CAA Record
Restricts which Certificate Authorities may issue TLS certificates for your domain — a key DNS-layer defense against certificate misissuance.
Certification Authority Authorization
CAA records (RFC 8659) allow domain owners to specify which Certificate Authorities (CAs) are permitted to issue TLS certificates for their domain. Before issuing a certificate, CAs are required (by CA/Browser Forum rules since 2017) to check for CAA records and refuse to issue if they are not listed.
Without CAA records, any of the hundreds of trusted CAs in browser root stores can issue a certificate for your domain — creating risk from compromised or misissuing CAs. CAA records dramatically reduce this attack surface to just the CAs you explicitly authorize.
- CAs must check CAA records before issuing — the check is mandatory per CA/B Forum Baseline Requirements
- Multiple CAA records are allowed and combined: a CA is authorized if it appears in any
issuerecord - CAA records are inherited by subdomains unless the subdomain has its own CAA records
- An empty/absent CAA record = any CA may issue
- Does not affect certificates already issued — only prevents future issuance
- Does not prevent a CA from issuing if they have a bug/policy violation — it's a policy control, not a cryptographic one
issue controls DV and OV certificates. issuewild controls wildcard certificates (*.example.com) separately. If you publish issue but no issuewild, wildcards inherit from issue. Use issuewild ";" to explicitly block all wildcard issuance.CAA Tags Explained
Authorizes a CA to issue standard (non-wildcard) certificates for the domain and all subdomains. The value is the CA's domain as listed in their CAA policy. Use ";" as the value to prohibit all issuance.
Authorizes a CA to issue wildcard certificates (*.example.com) specifically. If absent, wildcards inherit from issue. If present, only CAs listed in issuewild may issue wildcards.
Specifies a URL where CAs should send violation reports when they receive a certificate request that would violate the CAA policy. Supports mailto: and https: URLs. Not all CAs implement this.
Setting the flag to 128 (critical) means a CA must refuse to issue if it does not understand the tag. Use 0 (non-critical) for standard tags. Critical flag prevents issuance by CAs that ignore unknown tags.
Querying CAA Records
Look up CAA records
Find your CA's CAA identifier
Related Topics
TXT records carry other security policies like SPF, DKIM, and DMARC alongside CAA.
Cache PoisoningCAA records help limit damage from rogue certificates issued after a resolver is poisoned.
Authoritative NameserverCAA records must be present on the authoritative nameserver for the CA to check them at issuance time.