This may be the wrong mailing list but I cannot find another concerning DNSSEC  general.

When I originally setup DNSSEC I used the RSASHA1 algorithm as this seemed to be the only one that could be used with NSEC3.
However, further reading (and/or changes in DNSSEC) would indicate the RSASHA256... can also be used with NSEC3.
As a result I would like change algorithm. I am using my families domain rather than a live domain for testing  which would seem to give me one of two options.
1) delete the keys that have been published including the .ca (? forgotten tech term), publish new keys for the site and wait for the dust to settle. As the site is small, not heavily used and does not support anything critical this may be the simplest solution. Problem, I don't learn anything!
2)  generate new keys, publish them as new for rollover at all levels including TLD (?), on the date the current keys become inactive (or new keys become active) resign the domain.
I am not sure that 2 is correct, and additionally I am not sure that I want to take the delay.
?
--
John Allen
KLaM
------------------------------------------
OK, so what is the speed of dark?