On 2021-12-15 23:44, Daniel Salzman wrote:
  Hi Chris,
 On 12/15/21 10:28 PM, Chris wrote:
  On 2021-12-15 13:01, Anand Buddhdev wrote:
  On 15/12/2021 20:18, Chris wrote:
 Hi Chris,
 [snip config details]
  How would I best make this change? Is it enough
to simply change
 algorithm:
 and knot will just do the right thing? 
 Yes, please! Just change the algorithm and let Knot do its thing. It will
 do the
 right thing. Please do *not* fiddle with things manually. DNSSEC is
 complex, and
 algorithm roll-overs require care. The developers of Knot have put in a
 lot of
 care into handling algorithm roll-overs. Trust their expertise. 
 Thanks for the
reply, Anand! :-)
 I'm well aware of all the complexities, and am well confident in knots
 abilities
 to DTRT. But "stuff" happens. fe; after creating the additional policy
 some of the zones are _also_ adopting that new policy as _well_ as the
 original
 policy. IOW there are some zones with both RSASHA1 _and_ RSASHA256 hashes
 in them. 
 One zone cannot use more DNSSEC policies! I think you are confused by
 ongoing algorithm
 rollover when there are both algorithms present in the zone (see
 
https://datatracker.ietf.org/doc/html/rfc6781#section-4.1.4). 
I don't think so.
But I think I'm probably saying it incorrectly.
Somehow after creating an additional policy "template" that defines RSASHA256
and a 2048 ZSK size. A couple of zones added 8/2 algo/digest to the 5/2
also/digest.
Which suggests to me that those zones arbitrarily picked up the new rsa2 I
added.
Even though the zone template for all the zones only state rsa1.
I'm nopt quite sure what to make of it. So I'll just freeze the offending
zones
and purge the history on them and recreate/sign them. I had intended to
convert them
all to the new RSASHA256 (rsa2) profile template anyway. Just hadn't intended
to do
it in the manner. ;-)
 config (diffs):
 policy:
   - id: rsa1
     algorithm: RSASHA1
     zsk-size: 1024
 policy:
   - id: rsa2
     algorithm: RSASHA256
     zsk-size: 2048
 ALL zones but the test zone mentioned earlier:
   - domain: domain.name
     ...
     dnssec-signing: on
     dnssec-policy: rsa1
 So why do (some) zones arbitrarily pick up the added policy when it
 it is not the policy declared within the domain block? 
 Isn't it possible that the policy is declared in a zone template? 
 (technically)
answered above. But no. I define the DNSSEC policy separately.
Give it an id, then use the id within each domain/zone block.
Thanks for the reply, Daniel. :-)
-- Chris
 Daniel
> IOW dnssec-policy: rsa1 is the only dnssec-policy listed within all the
> domain blocks, and it's listed within all of the domain blocks, save
> the earlier test domain. So "stuff" happened. :-/
>
> Thanks again, for taking the time to respond, Anand.
>
> -- Chris
>>
>> Regards,
>> Anand