Hi,

Depends on what your DNSSEC configuration is. Are you using dnssec-signzone/named? auto-dnssec maintain? inline-signing? dnssec-policy? dnssec-keymgr?

Yes there are a lot of ways to maintain DNSSEC in BIND. The recommended way forward is to use dnssec-policy. Migrating to it may still be a bit tricky*, but once you use it, changing a new signing algorithm is pretty simple:

1. Update your dnssec-policy, reload config.
2. Wait a little bit.
3. When the new DS is in the parent, run "rndc dnssec -checkds published
   on the right key id."
4. Also run "rndc dnssec -checkds withdrawn" on the id of the key that
   has its DS removed from the parent.
5. Have a celebratory drink.

Algorithm rollover with dnssec-policy will gracefully transition to the keys with the new algorithms, so during the rollover period you should see your zone being signed with two algorithms.

Best regards,

Matthijs


*In principal you can just switch to dnssec-policy with your existing key files and BIND will initialize key state files for those keys. But there is at least one known bug that deleted keys may be used again for signing (those deleted keys still have their key files in the key directory). [GL #2406]


On 01-02-2021 14:40, @lbutlr wrote:
I've been using alg-7 for DNS, but that is no longer recommended. How difficult 
is it to change the signing algorithm and what is the process (Bind 9.16.11)?


_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to