Hi JP,

to answer the question from the subject: yes, changing the policy shall always be a safe operation. Moreover, if you use automatic key management, then sometimes a change in the policy may trigger some kind of roll-over: changing algorithm kicks-off algorithm roll-over, changing ksk-lifetime to lower value might cause immediate KSK roll-over and so on. Knot simply starts following new rules.

You can also change the policy name, which has no meaning EXCEPT for shared-ksk. Please don't change it if you use automatic key management with shared KSK among zones.

You can also freely set/unset manual policy. Whenever the policy is manual, no automatic key roll-overs take place, regardless if they are one-time or regular.  Currently running roll-over would be effectively frozen.

I doubt anyone who can mistakenly write `knotc zone-key-rollover` can't also mistakenly alter knot configuration :) Unfortunately, we have not implemented any parental control yet. However, you can perhaps write some wrapper on top of knotc to ensure limited set of knotc commands available.

Libor

Dne 17. 07. 23 v 9:52 Jan-Piet Mens napsal(a):
I have a zone for which I'd like to ensure an admin cannot mistakenly kick off a KSK rollover, so I am considering setting configuring its dnssec-policy to one with `manual: on' which prevents even a `knotc zone-key-rollover' on it. I have experimented with switching `manual: on' to `manual: off', and the idea
seems to work. I have also apparently successfully been able to alter
`ksk-lifetime', and have not noticed anything going wrong.

Based on this, I wish to know if it is considered safe to alter many (all?) of a policy's settings, as long as neither algorithm nor key sizes are changed, and
whether it is safe to alter the policy itself (i.e. also change a policy
name for a zone).
ksk-lifetime, delays, rrsig-lifetimes, ksk-submission, etc.: can all these be
changed without breaking signing of a zone?

Thank you & regards,

    -JP
--
--

Reply via email to