Skip to content

Conversation

@gunnim
Copy link

@gunnim gunnim commented Dec 14, 2025

Core impetus for PR is clarify what I saw as a missing step when creating your CAA records, the mapping from issuer name to issuer domain name. Am also hoping it might be useful to clarify where DNSSEC/CAA do not help.

@Raiders0786

@vercel
Copy link

vercel bot commented Dec 14, 2025

Someone is attempting to deploy a commit to the Security Alliance Team on Vercel.

A member of the Team first needs to authorize it.

@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from 324a009 to d64f54a Compare December 14, 2025 18:38
@scode2277
Copy link
Collaborator

Thanks for the contribution @gunnim!

While the steward of the Domain and DNS Security, @Raiders0786, reviews the content added, I need to ask you to follow this guide about how to sign unverified commits as this PR can't be merged if all the commits are not verified. The guide assumes that the user following it has a signing key.

Thanks :)

@scode2277 scode2277 mentioned this pull request Dec 16, 2025
@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from d64f54a to 54c36e6 Compare December 16, 2025 19:13
@vercel
Copy link

vercel bot commented Dec 17, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
frameworks Ready Ready Preview, Comment Dec 17, 2025 11:30am

@scode2277 scode2277 added the content:add This issue or PR adds content or suggests to label Dec 17, 2025
Copy link
Collaborator

@mattaereal mattaereal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the additions are useful! Can you just update the claim of the security issues? You can add the most prominent ones, in case you want to provide more information about them. The rest is a minor thing

Certificate Authority Authorization (CAA) records specify which Certificate Authorities (CAs) are allowed to issue SSL certificates for your domain. This prevents unauthorized certificate issuance, which attackers could use to create fake SSL certificates for your domain.

**How it protects you**: Without CAA records, any Certificate Authority can issue SSL certificates for your domain. Attackers could potentially obtain fake certificates and use them in sophisticated phishing attacks that appear to have valid SSL encryption.
With CAA records for a given domain in place, if a CA receives a certificate request for that domain it will deny that request except in the event of a fully compromised CA (Last big CA security issue was Symantec around 2015).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the biggest issue with a tool regarding CAs was CVE-2025-44005, this year

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mattaereal what I was attempting to highlight is when CAA records don't help. In your example and f.x. for https://www.sans.org/newsletters/newsbites/xxvii-32 I think it's reasonable to assume that CAA would in fact help as they were not fully compromised.

I've pushed a further clarification that I hope is more useful

@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from f0a3ef7 to a146131 Compare December 18, 2025 14:59
@gunnim gunnim requested a review from mattaereal December 27, 2025 17:53
@Raiders0786
Copy link
Contributor

I've commented feedback and changes above—are you able to see them, @gunnim ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

content:add This issue or PR adds content or suggests to

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants