SlideShare a Scribd company logo
© Men & Mice http://menandmice.com
DNS Certification Authority
Authorization (CAA) 

Resource Record
what will change in September?
1
© Men & Mice http://menandmice.com
Agenda
1. Brief overview on the CAA record
2. How CAA is used
3. CAA mandatory from September 2017
4. Detail look on CAA
1. ISSUE and ISSUEWILD
2. IODEF - Reporting misuse
3. The flags
4. Custom CAA values
5. Hierarchical CAA
5. Deploying CAA
2
© Men & Mice http://menandmice.com
a brief overview of the CAA
record
3
© Men & Mice http://menandmice.com
CAA record
• the CAA (Certification Authority Authorization) record
whitelists one or more certification authorities (CA) to
issue x509 certificates (SSL/TLS, HTTPS etc) for a
specific domain
• starting from September 2017, CAs with a root
certificate in one of the major web-browsers must
check for the CAA record and must follow the content
of CAA when issuing new certificates
• the CAA record is defined in

RFC 6844 - https://datatracker.ietf.org/doc/rfc6844/
4
© Men & Mice http://menandmice.com
certificate request w/o CAA
5
Client generates a keypair
certificate signing request
send to CA
Client CA A
Web-
Server
example.com
DNS-
Server
© Men & Mice http://menandmice.com
certificate request w/o CAA
6
CA-signed public key
(aka certificate)
Client
Web-
Server
example.com
DNS-
Server
CA A
© Men & Mice http://menandmice.com
certificate request w/o CAA
7
x509 certificate
deployed on
web-server
Client
Web-
Server
example.com
DNS-
Server
CA A
© Men & Mice http://menandmice.com
certificate mis-issue
8
© Men & Mice http://menandmice.com
certificate request w/o CAA
9
certificate signing request
send to CA
Client
DNS-
Server
malicious
actorWeb-
Server
example.com
Client generates a keypair
for example.com
CA B
© Men & Mice http://menandmice.com
certificate request w/o CAA
10
Client
DNS-
Server
malicious
actorWeb-
Server
example.com
CA-signed public key
(aka certificate)
CA B
© Men & Mice http://menandmice.com
certificate request with CAA
11
© Men & Mice http://menandmice.com
certificate request with CAA
12
Client generates a keypair
certificate signing request
send to CA
Client CA A
Web-
Server
example.com
DNS-
Server
© Men & Mice http://menandmice.com
certificate request with CAA
13
fetch CAA record
Client CA A
Web-
Server
example.com
DNS-
Server
© Men & Mice http://menandmice.com
certificate request with CAA
14
fetch CAA record
Client CA A
Web-
Server
example.com
DNS-
Server
check CAA
record
content
© Men & Mice http://menandmice.com
certificate request with CAA
15
CA-signed public key
(aka certificate)
Client CA A
Web-
Server
example.com
DNS-
Server
© Men & Mice http://menandmice.com
certificate request with CAA
16
x509 certificate
deployed on
web-server
Client CA A
Web-
Server
example.com
DNS-
Server
© Men & Mice http://menandmice.com
certificate mis-issue 

(prevented by CAA)
17
© Men & Mice http://menandmice.com
certificate request with CAA
18
certificate signing request
send to CA
Client CA B
DNS-
Server
malicious
actorWeb-
Server
example.com
Client generates a keypair
for example.com
© Men & Mice http://menandmice.com
certificate request with CAA
19
Client CA B
DNS-
Server
malicious
actorWeb-
Server
example.com
fetch CAA record
© Men & Mice http://menandmice.com
certificate request with CAA
20
Client CA B
DNS-
Server
malicious
actorWeb-
Server
example.com
fetch CAA record
check CAA
record
content
© Men & Mice http://menandmice.com
certificate request with CAA
21
Client CA B
DNS-
Server
malicious
actorWeb-
Server
example.com
© Men & Mice http://menandmice.com
what is changing in
September?
22
© Men & Mice http://menandmice.com
CAB-Forum
•the CA/Browser (CAB) forum set the rules for
publishing the root-certificates of CAs in Web-
browser

https://cabforum.org
•CAs and browser vendors are members of the
CAB forum
•the CAB-Forum has decided that checking the
CAA-record is mandatory for member CAs starting
in September 2017
23
https://cabforum.org/pipermail/public/2017-March/009917.html
© Men & Mice http://menandmice.com
CAB-Forum
•the CAB-Forum does NOT(!) mandate that CA
customers requesting a certificate from a CA must
have a CAA-record
•however some CAs mandate CAA as part of their
own policy
•customers can still request certificates from a CA
without having a CAA record
•but not having CAA is less secure
24
© Men & Mice http://menandmice.com
a detail look at CAA
25
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issue" property
26
example.org. CAA 128 issue "letsencrypt.org"
Domain
for the
certificate
CAA record
type
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issue" property
27
example.org. CAA 128 issue "letsencrypt.org"
Flags
Flags:
0 = property not critical, if the CA cannot
understand the property, the CAA record-set
can still be used
128 = property is critical, if the CA does not
understand the property, the CA is not
allowed to use the CAA information
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issue" property
28
example.org. CAA 128 issue "letsencrypt.org"
property
property: currently defined by RFC 6844
issue: listed CA is permitted to issue a normal
(non wildcard) certificate for the domain
issuewild: listed CA is permitted to issue a
wildcard certificate for the domain
iodef: address to report CAA policy violations
back to the customer
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issue" property
29
example.org. CAA 128 issue "letsencrypt.org"
value
Value for issue and issuewild: base domain
name of the CA permitted to issue certificate
for this domain
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issuewild" property
30
example.org. CAA 128 issuewild "letsencrypt.org"
issuewild
property
issuewild: domain name of the CA permitted
to issue a wildcard certificate for this domain
(*.example.com)
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "issue" property
31
example.org. CAA 128 issue ";"
value
a single semicolon ";" prevents any CA from
issuing certificates for this domain
© Men & Mice http://menandmice.com
CAA-Record
•the CAA "iodef" property
32
example.org. CAA 128 issue "letsencrypt.org"
example.org. CAA 128 iodef "mailto:security@example.com"
example.org. CAA 128 iodef "https://iodef-report.example.com"
mail
address for
reports
the property IODEF defines a report channel
that a CA can use to report malicious CA
request
Report format is defined in RFC 6546
"Transport of Real-time Inter-network Defense
(RID) Messages over HTTP/TLS"
web URL
for
reporting
misuse
https://tools.ietf.org/rfc/rfc6546.txt
https://en.wikipedia.org/wiki/Incident_Object_Description_Exchange_Format#Example
© Men & Mice http://menandmice.com
CAA-Record
•CA private properties
33
example.org. CAA 128 issue "ca.domain.tld; maxvalidity=360"
standard
value
in addition to the values defined in RFC 6844,
CAs can define private property values.
Different property values are separated by
semicolon ";" extra
property
value
© Men & Mice http://menandmice.com
CAA-Record
•semicolon in CAA-record
34
example.org. CAA 128 issue "ca.domain.tld; maxvalidity=360"
some BIND 9 tools will escape
semicolon ";" with a backslash "" 

