The TLSA record enables DNS-based Authentication of Named Entities (DANE), which allows domain owners to specify which TLS certificates are valid for their services. This provides an alternative or complement to the traditional CA system, reducing reliance on certificate authorities.
Check TLSA records for any domain using our free DNS lookup tool.
Look Up TLSA Records →TLSA records associate TLS certificates (or public keys) with domain names, allowing clients to verify that the certificate presented by a server is the one the domain owner intended. DANE-TLSA:
TLSA records only work with DNSSEC. Without DNSSEC, an attacker could forge TLSA records to bypass the security benefits.
TLSA records are placed at a specific name format: _port._protocol.hostname
_443._tcp.example.com. 3600 IN TLSA 3 1 1 a5f8b3c2d1e0...
This pins the SHA-256 hash of the public key for HTTPS (port 443) on example.com.
TLSA records have four fields after the record type:
| Parameter | Values | Description |
|---|---|---|
| Usage | 0, 1, 2, 3 | How to use the certificate data |
| Selector | 0, 1 | What part of the certificate to match |
| Matching Type | 0, 1, 2 | How to match (exact, SHA-256, SHA-512) |
| Certificate Data | Hex string | The certificate or hash to match |
| Value | Name | Description |
|---|---|---|
| 0 | PKIX-TA | CA constraint (must chain to specified CA) |
| 1 | PKIX-EE | Service certificate constraint (must match + valid CA chain) |
| 2 | DANE-TA | Trust anchor assertion (pin a CA, no PKIX validation) |
| 3 | DANE-EE | Domain-issued certificate (pin exact cert, no CA needed) |
_443._tcp.example.com. TLSA 3 1 1 2bb9...hash...
Usage 3, Selector 1, Matching Type 1 = pin the SHA-256 hash of the certificate's public key.
_443._tcp.example.com. TLSA 2 0 1 a5f8...hash...
Pin the CA certificate (any cert issued by this CA is valid).
_443._tcp.example.com. TLSA 3 1 1 current_key_hash...
_443._tcp.example.com. TLSA 3 1 1 next_key_hash...
TLSA is commonly used for email server security. For an MX server at mail.example.com on port 25:
_25._tcp.mail.example.com. TLSA 3 1 1 hash...
This allows sending servers to verify they're connecting to the legitimate mail server.
You can generate TLSA records from your certificate:
# For full certificate hash
openssl x509 -in cert.pem -outform DER | sha256sum
# For public key only (selector 1)
openssl x509 -in cert.pem -noout -pubkey | \
openssl pkey -pubin -outform DER | sha256sum
| Aspect | TLSA (DANE) | CAA |
|---|---|---|
| Purpose | Verify presented certificate | Restrict who can issue certificates |
| Checked by | TLS clients (browsers, mail servers) | Certificate Authorities |
| Requires DNSSEC | Yes | No |
| Adoption | Growing (esp. email) | Mandatory for CAs |
Common issues and solutions:
DNS Explorer validates TLSA records, checks DNSSEC status, and alerts you before certificate changes break DANE.
Start free DNS Explorer trial14-day full-feature trial
Use our DNS Record Finder to look up TLSA records for any domain.
Look Up TLSA Records →