dnssec-verify.docbook revision 30eec077db2bdcb6f2a0dc388a3cdde2ede75ec1
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun<!--
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - Copyright (C) 2012, 2014, 2015 Internet Systems Consortium, Inc. ("ISC")
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun -
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - Permission to use, copy, modify, and/or distribute this software for any
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - purpose with or without fee is hereby granted, provided that the above
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - copyright notice and this permission notice appear in all copies.
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun -
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun - PERFORMANCE OF THIS SOFTWARE.
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun-->
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun<!-- Converted by db4-upgrade version 1.0 -->
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun<refentry xmlns="http://docbook.org/ns/docbook" version="5.0" xml:id="man.dnssec-verify">
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <info>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <date>2014-01-15</date>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </info>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refentryinfo>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <corpname>ISC</corpname>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <corpauthor>Internet Systems Consortium, Inc.</corpauthor>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </refentryinfo>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refmeta>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refentrytitle><application>dnssec-verify</application></refentrytitle>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <manvolnum>8</manvolnum>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refmiscinfo>BIND9</refmiscinfo>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </refmeta>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refnamediv>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refname><application>dnssec-verify</application></refname>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refpurpose>DNSSEC zone verification tool</refpurpose>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </refnamediv>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <docinfo>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <copyright>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <year>2012</year>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <year>2014</year>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <year>2015</year>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <holder>Internet Systems Consortium, Inc. ("ISC")</holder>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </copyright>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </docinfo>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refsynopsisdiv>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <cmdsynopsis sepchar=" ">
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <command>dnssec-verify</command>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-c <replaceable class="parameter">class</replaceable></option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-E <replaceable class="parameter">engine</replaceable></option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-I <replaceable class="parameter">input-format</replaceable></option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-o <replaceable class="parameter">origin</replaceable></option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-v <replaceable class="parameter">level</replaceable></option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-V</option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-x</option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="opt" rep="norepeat"><option>-z</option></arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <arg choice="req" rep="norepeat">zonefile</arg>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </cmdsynopsis>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun </refsynopsisdiv>
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun
b9bf3918f6eaf7747bcbfbd02792bcbe4a052784nilgun <refsection><info><title>DESCRIPTION</title></info>
<para><command>dnssec-verify</command>
verifies that a zone is fully signed for each algorithm found
in the DNSKEY RRset for the zone, and that the NSEC / NSEC3
chains are complete.
</para>
</refsection>
<refsection><info><title>OPTIONS</title></info>
<variablelist>
<varlistentry>
<term>-c <replaceable class="parameter">class</replaceable></term>
<listitem>
<para>
Specifies the DNS class of the zone.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-E <replaceable class="parameter">engine</replaceable></term>
<listitem>
<para>
Specifies the cryptographic hardware to use, when applicable.
</para>
<para>
When BIND is built with OpenSSL PKCS#11 support, this defaults
to the string "pkcs11", which identifies an OpenSSL engine
that can drive a cryptographic accelerator or hardware service
module. When BIND is built with native PKCS#11 cryptography
(--enable-native-pkcs11), it defaults to the path of the PKCS#11
provider library specified via "--with-pkcs11".
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-I <replaceable class="parameter">input-format</replaceable></term>
<listitem>
<para>
The format of the input zone file.
Possible formats are <command>"text"</command> (default)
and <command>"raw"</command>.
This option is primarily intended to be used for dynamic
signed zones so that the dumped zone file in a non-text
format containing updates can be verified independently.
The use of this option does not make much sense for
non-dynamic zones.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-o <replaceable class="parameter">origin</replaceable></term>
<listitem>
<para>
The zone origin. If not specified, the name of the zone file
is assumed to be the origin.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-v <replaceable class="parameter">level</replaceable></term>
<listitem>
<para>
Sets the debugging level.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-V</term>
<listitem>
<para>
Prints version information.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-x</term>
<listitem>
<para>
Only verify that the DNSKEY RRset is signed with key-signing
keys. Without this flag, it is assumed that the DNSKEY RRset
will be signed by all active keys. When this flag is set,
it will not be an error if the DNSKEY RRset is not signed
by zone-signing keys. This corresponds to the <option>-x</option>
option in <command>dnssec-signzone</command>.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>-z</term>
<listitem>
<para>
Ignore the KSK flag on the keys when determining whether
the zone if correctly signed. Without this flag it is
assumed that there will be a non-revoked, self-signed
DNSKEY with the KSK flag set for each algorithm and
that RRsets other than DNSKEY RRset will be signed with
a different DNSKEY without the KSK flag set.
</para>
<para>
With this flag set, we only require that for each algorithm,
there will be at least one non-revoked, self-signed DNSKEY,
regardless of the KSK flag state, and that other RRsets
will be signed by a non-revoked key for the same algorithm
that includes the self-signed key; the same key may be used
for both purposes. This corresponds to the <option>-z</option>
option in <command>dnssec-signzone</command>.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>zonefile</term>
<listitem>
<para>
The file containing the zone to be signed.
</para>
</listitem>
</varlistentry>
</variablelist>
</refsection>
<refsection><info><title>SEE ALSO</title></info>
<para>
<citerefentry>
<refentrytitle>dnssec-signzone</refentrytitle><manvolnum>8</manvolnum>
</citerefentry>,
<citetitle>BIND 9 Administrator Reference Manual</citetitle>,
<citetitle>RFC 4033</citetitle>.
</para>
</refsection>
</refentry>