(for example dnssec-signzone)
escaped
semicolon
https://www.mail-archive.com/bind-users@lists.isc.org/msg24423.html
© Men & Mice http://menandmice.com
CAA-Record
•hierarchical CAA
35
example.org. CAA 128 issue "ca-a.domain.tld"
us.example.org. CAA 128 issue "ca-b.domain.tld"
ny.us.example.org. CAA 128 issue "ca-x.domain.tld"
a CA must follow the DNS
delegation chain upwards until it
finds a matching CAA record
(stops at top level domain)
this allows different CAs for
branches in the DNS tree
ny.us.example.com
us.example.com
example.com
com
"."
asia.example.com
cert from
ca-b
cert from
ca-acert from
ca-x
© Men & Mice http://menandmice.com
deploying CAA
36
© Men & Mice http://menandmice.com
DNS server support
•the CAA record is
supported with newer
versions of popular
DNS servers
•BIND 9.10/9.11
•BIND 10/Bundy-DNS
•LDNS
•NSD
•Knot DNS
•PowerDNS
•Google Cloud DNS
•Unbound
37
© Men & Mice http://menandmice.com
DNS server support
•users of older DNS servers can publish the CAA
record in the "unknown record" format (RFC 3597)
•BIND 9.8/9.9
•Windows DNS 2016
•older NSD
•older PowerDNS
38
© Men & Mice http://menandmice.com
generate a CAA record
•SSLmate offers an online CAA-record generator
39
https://sslmate.com/labs/caa/
© Men & Mice http://menandmice.com
generate a CAA record
•the tool "named-rrchecker" from BIND 9.11 can be
used to convert a CAA-record into the RFC 3597
format useable for older DNS server
40
$ echo "IN CAA 128 issue 'letsencrypt.org'" | named-rrchecker -u
CLASS1 TYPE257 # 24 80056973737565276C657473656E63727970742E6F726727
© Men & Mice http://menandmice.com
CAA security
•without DNSSEC, a malicious actor can spoof the
CAA-check done by the CA to steal a certificate
•while not mandated by the RFC or the CAB-
Forum, it is highly recommended to secure CAA
records with DNSSEC
41
© Men & Mice http://menandmice.com
testing for CAA record
•the popular TLS test at ssllabs.com tests for the
presence of the CAA record:
42
https://www.ssllabs.com/ssltest/
CAA

present
© Men & Mice http://menandmice.com
additional information
•HTTPS Certificate Issuance Becomes More Secure Thanks to New
CAA Standard

https://www.bleepingcomputer.com/news/security/https-certificate-issuance-becomes-
more-secure-thanks-to-new-caa-standard/
•An Introduction to Certification Authority Authorization (CAA)

https://www.ssl.com/article/certification-authority-authorization-caa/
•CAA Mandated by CA/Browser Forum

https://blog.qualys.com/ssllabs/2017/03/13/caa-mandated-by-cabrowser-forum
•Thawte - Guide to CAA

https://www.thawte.com/assets/documents/whitepaper/caa.pdf
•DNS Certification Authority Authorization (CAA) Resource Record

https://tools.ietf.org/html/rfc6844
43
© Men & Mice http://menandmice.com
Next
44
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction to DNS & BIND Hands-On Class
•August 14 – 16, 2017 (Boston (MA), USA)
•September 18 – 20, 2017 (Zurich, Switzerland)
45
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction & Advanced DNS and BIND Topics
Hands-On Class
•August 14 – 18, 2017 (Boston (MA), USA)
•September 18 – 22, 2017 (Zurich, Switzerland)
46
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•DNS & BIND (German Language)
•May 22 – 24, 2017, Essen, DE
•DNSSEC and DANE (German Language)
•December 4-12, 2017, Essen, DE
47
http://linuxhotel.de/
© Men & Mice http://menandmice.com
our next webinar 

the DNSSEC KSK of the root rolls
The DNSSEC key signing key (or KSK) of the DNS root zone will be
changed (rolled) this summer. During the time between July and
October, all DNSSEC validating resolvers need to get the new key
material.
In an ideal world, all works automagically.
In this webinar we explain the KSK roll, how DNS resolver will load
the new KSK with the RFC 5011 protocol, how a DNS administrator
can verify that the new KSK is present in the resolvers configuration.
Join us for a 45 minutes webinar with a Q&A session at the end, on
Thursday, June 1st, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00
AM EDT / 8:00 AM PDT.
48
© Men & Mice http://menandmice.com
Thank you!
Questions? Comments?
49

More Related Content

PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
PDF
Windows Server 2016 Webinar
Men and Mice
 
