Hi JP,
to answer the question from the subject: yes, changing the policy shall
always be a safe operation. Moreover, if you use automatic key
management, then sometimes a change in the policy may trigger some kind
of roll-over: changing algorithm kicks-off algorithm roll-over, changing
ksk-lifetime to lower value might cause immediate KSK roll-over and so
on. Knot simply starts following new rules.
You can also change the policy name, which has no meaning EXCEPT for
shared-ksk. Please don't change it if you use automatic key management
with shared KSK among zones.
You can also freely set/unset manual policy. Whenever the policy is
manual, no automatic key roll-overs take place, regardless if they are
one-time or regular. Currently running roll-over would be effectively
frozen.
I doubt anyone who can mistakenly write `knotc zone-key-rollover` can't
also mistakenly alter knot configuration :) Unfortunately, we have not
implemented any parental control yet. However, you can perhaps write
some wrapper on top of knotc to ensure limited set of knotc commands
available.
Libor
Dne 17. 07. 23 v 9:52 Jan-Piet Mens napsal(a):
I have a zone for which I'd like to ensure an
admin cannot mistakenly
kick off
a KSK rollover, so I am considering setting configuring its
dnssec-policy to
one with `manual: on' which prevents even a `knotc zone-key-rollover'
on it. I
have experimented with switching `manual: on' to `manual: off', and
the idea
seems to work. I have also apparently successfully been able to alter
`ksk-lifetime', and have not noticed anything going wrong.
Based on this, I wish to know if it is considered safe to alter many
(all?) of
a policy's settings, as long as neither algorithm nor key sizes are
changed, and
whether it is safe to alter the policy itself (i.e. also change a policy
name for a zone).
ksk-lifetime, delays, rrsig-lifetimes, ksk-submission, etc.: can all
these be
changed without breaking signing of a zone?
Thank you & regards,
-JP
--