SSL/PKI DNS Check

Check SSL/PKI-related DNS records: CAA, TLSA, and DNSSEC.

SSL and PKI DNS check

This use case combines CAA, TLSA, and DNSSEC checks to validate the DNS side of your TLS and PKI setup. CAA controls which certificate authorities can issue certificates for your domain, TLSA provides DANE bindings for certificates, and DNSSEC ensures DNS responses are validated. Together these records strengthen your TLS posture.

Misconfigurations in any of these records can break issuance or validation. A missing CAA entry can block certificate renewal. A stale TLSA record can cause DANE failure. Missing or incorrect DS records can make DNSSEC validation fail. Use this check before certificate renewals or security audits.

If you need related checks, try Check CAA record online and DNSSEC lookup check tool.

Yes. TLSA relies on DNSSEC validation. Without DNSSEC, TLSA records should not be trusted.

CAA records may block the CA. Update CAA to include the correct issuer or remove restrictive entries.

Recalculate the TLSA data for the new certificate or key and publish it. Old TLSA data will fail validation.

Authorize only the CAs you actually use, and add issuewild if you need wildcard certificates.

It indicates a chain of trust problem, such as mismatched DS and DNSKEY or expired signatures.

No, but it adds extra security for environments that validate DANE.