PPTX
Named Data Networking
Mustafa Cantürk
 
PPTX
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
PDF
Volume Encryption In CloudStack
ShapeBlue
 
PDF
Webrtc overview
Olle E Johansson
 
PPTX
Apache Flink Hands On
Robert Metzger
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
Windows Server 2016 Webinar
Men and Mice
 
Named Data Networking
Mustafa Cantürk
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
Volume Encryption In CloudStack
ShapeBlue
 
Webrtc overview
Olle E Johansson
 
Apache Flink Hands On
Robert Metzger
 

What's hot (20)

PDF
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
VMware Tanzu
 
PDF
Modul One Day Workshop Proxmox Automation With Ansible
I Putu Hariyadi
 
PDF
High Availability on pfSense 2.4 - pfSense Hangout March 2017
Netgate
 
PDF
Presentation f5 – beyond load balancer
xKinAnx
 
PDF
Interconnecting Neutron and Network Operators' BGP VPNs
Thomas Morin
 
PPTX
Discovering the 2 in Alfresco Search Services 2.0
Angel Borroy López
 
PDF
Como criar um banco digital
Atar B2B
 
PDF
MySQL Multi-Source Replication for PL2016
Wagner Bianchi
 
PDF
F5 DDoS Protection
MarketingArrowECS_CZ
 
PDF
Introduction to firewalls through Iptables
Bud Siddhisena
 
PDF
Orion NTA Customer Training
SolarWinds
 
ODP
Software defined storage
Gluster.org
 
PDF
STP (spanning tree protocol)
Netwax Lab
 
PDF
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK
 
PPT
Implementing 802.1x Authentication
dkaya
 
PDF
What CloudStackers Need To Know About LINSTOR/DRBD
ShapeBlue
 
PDF
EMEA Airheads - Aruba Central- Managing Networks from the Cloud
Aruba, a Hewlett Packard Enterprise company
 
PPTX
Storage basics
Luis Juan Koffler
 
PPT
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Stuart Miniman
 
ODP
Writing External Rsyslog Plugins
Rainer Gerhards
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
VMware Tanzu
 
Modul One Day Workshop Proxmox Automation With Ansible
I Putu Hariyadi
 
High Availability on pfSense 2.4 - pfSense Hangout March 2017
Netgate
 
Presentation f5 – beyond load balancer
xKinAnx
 
Interconnecting Neutron and Network Operators' BGP VPNs
Thomas Morin
 
Discovering the 2 in Alfresco Search Services 2.0
Angel Borroy López
 
Como criar um banco digital
Atar B2B
 
MySQL Multi-Source Replication for PL2016
Wagner Bianchi
 
F5 DDoS Protection
MarketingArrowECS_CZ
 
Introduction to firewalls through Iptables
Bud Siddhisena
 
Orion NTA Customer Training
SolarWinds
 
Software defined storage
Gluster.org
 
STP (spanning tree protocol)
Netwax Lab
 
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK
 
Implementing 802.1x Authentication
dkaya
 
What CloudStackers Need To Know About LINSTOR/DRBD
ShapeBlue
 
EMEA Airheads - Aruba Central- Managing Networks from the Cloud
Aruba, a Hewlett Packard Enterprise company
 
Storage basics
Luis Juan Koffler
 
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Stuart Miniman
 
Writing External Rsyslog Plugins
Rainer Gerhards
 
Ad

Similar to The CAA-Record for increased encryption security (20)

PPTX
domain-routing.pptx
ashraf mahmoud
 
PDF
domain-routing-220627173025-41f4dc7e (1).pdf
ssusere9bd3b
 
PPTX
Web Front End Performance
Chris Love
 
PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
OpenDNS
 
PDF
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
PDF
The DNSSEC KSK of the root rolls
Men and Mice
 
PPT
Applciation footprinting, discovery and enumeration
Blueinfy Solutions
 
PDF
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
Kevin Jones
 
PDF
DNSSEC signing Tutorial
Men and Mice
 
PDF
BIND 9 logging best practices
Men and Mice
 
PDF
Windows 2012 and DNSSEC
Men and Mice
 
PPTX
AirVantage M2M Cloud - A survival guide to newcomers
David Sciamma
 
PPTX
Deployment of DevOps Environment with CA Solutions
Nic Swart
 
PDF
Sierra Wireless Developer Day 2013 - 11 - AirVantage M2M Cloud
Thibault Cantegrel
 
PDF
Nginx, PHP, Apache and Spelix
Harald Zeitlhofer
 
PDF
Monitoring CloudStack and components
ShapeBlue
 
PPTX
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
PPTX
APIs_ An Introduction.pptx
AkashThorat25
 
domain-routing.pptx
ashraf mahmoud
 
domain-routing-220627173025-41f4dc7e (1).pdf
ssusere9bd3b
 
Web Front End Performance
Chris Love
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
OpenDNS
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
The DNSSEC KSK of the root rolls
Men and Mice
 
Applciation footprinting, discovery and enumeration
Blueinfy Solutions
 
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
Kevin Jones
 
DNSSEC signing Tutorial
Men and Mice
 
BIND 9 logging best practices
Men and Mice
 
Windows 2012 and DNSSEC
Men and Mice
 
AirVantage M2M Cloud - A survival guide to newcomers
David Sciamma
 
Deployment of DevOps Environment with CA Solutions
Nic Swart
 
Sierra Wireless Developer Day 2013 - 11 - AirVantage M2M Cloud
Thibault Cantegrel
 
Nginx, PHP, Apache and Spelix
Harald Zeitlhofer
 
Monitoring CloudStack and components
ShapeBlue
 
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
APIs_ An Introduction.pptx
AkashThorat25
 
Ad

More from Men and Mice (20)

PPTX
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
PDF
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
PDF
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
PDF
Namespaces for Local Networks
Men and Mice
 
PDF
How to send DNS over anything encrypted
Men and Mice
 
PDF
SMTP STS (Strict Transport Security) vs. SMTP with DANE
Men and Mice
 
PDF
Fighting Abuse with DNS
Men and Mice
 
PDF
What is new in BIND 9.11?
Men and Mice
 
PDF
Yeti DNS - Experimenting at the root
Men and Mice
 
PDF
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
PDF
DNSTap Webinar
Men and Mice
 
PDF
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
PDF
Keeping DNS server up-and-running with “runit
Men and Mice
 
PDF
PowerDNS Webinar - Part 2
Men and Mice
 
PDF
PowerDNS Webinar
Men and Mice
 
PDF
IETF 93 Review Webinar
Men and Mice
 
PDF
RIPE 70 Report Webinar
Men and Mice
 
PDF
DNSSEC best practices Webinar
Men and Mice
 
PDF
IETF 92 Webinar
Men and Mice
 
PDF
The KNOT DNS Server
Men and Mice
 
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
Namespaces for Local Networks
Men and Mice
 
How to send DNS over anything encrypted
Men and Mice
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
Men and Mice
 
Fighting Abuse with DNS
Men and Mice
 
What is new in BIND 9.11?
Men and Mice
 
Yeti DNS - Experimenting at the root
Men and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
DNSTap Webinar
Men and Mice
 
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
Keeping DNS server up-and-running with “runit
Men and Mice
 
PowerDNS Webinar - Part 2
Men and Mice
 
PowerDNS Webinar
Men and Mice
 
IETF 93 Review Webinar
Men and Mice
 
RIPE 70 Report Webinar
Men and Mice
 
DNSSEC best practices Webinar
Men and Mice
 
IETF 92 Webinar
Men and Mice
 
The KNOT DNS Server
Men and Mice
 

Recently uploaded (20)

PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Software Development Methodologies in 2025
KodekX
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
The Future of Artificial Intelligence (AI)
Mukul
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Software Development Methodologies in 2025
KodekX
 

The CAA-Record for increased encryption security

  • 1. © Men & Mice http://menandmice.com DNS Certification Authority Authorization (CAA) 
 Resource Record what will change in September? 1
  • 2. © Men & Mice http://menandmice.com Agenda 1. Brief overview on the CAA record 2. How CAA is used 3. CAA mandatory from September 2017 4. Detail look on CAA 1. ISSUE and ISSUEWILD 2. IODEF - Reporting misuse 3. The flags 4. Custom CAA values 5. Hierarchical CAA 5. Deploying CAA 2
  • 3. © Men & Mice http://menandmice.com a brief overview of the CAA record 3
  • 4. © Men & Mice http://menandmice.com CAA record • the CAA (Certification Authority Authorization) record whitelists one or more certification authorities (CA) to issue x509 certificates (SSL/TLS, HTTPS etc) for a specific domain • starting from September 2017, CAs with a root certificate in one of the major web-browsers must check for the CAA record and must follow the content of CAA when issuing new certificates • the CAA record is defined in
 RFC 6844 - https://datatracker.ietf.org/doc/rfc6844/ 4
  • 5. © Men & Mice http://menandmice.com certificate request w/o CAA 5 Client generates a keypair certificate signing request send to CA Client CA A Web- Server example.com DNS- Server
  • 6. © Men & Mice http://menandmice.com certificate request w/o CAA 6 CA-signed public key (aka certificate) Client Web- Server example.com DNS- Server CA A
  • 7. © Men & Mice http://menandmice.com certificate request w/o CAA 7 x509 certificate deployed on web-server Client Web- Server example.com DNS- Server CA A
  • 8. © Men & Mice http://menandmice.com certificate mis-issue 8
  • 9. © Men & Mice http://menandmice.com certificate request w/o CAA 9 certificate signing request send to CA Client DNS- Server malicious actorWeb- Server example.com Client generates a keypair for example.com CA B
  • 10. © Men & Mice http://menandmice.com certificate request w/o CAA 10 Client DNS- Server malicious actorWeb- Server example.com CA-signed public key (aka certificate) CA B
  • 11. © Men & Mice http://menandmice.com certificate request with CAA 11
  • 12. © Men & Mice http://menandmice.com certificate request with CAA 12 Client generates a keypair certificate signing request send to CA Client CA A Web- Server example.com DNS- Server
  • 13. © Men & Mice http://menandmice.com certificate request with CAA 13 fetch CAA record Client CA A Web- Server example.com DNS- Server
  • 14. © Men & Mice http://menandmice.com certificate request with CAA 14 fetch CAA record Client CA A Web- Server example.com DNS- Server check CAA record content
  • 15. © Men & Mice http://menandmice.com certificate request with CAA 15 CA-signed public key (aka certificate) Client CA A Web- Server example.com DNS- Server
  • 16. © Men & Mice http://menandmice.com certificate request with CAA 16 x509 certificate deployed on web-server Client CA A Web- Server example.com DNS- Server
  • 17. © Men & Mice http://menandmice.com certificate mis-issue 
 (prevented by CAA) 17
  • 18. © Men & Mice http://menandmice.com certificate request with CAA 18 certificate signing request send to CA Client CA B DNS- Server malicious actorWeb- Server example.com Client generates a keypair for example.com
  • 19. © Men & Mice http://menandmice.com certificate request with CAA 19 Client CA B DNS- Server malicious actorWeb- Server example.com fetch CAA record
  • 20. © Men & Mice http://menandmice.com certificate request with CAA 20 Client CA B DNS- Server malicious actorWeb- Server example.com fetch CAA record check CAA record content
  • 21. © Men & Mice http://menandmice.com certificate request with CAA 21 Client CA B DNS- Server malicious actorWeb- Server example.com
  • 22. © Men & Mice http://menandmice.com what is changing in September? 22
  • 23. © Men & Mice http://menandmice.com CAB-Forum •the CA/Browser (CAB) forum set the rules for publishing the root-certificates of CAs in Web- browser
