Re: Changing the DNSSEC algorithm

2022-04-11 Thread Matthijs Mekking
Hi, BIND 9.16 has dnssec-policy that makes algorithm rollover much easier. I recommend you start using that. Read more on migrating to dnssec-policy here: https://kb.isc.org/docs/dnssec-key-and-signing-policy Best regards, Matthijs On 06-04-2022 21:47, Danilo Godec via bind-users

Re: Changing the DNSSEC algorithm

2022-04-06 Thread Danilo Godec via bind-users
I read several articles regarding algorithm rollover, including: * https://www.dns.cam.ac.uk/news/2020-01-15-rollover.html * https://downloads.isc.org/isc/bind9/9.16.6/doc/arm/html/advanced.html#dnssec-dynamic-zones-and-automatic-signing

Re: Changing the DNSSEC algorithm

2022-04-06 Thread Danilo Godec via bind-users
On 6.4.2022 8:52, Daniel Stirnimann wrote: Hello Danilo, A simple schema to change DNSSEC algorithms is as follows: 1. Add new KSK/ZSK and double sign DNSKEY and all zone RRs with both the new and old algorithm 2. Replace DS at parent 3. Remove old DNSKEY and all RRSIGs from the old

Re: Changing the DNSSEC algorithm

2022-04-06 Thread Petr Menšík
Hi Danilo, I think the way you have describe should work. But can I ask what source this recipe has? I have seen recently similar signing in one of our test. I guess this should be from public recipe. Would you share its origin, please? I would recommend having DNS server do the job of

Re: Changing the DNSSEC algorithm

2022-04-06 Thread Daniel Stirnimann
Hello Danilo, A simple schema to change DNSSEC algorithms is as follows: 1. Add new KSK/ZSK and double sign DNSKEY and all zone RRs with both the new and old algorithm 2. Replace DS at parent 3. Remove old DNSKEY and all RRSIGs from the old algorithm Before step 2 wait the max zone TTL to

Changing the DNSSEC algorithm

2022-04-05 Thread Danilo Godec via bind-users
Hello, I implemented DNSSEC for my personal domain a good while ago with an older Bind and back then, I used RSASHA1-NSEC3-SHA1 algorithm, which by now is not recommended... So I'm going to change the algorithm, probably to ECDSAP256SHA256, which should also be NSEC3 capable. Since my