<
command>dnssec-dsfromkey</
command>
<
arg><
option>-v <
replaceable class="parameter">level</
replaceable></
option></
arg>
<
arg><
option>-1</
option></
arg>
<
arg><
option>-2</
option></
arg>
<
arg><
option>-a <
replaceable class="parameter">alg</
replaceable></
option></
arg>
<
arg choice="req">keyfile</
arg>
<
command>dnssec-dsfromkey</
command>
<
arg choice="req">-s</
arg>
<
arg><
option>-v <
replaceable class="parameter">level</
replaceable></
option></
arg>
<
arg><
option>-1</
option></
arg>
<
arg><
option>-2</
option></
arg>
<
arg><
option>-a <
replaceable class="parameter">alg</
replaceable></
option></
arg>
<
arg><
option>-c <
replaceable class="parameter">class</
replaceable></
option></
arg>
<
arg><
option>-d <
replaceable class="parameter">dir</
replaceable></
option></
arg>
<
arg choice="req">dnsname</
arg>
<
title>DESCRIPTION</
title>
<
para><
command>dnssec-dsfromkey</
command>
outputs the Delegation Signer (DS) resource record RR, as defined in RFC 3658
and RFC 4509, for the given key(s).
Use SHA-1 as the digest algorithm (the default is to use
Use SHA-256 as the digest algorithm.
<
term>-a <
replaceable class="parameter">algorithm</
replaceable></
term>
Select the digest algorithm. The value of
<
option>algorithm</
option> must be one of SHA-1 (SHA1) or
SHA-256 (SHA256). These values are case insensitive.
<
term>-v <
replaceable class="parameter">level</
replaceable></
term>
Sets the debugging level.
Keyset mode: in place of the keyfile name, the argument is
the DNS domain name of a keyset file. Following options make sense
<
term>-c <
replaceable class="parameter">class</
replaceable></
term>
Specifies the DNS class (default is IN), useful only
<
term>-d <
replaceable class="parameter">directory</
replaceable></
term>
Look for <
filename>keyset</
filename> files in
<
option>directory</
option> as the directory, ignored when
To build the SHA-256 DS RR from the
keyfile name, the following command would be issued:
<
para><
userinput>dnssec-dsfromkey -2
Kexample.com.+003+26160</
userinput>
The command would print something like:
<
para><
userinput>
example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</
userinput>
The keyfile can be designed by the key identification
<
filename>Knnnn.+aaa+iiiii</
filename> or the full file name
<
filename>Knnnn.+aaa+
iiiii.key</
filename> as generate by
<
refentrytitle>dnssec-keygen</
refentrytitle><
manvolnum>8</
manvolnum>.
The keyset file name is built from the <
option>directory</
option>,
the string <
filename>keyset-</
filename> and the
<
option>dnsname</
option>.
A keyfile error can give a "file not found" even if the file exists.
<
refentrytitle>dnssec-keygen</
refentrytitle><
manvolnum>8</
manvolnum>
<
refentrytitle>dnssec-signzone</
refentrytitle><
manvolnum>8</
manvolnum>
<
citetitle>BIND 9 Administrator Reference Manual</
citetitle>,
<
citetitle>RFC 3658</
citetitle>,
<
citetitle>RFC 4509</
citetitle>.
<
para><
corpauthor>Internet Systems Consortium</
corpauthor>
<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN" [<!ENTITY mdash "—">]> - Copyright (C) 2008 Internet Systems Consortium, Inc. ("ISC") - Permission to use, copy, modify, and/or distribute this software for any - purpose with or without fee is hereby granted, provided that the above - copyright notice and this permission notice appear in all copies. - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. <
date>november 29, 2008</
date>
<
refentrytitle><
application>dnssec-dsfromkey</
application></
refentrytitle>
<
refmiscinfo>BIND9</
refmiscinfo>
<
refname><
application>dnssec-dsfromkey</
application></
refname>
<
refpurpose>DNSSEC DS RR generation tool</
refpurpose>
<
holder>Internet Systems Consortium, Inc. ("ISC")</
holder>
<
command>dnssec-dsfromkey</
command>
<
arg><
option>-v <
replaceable class="parameter">level</
replaceable></
option></
arg>
<
arg><
option>-1</
option></
arg>
<
arg><
option>-2</
option></
arg>
<
arg><
option>-a <
replaceable class="parameter">alg</
replaceable></
option></
arg>
<
arg choice="req">keyfile</
arg>
<
command>dnssec-dsfromkey</
command>
<
arg choice="req">-s</
arg>
<
arg><
option>-v <
replaceable class="parameter">level</
replaceable></
option></
arg>
<
arg><
option>-1</
option></
arg>
<
arg><
option>-2</
option></
arg>
<
arg><
option>-a <
replaceable class="parameter">alg</
replaceable></
option></
arg>
<
arg><
option>-c <
replaceable class="parameter">class</
replaceable></
option></
arg>
<
arg><
option>-d <
replaceable class="parameter">dir</
replaceable></
option></
arg>
<
arg choice="req">dnsname</
arg>
<
title>DESCRIPTION</
title>
<
para><
command>dnssec-dsfromkey</
command>
outputs the Delegation Signer (DS) resource record RR, as defined in RFC 3658
and RFC 4509, for the given key(s).
Use SHA-1 as the digest algorithm (the default is to use
Use SHA-256 as the digest algorithm.
<
term>-a <
replaceable class="parameter">algorithm</
replaceable></
term>
Select the digest algorithm. The value of
<
option>algorithm</
option> must be one of SHA-1 (SHA1) or
SHA-256 (SHA256). These values are case insensitive.
<
term>-v <
replaceable class="parameter">level</
replaceable></
term>
Sets the debugging level.
Keyset mode: in place of the keyfile name, the argument is
the DNS domain name of a keyset file. Following options make sense
<
term>-c <
replaceable class="parameter">class</
replaceable></
term>
Specifies the DNS class (default is IN), useful only
<
term>-d <
replaceable class="parameter">directory</
replaceable></
term>
Look for <
filename>keyset</
filename> files in
<
option>directory</
option> as the directory, ignored when
To build the SHA-256 DS RR from the
keyfile name, the following command would be issued:
<
para><
userinput>dnssec-dsfromkey -2
Kexample.com.+003+26160</
userinput>
The command would print something like:
<
para><
userinput>
example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</
userinput>
The keyfile can be designed by the key identification
<
filename>Knnnn.+aaa+iiiii</
filename> or the full file name
<
filename>Knnnn.+aaa+
iiiii.key</
filename> as generate by
<
refentrytitle>dnssec-keygen</
refentrytitle><
manvolnum>8</
manvolnum>.
The keyset file name is built from the <
option>directory</
option>,
the string <
filename>keyset-</
filename> and the
<
option>dnsname</
option>.
A keyfile error can give a "file not found" even if the file exists.
<
refentrytitle>dnssec-keygen</
refentrytitle><
manvolnum>8</
manvolnum>
<
refentrytitle>dnssec-signzone</
refentrytitle><
manvolnum>8</
manvolnum>
<
citetitle>BIND 9 Administrator Reference Manual</
citetitle>,
<
citetitle>RFC 3658</
citetitle>,
<
citetitle>RFC 4509</
citetitle>.
<
para><
corpauthor>Internet Systems Consortium</
corpauthor>