On Wed, 20 Mar 2024 11:20:36 -0700,
Daniel Salzman wrote:
 Hi Randy,
 I cannot reproduce your problem. What does `keymgr sld.tld list` say? 
daniel:
< uncloaking so fok can probe externally.  the zone is net.lb
  the server is 
rip.psg.com >
so as to have as clear a test as i could, i
    # keymgr net.lb generate algorithm=rsasha256 ksk=yes zsk=yes
    1986ca221483d75a1045ab51afa26d1f8b62e88d
    # knotc reload
    Reloaded
    # keymgr net.lb ds
    net.lb. DS 8389 8 2 194b6f4571058ec4a39e13bd24159dd1d93242a60a23a8ea6a346c9b6ac8f3c5
    net.lb. DS 8389 8 4
ec5c1a343a710fb0488bea3fbd2d49b82ffe520d0ec8234d56fcd3c7f92229f5c675806353e7a16d88985ca6f77f290c
    < put the DSs in the parent, lb, zone file >
    # knotc zone-reload tld
    OK
no log warnings, at least not yet
i did a
    knotc zone-refresh net.lb
to see if i could provke whining.  nope.
https://dnssec-analyzer.verisignlabs.com for the net.lb says
    None of the 1 RRSIG and 2 DNSKEY records validate the NSEC RRset
    The NSEC RRset was not signed by any trusted keys
    Found DNSKEY, but no RRSIG, for algorithm 13
    No NSEC record could prove that no records of type A for net.lb exist
    Found 1 RRSIGs over SOA RRset
    None of the 1 RRSIG and 2 DNSKEY records validate the SOA RRset
dataviz, 
https://dnsviz.net/d/net.lb/dnssec/, paints a sad picture, if
one is into graphics
randy