On 2021-12-15 13:01, Anand Buddhdev wrote:
On 15/12/2021 20:18, Chris wrote:
Hi Chris,
[snip config details]
How would I best make this change? Is it enough
to simply change algorithm:
and knot will just do the right thing?
Yes, please! Just change the algorithm and let Knot do its thing. It will do
the
right thing. Please do *not* fiddle with things manually. DNSSEC is complex,
and
algorithm roll-overs require care. The developers of Knot have put in a lot
of
care into handling algorithm roll-overs. Trust their expertise.
Thanks for the
reply, Anand! :-)
I'm well aware of all the complexities, and am well confident in knots
abilities
to DTRT. But "stuff" happens. fe; after creating the additional policy
some of the zones are _also_ adopting that new policy as _well_ as the
original
policy. IOW there are some zones with both RSASHA1 _and_ RSASHA256 hashes in
them.
config (diffs):
policy:
- id: rsa1
algorithm: RSASHA1
zsk-size: 1024
policy:
- id: rsa2
algorithm: RSASHA256
zsk-size: 2048
ALL zones but the test zone mentioned earlier:
- domain: domain.name
...
dnssec-signing: on
dnssec-policy: rsa1
So why do (some) zones arbitrarily pick up the added policy when it
it is not the policy declared within the domain block?
IOW dnssec-policy: rsa1 is the only dnssec-policy listed within all the
domain blocks, and it's listed within all of the domain blocks, save
the earlier test domain. So "stuff" happened. :-/
Thanks again, for taking the time to respond, Anand.
-- Chris
Regards,
Anand