dnssec-dsfromkey.html revision 22be030b50b0aeab5c869507f34863ba1cec5bd3
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Copyright (C) 2008-2012, 2014, 2015 Internet Systems Consortium, Inc. ("ISC")
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<!-- $Id$ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="application">dnssec-dsfromkey</span> — DNSSEC DS RR generation tool</p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-C</code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] {keyfile}</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-h</code>] [<code class="option">-V</code>]</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">dnssec-dsfromkey</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein outputs the Delegation Signer (DS) resource record (RR), as defined in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RFC 3658 and RFC 4509, for the given key(s).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use SHA-1 as the digest algorithm (the default is to use
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein both SHA-1 and SHA-256).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use SHA-256 as the digest algorithm.
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews Select the digest algorithm. The value of
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews <code class="option">algorithm</code> must be one of SHA-1 (SHA1),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein SHA-256 (SHA256), GOST or SHA-384 (SHA384).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These values are case insensitive.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Generate CDS records rather than DS records. This is mutually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein exclusive with generating lookaside records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-T <em class="replaceable"><code>TTL</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies the TTL of the DS records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Look for key files (or, in keyset mode,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Zone file mode: in place of the keyfile name, the argument is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the DNS domain name of a zone master file, which can be read
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from <code class="option">file</code>. If the zone name is the same as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">file</code>, then it may be omitted.
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson If <code class="option">file</code> is set to <code class="literal">"-"</code>, then
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson the zone data is read from the standard input. This makes it
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce possible to use the output of the <span><strong class="command">dig</strong></span>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce command as input, as in:
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <strong class="userinput"><code>dig dnskey example.com | dnssec-dsfromkey -f - example.com</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Include ZSKs when generating DS records. Without this option,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only keys which have the KSK flag set will be converted to DS
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews records and printed. Useful only in zone file mode.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Generate a DLV set instead of a DS set. The specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">domain</code> is appended to the name for each
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein record in the set.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The DNSSEC Lookaside Validation (DLV) RR is described
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson in RFC 4431. This is mutually exclusive with generating
575e532437cf7f203707765e21767db92fa1e480Mark Andrews CDS records.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Keyset mode: in place of the keyfile name, the argument is
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce the DNS domain name of a keyset file.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Specifies the DNS class (default is IN). Useful only
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce in keyset or zone file mode.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Sets the debugging level.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Prints usage information.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Prints version information.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To build the SHA-256 DS RR from the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>Kexample.com.+003+26160</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keyfile name, the following command would be issued:
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The command would print something like:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The keyfile can be designed by the key identification
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="refentrytitle">dnssec-keygen</span>(8).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The keyset file name is built from the <code class="option">directory</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the string <code class="filename">keyset-</code> and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A keyfile error can give a "file not found" even if the file exists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="corpauthor">Internet Systems Consortium</span>