcv-flow/), you may see a `Internal error with Certificate Authority` message. In this case, either wait or try a different certificate authority.

0 commit comments

Comments
 (0)