Skip to content

Audit says we're missing DNSSEC and CAA, does that affect email?

DNSSEC signs DNS answers so they can't be tampered with, for example via cache poisoning. CAA restricts which CAs may issue TLS certs for your domain. Neither is strictly required for mail, but both are recommended: DNSSEC strengthens MTA-STS and DANE, CAA prevents rogue certs on your MX hosts.

Try this first

  1. 1Check current status with dnssec-tools.org or mxtoolbox DNSSEC. Ask your registrar (TransIP, OpenProvider, Cloudflare) whether DNSSEC is enabled for your zone.
  2. 2Enable DNSSEC: at Cloudflare a single click, elsewhere often via DS record to your nameserver. Test on a sandbox domain first.
  3. 3Add CAA records: yourdomain.com. CAA 0 issue "letsencrypt.org" for LE, or the CA you use. Plus iodef for reporting.
  4. 4Mail context: DANE (TLSA records on MX) requires DNSSEC. Without DNSSEC, DANE is pointless.
  5. 5Verify externally (internet.nl) and check authoritative DNS errors. DNSSEC misconfig can make your domain unreachable.

When to bring us in

If you want DANE validation toward your MX (especially relevant for business mail to government, NTA 7516, Chamber of Commerce, Tax Authority), set up DNSSEC + DANE together.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.