You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DNSSEC (DNS Security Extensions) provides cryptographic authentication of DNS responses, preventing attackers from redirecting your users to malicious sites by tampering with DNS queries. Think of it as a digital signature that proves the DNS response came from the legitimate source.
26
26
27
27
**How it protects you**: Without DNSSEC, attackers can intercept DNS queries and return fake IP addresses, redirecting users to malicious sites that look identical to yours. DNSSEC prevents this by cryptographically signing all DNS responses.
28
+
While most client devices and many recursive resolvers do not perform DNSSEC validation on general DNS queries, DNSSEC is sometimes required and often preferred as a foundational component for security-sensitive internet protocols and features such as SMTP DANE, SSHFP, and CAA.
28
29
29
30
**Preconditions**:
30
31
- Domain is using the provider's nameservers
@@ -86,6 +87,7 @@ DNSSEC (DNS Security Extensions) provides cryptographic authentication of DNS re
86
87
Certificate Authority Authorization (CAA) records specify which Certificate Authorities (CAs) are allowed to issue SSL certificates for your domain. This prevents unauthorized certificate issuance, which attackers could use to create fake SSL certificates for your domain.
87
88
88
89
**How it protects you**: Without CAA records, any Certificate Authority can issue SSL certificates for your domain. Attackers could potentially obtain fake certificates and use them in sophisticated phishing attacks that appear to have valid SSL encryption.
90
+
With CAA records for a given domain in place, if a CA receives a certificate request for that domain it will deny that request except in the event of a fully compromised CA (Last big CA security issue was Symantec around 2015).
89
91
90
92
Before setting CAA records, identify which CA issued your current certificate:
@@ -94,6 +96,9 @@ Before setting CAA records, identify which CA issued your current certificate:
94
96
95
97
**Setup process**: Add CAA records to your DNS zone. Most DNS providers allow you to add these through their web interface:
96
98
99
+
With the issuers full name in hand we now need to map it to the "Issuer Domain Name".
100
+
There is no centralized repository mapping public CA's to their issuer domain names but they are generally easily found with a simple search for f.x. "Let's Encrypt CAA".
0 commit comments