today we are trying to generate a certificate for a subdomain like we already did for dozens of our domains…
We have our DNS set up like that… we have a master records called frontend.gcloud.schema31.it that contains 6 A records to our balancers, then we set up a CNAME from the domain we have to serve to the Load Balancers CNAME.
Until today everything worked like a charm. Today we’re trying to issue a certificate for our jenkins instance called jenkins.schema31.it but we’re getting this error:
"The following errors were reported by the server:
Domain: jenkins.schema31.it Type: connection Detail: too many CNAMEs when looking up CAA
To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address."
But frankly I don’t really get what he’s talking about…
We recently had to adjust our CAA checking implementation to handle CNAMEs differently. As part of that we added a threshold for the maximum number of CNAME dereferences we would follow. Another user opened a Boulder bug about this limit being too low.
It does seem like in your case the limit is being reached without successive CNAMEs and I suspect there may be a bug in the implementation. I recommend you follow Issue #3093 while we get to the bottom of the problem.
I stand corrected: @jsha points out this actually is a loop:
If you tree-climb on frontend.gcloud.schema31.it., you get gcloud.schema31.it. That's a CNAME to frontend.gcloud.schema31.it., so you tree-climb on the CNAME target, which sends you back to gcloud.schema31.it, etc.
You have a loop per the CAA RFC: nayarweb.com is CNAME’d to haproxy.nayarweb.com. Which when climbed will result in a lookup for nayarweb.com's CAA record, which results in a CNAME to haproxy.nayarweb.com and so on.