Skip to content

Conversation

@gunnim
Copy link

@gunnim gunnim commented Dec 14, 2025

Core impetus for PR is clarify what I saw as a missing step when creating your CAA records, the mapping from issuer name to issuer domain name. Am also hoping it might be useful to clarify where DNSSEC/CAA do not help.

@Raiders0786

@vercel
Copy link

vercel bot commented Dec 14, 2025

Someone is attempting to deploy a commit to the Security Alliance Team on Vercel.

A member of the Team first needs to authorize it.

@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from 324a009 to d64f54a Compare December 14, 2025 18:38
@scode2277
Copy link
Collaborator

Thanks for the contribution @gunnim!

While the steward of the Domain and DNS Security, @Raiders0786, reviews the content added, I need to ask you to follow this guide about how to sign unverified commits as this PR can't be merged if all the commits are not verified. The guide assumes that the user following it has a signing key.

Thanks :)

@scode2277 scode2277 mentioned this pull request Dec 16, 2025
@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from d64f54a to 54c36e6 Compare December 16, 2025 19:13
@vercel
Copy link

vercel bot commented Dec 17, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
frameworks Ready Ready Preview, Comment Dec 17, 2025 11:30am

@scode2277 scode2277 added the content:add This issue or PR adds content or suggests to label Dec 17, 2025
Copy link
Collaborator

@mattaereal mattaereal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the additions are useful! Can you just update the claim of the security issues? You can add the most prominent ones, in case you want to provide more information about them. The rest is a minor thing

Certificate Authority Authorization (CAA) records specify which Certificate Authorities (CAs) are allowed to issue SSL certificates for your domain. This prevents unauthorized certificate issuance, which attackers could use to create fake SSL certificates for your domain.

**How it protects you**: Without CAA records, any Certificate Authority can issue SSL certificates for your domain. Attackers could potentially obtain fake certificates and use them in sophisticated phishing attacks that appear to have valid SSL encryption.
With CAA records for a given domain in place, if a CA receives a certificate request for that domain it will deny that request except in the event of a fully compromised CA (Last big CA security issue was Symantec around 2015).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the biggest issue with a tool regarding CAs was CVE-2025-44005, this year

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mattaereal what I was attempting to highlight is when CAA records don't help. In your example and f.x. for https://www.sans.org/newsletters/newsbites/xxvii-32 I think it's reasonable to assume that CAA would in fact help as they were not fully compromised.

I've pushed a further clarification that I hope is more useful

@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from f0a3ef7 to a146131 Compare December 18, 2025 14:59
@gunnim gunnim requested a review from mattaereal December 27, 2025 17:53
@Raiders0786
Copy link
Contributor

I've commented feedback and changes above—are you able to see them, @gunnim ?

@scode2277
Copy link
Collaborator

Thanks for review @Raiders0786! I am not able to see the comments but i see you and @gunnim spoke and he is making changes.

Btw, @gunnim I see the commit 224f599 not verified (the 'merge remote branch' one), can you fix that too pls

@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from 7d2ef5c to bdd2ec1 Compare January 5, 2026 15:40
gunnim added 2 commits January 5, 2026 16:44
making the page with proper heading + table of content (security-alliance#311)

making the deadlinks error just a warning (security-alliance#312)

Revert "Add DevOps & Infrastructure certification and enhance existing certif…" (security-alliance#317)

This reverts commit 1148af5.

Fix node version requirement for local testing (security-alliance#318)

* fix: update Node.js requirement to v22+ for vocs compatibility

vocs >=1.2.0 requires Node.js 22+ due to usage of globSync from node:fs.
Updated devcontainer Dockerfile and CONTRIBUTING.md accordingly.

See: https://github.com/wevm/vocs/blob/main/package.json

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>

* shorten comments

* fix: update Node.js version in contributing.mdx

---------

Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>

Restructuring opsec domain (security-alliance#299)

* restructuring opsec domain

* finalise the opsec revamp

* Updating tags!

* Removing build errors by vite on deadlinks

* fix import paths + deadlinks

---------

Co-authored-by: Matías Aereal Aeón <388605+mattaereal@users.noreply.github.com>
Co-authored-by: Sara Russo <sararusso984@gmail.com>

Restore automated tag colors and fix broken link (security-alliance#310)

* add tags color generator

* adding missing tags, colors and styling for tags + fix broken link

---------

Co-authored-by: Matías Aereal Aeón <388605+mattaereal@users.noreply.github.com>

Add Isaac and Dickson as stewards (security-alliance#316)

* Update contributor roles and descriptions in contributors.json

- Changed roles for Dickson Wu and Isaac Patka from "contributor" to "steward".
- Enhanced descriptions to reflect their stewardship responsibilities, providing clearer attribution in documentation.

* Update contributor description for Safe Harbor in contributors.json

- Revised the description for the Safe Harbor contributor to clarify their role as "Steward of Safe Harbor & Steward of SEAL Certs," enhancing the accuracy of contributor attributions.

clarify CAA use further

minor content structure

further work after discussion with maintainer

making the page with proper heading + table of content (security-alliance#311)

making the deadlinks error just a warning (security-alliance#312)

Revert "Add DevOps & Infrastructure certification and enhance existing certif…" (security-alliance#317)

This reverts commit 1148af5.

Fix node version requirement for local testing (security-alliance#318)

* fix: update Node.js requirement to v22+ for vocs compatibility

vocs >=1.2.0 requires Node.js 22+ due to usage of globSync from node:fs.
Updated devcontainer Dockerfile and CONTRIBUTING.md accordingly.

See: https://github.com/wevm/vocs/blob/main/package.json

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>

* shorten comments

* fix: update Node.js version in contributing.mdx

---------

Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>

Restore automated tag colors and fix broken link (security-alliance#310)

* add tags color generator

* adding missing tags, colors and styling for tags + fix broken link

---------

Co-authored-by: Matías Aereal Aeón <388605+mattaereal@users.noreply.github.com>

Add Isaac and Dickson as stewards (security-alliance#316)

* Update contributor roles and descriptions in contributors.json

- Changed roles for Dickson Wu and Isaac Patka from "contributor" to "steward".
- Enhanced descriptions to reflect their stewardship responsibilities, providing clearer attribution in documentation.

* Update contributor description for Safe Harbor in contributors.json

- Revised the description for the Safe Harbor contributor to clarify their role as "Steward of Safe Harbor & Steward of SEAL Certs," enhancing the accuracy of contributor attributions.
@gunnim gunnim force-pushed the fix/dnssec-and-email--additions branch from bdd2ec1 to 7e8c3c2 Compare January 5, 2026 15:48
@gunnim
Copy link
Author

gunnim commented Jan 5, 2026

FYI on git history: did some serious chainsaw surgery to fix the old merge missing verification... 😅

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

content:add This issue or PR adds content or suggests to

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants