Skip to content

Conversation

@c0nfigurati0n
Copy link
Contributor

@c0nfigurati0n c0nfigurati0n commented Sep 5, 2022

No description provided.

@c0nfigurati0n
Copy link
Contributor Author

@nguyenkims

@c0nfigurati0n c0nfigurati0n changed the title Small fix on the security page. Some small fixs on the security page. Sep 5, 2022
[CAA](https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization) is a standard that allows SimpleLogin to restrict which Certificate Authorities (CA) are allowed to issue certificates for our domains. By default, every public CA is allowed to issue certificates for **any** domain name in the public DNS, provided they validate control of that domain name. That means that if there’s a bug in any one of the many public CAs’ validation processes, every domain name is potentially affected. This has happened in the past, affecting [Google](http://arstechnica.com/security/2015/10/still-fuming-over-https-mishap-google-gives-symantec-an-offer-it-cant-refuse/), [Windows Live](https://arstechnica.com/information-technology/2015/03/bogus-ssl-certificate-for-windows-live-could-allow-man-in-the-middle-hacks/) among others.

CAA provides a way for domain holders to reduce that risk. Without CAA, someone could potentially obtain an unauthorized SSL certificate for SimpleLogin domains that could allow man-in-the-middle hacks.
[CAA](https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization) is a standard that allows us to restrict which Certificate Authorities (CA) are allowed to issue certificates for our domains. By default, every public CA is allowed to issue certificates for any domain in the public DNS, provided they validate control of that domain. That means that if there is a bug in any one of the many public CAs’ validation processes, then any and every domain is than potentially affected. This has happened in the past, affecting [Google](http://arstechnica.com/security/2015/10/still-fuming-over-https-mishap-google-gives-symantec-an-offer-it-cant-refuse/), [Windows Live](https://arstechnica.com/information-technology/2015/03/bogus-ssl-certificate-for-windows-live-could-allow-man-in-the-middle-hacks/) among others. CAA provides a way for domain holders to reduce that risk. Without CAA, someone could potentially obtain an unauthorized TLS certificate for our domains that could allow them to do a man-in-the-middle (MITM) attack on our infrastructure. All of our certificates are issued by [Letsencrypt](https://letsencrypt.org). Which is a certificate authority we trust.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey any reason why we remove the line break here?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants