When originally implementing CAA, we ran into a number of issues with various DNS providers not properly supporting queries for this record type. Because of this we implemented a soft-fail behavior when DNS servers return the SERVFAIL error code to CAA queries instead of the expected NOERRROR code.
Over the last year and a half, we’ve worked with a number of these providers to move towards spec compliance, but there are still a few misconfigured providers. However, we are moving towards strict enforcement of CAA, where SERVFAIL responses will block issuance. This is also in line with upcoming industry requirements: all CAs will soon be required to check CAA by the CA/Browser Forum Baseline Requirements.
We’ve recently added functionality that disables our workaround for any new users but in order to provide existing users a window of time to fix any issues, we have created a list of domains that are allowed issuance despite CAA failures for the next month and a half.
If you’d like to test if your DNS provider still has this issue, try a test issuance against our staging environment. This environment has an empty exceptions list and will behave the same as our production infrastructure will once we have completely removed the exceptions code. If your provider still has this issue you will receive the error “DNS problem: SERVFAIL looking up CAA for {domain-name}” when attempting to validate a challenge for the domain in question.
People with unexpired certificates containing names on the exception list will receive an email informing them of this, but so everyone knows about the changes we are posting here too.