 https://cabforum.org •CAs and browser vendors are members of the CAB forum •the CAB-Forum has decided that checking the CAA-record is mandatory for member CAs starting in September 2017 23 https://cabforum.org/pipermail/public/2017-March/009917.html
  • 24. © Men & Mice http://menandmice.com CAB-Forum •the CAB-Forum does NOT(!) mandate that CA customers requesting a certificate from a CA must have a CAA-record •however some CAs mandate CAA as part of their own policy •customers can still request certificates from a CA without having a CAA record •but not having CAA is less secure 24
  • 25. © Men & Mice http://menandmice.com a detail look at CAA 25
  • 26. © Men & Mice http://menandmice.com CAA-Record •the CAA "issue" property 26 example.org. CAA 128 issue "letsencrypt.org" Domain for the certificate CAA record type
  • 27. © Men & Mice http://menandmice.com CAA-Record •the CAA "issue" property 27 example.org. CAA 128 issue "letsencrypt.org" Flags Flags: 0 = property not critical, if the CA cannot understand the property, the CAA record-set can still be used 128 = property is critical, if the CA does not understand the property, the CA is not allowed to use the CAA information
  • 28. © Men & Mice http://menandmice.com CAA-Record •the CAA "issue" property 28 example.org. CAA 128 issue "letsencrypt.org" property property: currently defined by RFC 6844 issue: listed CA is permitted to issue a normal (non wildcard) certificate for the domain issuewild: listed CA is permitted to issue a wildcard certificate for the domain iodef: address to report CAA policy violations back to the customer
  • 29. © Men & Mice http://menandmice.com CAA-Record •the CAA "issue" property 29 example.org. CAA 128 issue "letsencrypt.org" value Value for issue and issuewild: base domain name of the CA permitted to issue certificate for this domain
  • 30. © Men & Mice http://menandmice.com CAA-Record •the CAA "issuewild" property 30 example.org. CAA 128 issuewild "letsencrypt.org" issuewild property issuewild: domain name of the CA permitted to issue a wildcard certificate for this domain (*.example.com)
  • 31. © Men & Mice http://menandmice.com CAA-Record •the CAA "issue" property 31 example.org. CAA 128 issue ";" value a single semicolon ";" prevents any CA from issuing certificates for this domain
  • 32. © Men & Mice http://menandmice.com CAA-Record •the CAA "iodef" property 32 example.org. CAA 128 issue "letsencrypt.org" example.org. CAA 128 iodef "mailto:[email protected]" example.org. CAA 128 iodef "https://iodef-report.example.com" mail address for reports the property IODEF defines a report channel that a CA can use to report malicious CA request Report format is defined in RFC 6546 "Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS" web URL for reporting misuse https://tools.ietf.org/rfc/rfc6546.txt https://en.wikipedia.org/wiki/Incident_Object_Description_Exchange_Format#Example
  • 33. © Men & Mice http://menandmice.com CAA-Record •CA private properties 33 example.org. CAA 128 issue "ca.domain.tld; maxvalidity=360" standard value in addition to the values defined in RFC 6844, CAs can define private property values. Different property values are separated by semicolon ";" extra property value
  • 34. © Men & Mice http://menandmice.com CAA-Record •semicolon in CAA-record 34 example.org. CAA 128 issue "ca.domain.tld; maxvalidity=360" some BIND 9 tools will escape semicolon ";" with a backslash "" 
 (for example dnssec-signzone) escaped semicolon https://www.mail-archive.com/[email protected]/msg24423.html
  • 35. © Men & Mice http://menandmice.com CAA-Record •hierarchical CAA 35 example.org. CAA 128 issue "ca-a.domain.tld" us.example.org. CAA 128 issue "ca-b.domain.tld" ny.us.example.org. CAA 128 issue "ca-x.domain.tld" a CA must follow the DNS delegation chain upwards until it finds a matching CAA record (stops at top level domain) this allows different CAs for branches in the DNS tree ny.us.example.com us.example.com example.com com "." asia.example.com cert from ca-b cert from ca-acert from ca-x
  • 36. © Men & Mice http://menandmice.com deploying CAA 36
  • 37. © Men & Mice http://menandmice.com DNS server support •the CAA record is supported with newer versions of popular DNS servers •BIND 9.10/9.11 •BIND 10/Bundy-DNS •LDNS •NSD •Knot DNS •PowerDNS •Google Cloud DNS •Unbound 37
  • 38. © Men & Mice http://menandmice.com DNS server support •users of older DNS servers can publish the CAA record in the "unknown record" format (RFC 3597) •BIND 9.8/9.9 •Windows DNS 2016 •older NSD •older PowerDNS 38
  • 39. © Men & Mice http://menandmice.com generate a CAA record •SSLmate offers an online CAA-record generator 39 https://sslmate.com/labs/caa/
  • 40. © Men & Mice http://menandmice.com generate a CAA record •the tool "named-rrchecker" from BIND 9.11 can be used to convert a CAA-record into the RFC 3597 format useable for older DNS server 40 $ echo "IN CAA 128 issue 'letsencrypt.org'" | named-rrchecker -u CLASS1 TYPE257 # 24 80056973737565276C657473656E63727970742E6F726727
  • 41. © Men & Mice http://menandmice.com CAA security •without DNSSEC, a malicious actor can spoof the CAA-check done by the CA to steal a certificate •while not mandated by the RFC or the CAB- Forum, it is highly recommended to secure CAA records with DNSSEC 41
  • 42. © Men & Mice http://menandmice.com testing for CAA record •the popular TLS test at ssllabs.com tests for the presence of the CAA record: 42 https://www.ssllabs.com/ssltest/ CAA
 present
  • 43. © Men & Mice http://menandmice.com additional information •HTTPS Certificate Issuance Becomes More Secure Thanks to New CAA Standard
 https://www.bleepingcomputer.com/news/security/https-certificate-issuance-becomes- more-secure-thanks-to-new-caa-standard/ •An Introduction to Certification Authority Authorization (CAA)
 https://www.ssl.com/article/certification-authority-authorization-caa/ •CAA Mandated by CA/Browser Forum
 https://blog.qualys.com/ssllabs/2017/03/13/caa-mandated-by-cabrowser-forum •Thawte - Guide to CAA
 https://www.thawte.com/assets/documents/whitepaper/caa.pdf •DNS Certification Authority Authorization (CAA) Resource Record
 https://tools.ietf.org/html/rfc6844 43
  • 44. © Men & Mice http://menandmice.com Next 44
  • 45. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction to DNS & BIND Hands-On Class •August 14 – 16, 2017 (Boston (MA), USA) •September 18 – 20, 2017 (Zurich, Switzerland) 45 https://www.menandmice.com/training/
  • 46. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction & Advanced DNS and BIND Topics Hands-On Class •August 14 – 18, 2017 (Boston (MA), USA) •September 18 – 22, 2017 (Zurich, Switzerland) 46 https://www.menandmice.com/training/
  • 47. © Men & Mice http://menandmice.com Men & Mice DNS Training •DNS & BIND (German Language) •May 22 – 24, 2017, Essen, DE •DNSSEC and DANE (German Language) •December 4-12, 2017, Essen, DE 47 http://linuxhotel.de/
  • 48. © Men & Mice http://menandmice.com our next webinar 
 the DNSSEC KSK of the root rolls The DNSSEC key signing key (or KSK) of the DNS root zone will be changed (rolled) this summer. During the time between July and October, all DNSSEC validating resolvers need to get the new key material. In an ideal world, all works automagically. In this webinar we explain the KSK roll, how DNS resolver will load the new KSK with the RFC 5011 protocol, how a DNS administrator can verify that the new KSK is present in the resolvers configuration. Join us for a 45 minutes webinar with a Q&A session at the end, on Thursday, June 1st, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00 AM EDT / 8:00 AM PDT. 48
  • 49. © Men & Mice http://menandmice.com Thank you! Questions? Comments? 49