diff --git a/doc/arm/Bv9ARM-book.xml b/doc/arm/Bv9ARM-book.xml
index 3c90ae3958..a452d3011e 100644
--- a/doc/arm/Bv9ARM-book.xml
+++ b/doc/arm/Bv9ARM-book.xml
@@ -2101,41 +2101,36 @@ allow-update { !{ !localnets; any; }; key host1-host2. ;};
- A secure zone must contain one or more zone keys. The
- zone keys will sign all other records in the zone, as well as
- the zone keys of any secure delegated zones. Zone keys must
- have the same name as the zone, a name type of
- ZONE, and must be usable for
- authentication.
- It is recommended that zone keys use a cryptographic algorithm
- designated as "mandatory to implement" by the IETF; currently
- the only one is RSASHA1.
+ A secure zone must contain one or more zone keys. The zone keys will
+ sign all other records in the zone, as well as the zone keys of any
+ secure delegated zones. Zone keys must have the same name as the
+ zone, a name type of ZONE, and must be usable for
+ authentication. It is recommended that zone keys use a cryptographic
+ algorithm designated as "mandatory to implement" by the IETF;
+ currently the are two algorithms: RSASHA256 and ECDSAP256SHA256.
+ ECDSAP256SHA256 is recommended for current and future deployments.
- The following command will generate a 768-bit RSASHA1 key for
+ The following command will generate a ECDSAP256SHA256 key for
the child.example zone:
- dnssec-keygen -a RSASHA1 -b 768 -n ZONE child.example.
+ dnssec-keygen -a ECDSAP256SHA256 -n ZONE child.example.
Two output files will be produced:
- Kchild.example.+005+12345.key and
- Kchild.example.+005+12345.private
- (where
- 12345 is an example of a key tag). The key filenames contain
- the key name (child.example.),
- algorithm (3
- is DSA, 1 is RSAMD5, 5 is RSASHA1, etc.), and the key tag (12345 in
- this case).
- The private key (in the .private
- file) is
- used to generate signatures, and the public key (in the
- .key file) is used for signature
- verification.
+ Kchild.example.+013+12345.key and
+ Kchild.example.+013+12345.private (where 12345 is
+ an example of a key tag). The key filenames contain the key name
+ (child.example.), algorithm (5 is RSASHA1, 8 is
+ RSASHA256, 13 is ECDSAP256SHA256, 15 is ED25519 etc.), and the key tag
+ (12345 in this case). The private key (in the
+ .private file) is used to generate signatures,
+ and the public key (in the .key file) is used for
+ signature verification.