Skip to main content

Remediation: nlnetlabs.nl

Scan #16232 · 25 Apr 2026, 15:23 UTC · Achievable posture: Low Risk

4 remediation items found. Click any record value to copy it to your clipboard, then paste it into your DNS provider.

Provider Quick Guide

  1. Log in to dash.cloudflare.com and select your domain
  2. Go to DNS → Records
  3. Click Add Record
  4. Select the Type shown below (TXT, CNAME, MX, etc.)
  5. Paste the Name (host) and Content (value) from each card below
  6. Set Proxy status to DNS only (grey cloud) for email records
  7. Click Save
  1. Log in to dcc.godaddy.com
  2. Select your domain, then click DNS (or Manage DNS)
  3. Scroll to DNS Records and click Add New Record
  4. Select the Type shown below
  5. In Name, enter the host (use @ for the root domain)
  6. In Value, paste the record value from the card below
  7. Click Save
  1. Log in to your DNS hosting provider's control panel
  2. Navigate to DNS Management or Zone Editor
  3. Add a new record with the type, host, and value shown in each card below
  4. For the host field, use @ if your provider requires it for the root domain
  5. Save and allow up to 24–48 hours for propagation (usually much faster)

DNS Records to Add or Update

High DMARC Upgrade DMARC from p=none

Your DMARC policy is monitor-only (p=none). Upgrade to p=quarantine or p=reject after reviewing reports to actively prevent spoofing.

A quarantine or reject policy instructs receivers to take action on failing mail.
Record Type
TXT
Host / Name (DMARC policy record)
_dmarc.nlnetlabs.nl
Value / Content
v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@nlnetlabs.nl
Full record (click to copy)
_dmarc.nlnetlabs.nl TXT v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@nlnetlabs.nl
Low CAA Add CAA Records

CAA records specify which Certificate Authorities may issue certificates for your domain, reducing the risk of unauthorized certificate issuance.

CAA constrains which CAs can issue certificates for this domain.
Record Type
CAA
Host / Name (root of domain — adjust CA to match your provider)
nlnetlabs.nl
Value / Content
0 issue "letsencrypt.org"
Full record (click to copy)
nlnetlabs.nl CAA 0 issue "letsencrypt.org"
Low TLS-RPT Add TLS-RPT Reporting

Your domain has DNSSEC + DANE — the strongest email transport security available. TLS-RPT (TLS Reporting) sends you reports about TLS connection failures when other servers try to deliver mail to your domain.

TLS-RPT sends you reports about TLS connection failures to your mail servers.
Record Type
TXT
Host / Name (SMTP TLS reporting record)
_smtp._tls.nlnetlabs.nl
Value / Content
v=TLSRPTv1; rua=mailto:tls-reports@nlnetlabs.nl
Full record (click to copy)
_smtp._tls.nlnetlabs.nl TXT v=TLSRPTv1; rua=mailto:tls-reports@nlnetlabs.nl
Low MTA-STS Deploy MTA-STS

MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.

MTA-STS tells sending servers to require TLS when delivering mail to your domain.
Record Type
TXT
Host / Name (MTA-STS policy record)
_mta-sts.nlnetlabs.nl
Value / Content
v=STSv1; id=nlnetlabs.nl
Full record (click to copy)
_mta-sts.nlnetlabs.nl TXT v=STSv1; id=nlnetlabs.nl

Done making changes?

After updating your DNS records, run a new scan to verify everything is correct. DNS changes typically propagate within minutes, but can take up to 48 hours.

Re-Scan nlnetlabs.nl
Straight talk about your data.

We use two cookies, both essential:

  • _csrf — Prevents cross-site request forgery. Required for form submissions. Security-only.
  • _dns_session — Only exists if you choose to sign in. No account required to use DNS Tool.

We log your IP address for two reasons: rate limiting (so nobody abuses the service) and security (identifying malicious actors and complying with legal obligations). We check source geography for analysis accuracy — DNS responses vary by region, and knowing which resolver answered from where makes the science better.

No tracking cookies. No analytics cookies. No ad networks. No data brokers. Our code is open-core — the application framework is publicly available under BUSL-1.1 with timed Apache-2.0 conversion. Verify it yourself.

If you create an account and want out, account deletion removes your login and scan history. Public domain analyses remain available because they contain only public DNS records, already hashed. Full details: Privacy Policy.