Beep beep... Loading...
A TLSA (Transport Layer Security Authentication) record is used for DANE (DNS-based Authentication of Named Entities) protocol. It allows you to specify which TLS certificate or public key should be used for a service, providing an additional layer of security beyond traditional certificate authorities.
Format:
_port._proto.domain.com. IN TLSA ( usage selector matching-type certificate-data )
Examples:
# HTTPS server certificate _443._tcp.example.com. IN TLSA 3 1 1 123456789abcdef... # SMTP with STARTTLS _25._tcp.mail.example.com. IN TLSA 2 0 1 abcdef123456... # Secure IMAP _993._tcp.imap.example.com. IN TLSA 1 1 2 fedcba987654...
0: CA constraint 1: Service certificate constraint 2: Trust anchor assertion 3: Domain-issued certificate
0: Full certificate 1: SubjectPublicKeyInfo
0: Exact match 1: SHA-256 hash 2: SHA-512 hash
The actual certificate or public key data, formatted according to the selector and matching type
Choose the right certificate usage mode based on your security requirements and infrastructure.
Always use DNSSEC with TLSA records to ensure the integrity of the certificate data.
Keep TLSA records in sync with certificate renewals and changes.
TLSA records not updated when certificates are renewed can cause service disruption.
TLSA records without DNSSEC protection are vulnerable to tampering.
Using wrong port or protocol in TLSA record names can prevent proper validation.
Implement proper certificate rollover procedures by publishing new TLSA records before deploying new certificates and maintaining both records during transition.
Consider publishing multiple TLSA records with different matching types or selectors to provide fallback options and improve reliability.
Implement automated systems to update TLSA records when certificates are renewed to prevent mismatches and service disruptions.
Ensure DNSSEC is properly configured and maintained to protect TLSA records.
Implement secure key management practices for both certificates and DNSSEC keys.
Regularly monitor TLSA record validity and certificate expiration dates.