28 September 2017
Bulletproof TLS Newsletter is a free periodic newsletter bringing you commentary and news surrounding SSL/TLS and Internet PKI, designed to keep you informed about the latest developments in this space. Received monthly by more than 50,000 subscribers. Written by Hanno Böck.
A new DNS record type should improve the security of certificate issuance. Certificate Authority Authorization (CAA) was specified in RFC 6844 in 2013, but until recently implementing it wasn’t required. That has now changed. The CA/Browser Forum has decided that starting September 8, all certificate authorities must check CAA. CAA allows domain owners to define in a DNS record which certificate authorities are allowed to issue certificates for them.
Shortly after the deadline, various people tried to verify whether certificate authorities properly check CAA. It was revealed that Comodo—the company that invented CAA—failed to check CAA records, and this was independently verified by various people. In an incident report, Comodo confirmed the issue and explained that it was due to an error in the interaction with the dig command.
Various other CAs failed to properly handle corner cases with CAA, particularly in combination with DNSSEC.
Andrew Ayer has created a CAA test suite. He also operates a CAA record generator for the company SSLMate.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.