dnssec-dsfromkey.html revision 163af735c2082a024167be111d27bd5b5ff4f462
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - Copyright (C) 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - Permission to use, copy, modify, and/or distribute this software for any
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - purpose with or without fee is hereby granted, provided that the above
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - copyright notice and this permission notice appear in all copies.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews - PERFORMANCE OF THIS SOFTWARE.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<!-- $Id: dnssec-dsfromkey.html,v 1.11 2009/08/27 01:14:39 tbox Exp $ -->
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><span class="application">dnssec-dsfromkey</span> — DNSSEC DS RR generation tool</p>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] {keyfile}</p></div>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><span><strong class="command">dnssec-dsfromkey</strong></span>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews outputs the Delegation Signer (DS) resource record (RR), as defined in
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews RFC 3658 and RFC 4509, for the given key(s).
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Use SHA-1 as the digest algorithm (the default is to use
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews both SHA-1 and SHA-256).
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Use SHA-256 as the digest algorithm.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Select the digest algorithm. The value of
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="option">algorithm</code> must be one of SHA-1 (SHA1) or
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews SHA-256 (SHA256). These values are case insensitive.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Look for key files (or, in keyset mode,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="filename">keyset-</code> files) in
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Zone file mode: in place of the keyfile name, the argument is
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews the DNS domain name of a zone master file, which can be read
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews from <code class="option">file</code>. If the zone name is the same as
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="option">file</code>, then it may be omitted.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Include ZSK's when generating DS records. Without this option,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews only keys which have the KSK flag set will be converted to DS
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews records and printed. Useful only in zone file mode.
ba751492fcc4f161a18b983d4f018a1a52938cb9Evan Hunt<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Generate a DLV set instead of a DS set. The specified
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="option">domain</code> is appended to the name for each
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews record in the set.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews The DNSSEC Lookaside Validation (DLV) RR is described
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews in RFC 4431.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Keyset mode: in place of the keyfile name, the argument is
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews the DNS domain name of a keyset file.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Specifies the DNS class (default is IN). Useful only
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews in keyset or zone file mode.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews Sets the debugging level.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews To build the SHA-256 DS RR from the
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <strong class="userinput"><code>Kexample.com.+003+26160</code></strong>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews keyfile name, the following command would be issued:
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews The command would print something like:
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong>
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews The keyfile can be designed by the key identification
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <span class="refentrytitle">dnssec-keygen</span>(8).
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews The keyset file name is built from the <code class="option">directory</code>,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews the string <code class="filename">keyset-</code> and the
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews A keyfile error can give a "file not found" even if the file exists.
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
c3c8823fed039b3a2b8e5ca8bc2f3301d1dd840eMark Andrews<p><span class="corpauthor">Internet Systems Consortium</span>