196N/A - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC") 0N/A - Copyright (C) 2000-2003 Internet Software Consortium. 0N/A - Permission to use, copy, modify, and/or distribute this software for any 0N/A - purpose with or without fee is hereby granted, provided that the above 0N/A - copyright notice and this permission notice appear in all copies. 0N/A - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 0N/A - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 0N/A - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 0N/A - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 0N/A - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 0N/A - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 0N/A - PERFORMANCE OF THIS SOFTWARE. 0N/A<
meta http-
equiv="Content-Type" content="text/html; charset=ISO-8859-1">
0N/A<
title>dnssec-dsfromkey</
title>
0N/A<
meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
0N/A<
link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
0N/A<
body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
0N/A<
div class="navheader">
0N/A<
table width="100%" summary="Navigation header">
0N/A<
tr><
th colspan="3" align="center"><
span class="application">dnssec-dsfromkey</
span></
th></
tr>
0N/A<
td width="20%" align="left">
258N/A<
th width="60%" align="center">Manual pages</
th>
0N/A<
div class="refentry" lang="en">
0N/A<
div class="refnamediv">
0N/A<
p><
span class="application">dnssec-dsfromkey</
span> — DNSSEC DS RR generation tool</
p>
0N/A<
div class="refsynopsisdiv">
0N/A<
div class="cmdsynopsis"><
p><
code class="command">dnssec-dsfromkey</
code> [<
code class="option">-v <
em class="replaceable"><
code>level</
code></
em></
code>] [<
code class="option">-1</
code>] [<
code class="option">-2</
code>] [<
code class="option">-a <
em class="replaceable"><
code>alg</
code></
em></
code>] [<
code class="option">-C</
code>] [<
code class="option">-l <
em class="replaceable"><
code>domain</
code></
em></
code>] [<
code class="option">-T <
em class="replaceable"><
code>TTL</
code></
em></
code>] {keyfile}</
p></
div>
0N/A<
div class="cmdsynopsis"><
p><
code class="command">dnssec-dsfromkey</
code> {-s} [<
code class="option">-1</
code>] [<
code class="option">-2</
code>] [<
code class="option">-a <
em class="replaceable"><
code>alg</
code></
em></
code>] [<
code class="option">-K <
em class="replaceable"><
code>directory</
code></
em></
code>] [<
code class="option">-l <
em class="replaceable"><
code>domain</
code></
em></
code>] [<
code class="option">-s</
code>] [<
code class="option">-c <
em class="replaceable"><
code>class</
code></
em></
code>] [<
code class="option">-T <
em class="replaceable"><
code>TTL</
code></
em></
code>] [<
code class="option">-f <
em class="replaceable"><
code>file</
code></
em></
code>] [<
code class="option">-A</
code>] [<
code class="option">-v <
em class="replaceable"><
code>level</
code></
em></
code>] {dnsname}</
p></
div>
0N/A<
div class="cmdsynopsis"><
p><
code class="command">dnssec-dsfromkey</
code> [<
code class="option">-h</
code>] [<
code class="option">-V</
code>]</
p></
div>
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2621340"></
a><
h2>DESCRIPTION</
h2>
0N/A<
p><
span><
strong class="command">dnssec-dsfromkey</
strong></
span>
0N/A outputs the Delegation Signer (DS) resource record (RR), as defined in
0N/A RFC 3658 and RFC 4509, for the given key(s).
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2621354"></
a><
h2>OPTIONS</
h2>
0N/A<
div class="variablelist"><
dl>
0N/A<
dt><
span class="term">-1</
span></
dt>
0N/A Use SHA-1 as the digest algorithm (the default is to use
0N/A both SHA-1 and SHA-256).
0N/A<
dt><
span class="term">-2</
span></
dt>
0N/A Use SHA-256 as the digest algorithm.
0N/A<
dt><
span class="term">-a <
em class="replaceable"><
code>algorithm</
code></
em></
span></
dt>
0N/A Select the digest algorithm. The value of
0N/A <
code class="option">algorithm</
code> must be one of SHA-1 (SHA1),
0N/A SHA-256 (SHA256), GOST or SHA-384 (SHA384).
0N/A These values are case insensitive.
0N/A<
dt><
span class="term">-C</
span></
dt>
0N/A Generate CDS records rather than DS records. This is mutually
0N/A exclusive with generating lookaside records.
0N/A<
dt><
span class="term">-T <
em class="replaceable"><
code>TTL</
code></
em></
span></
dt>
0N/A Specifies the TTL of the DS records.
0N/A<
dt><
span class="term">-K <
em class="replaceable"><
code>directory</
code></
em></
span></
dt>
0N/A Look for key files (or, in keyset mode,
0N/A <
code class="filename">keyset-</
code> files) in
0N/A <
code class="option">directory</
code>.
0N/A<
dt><
span class="term">-f <
em class="replaceable"><
code>file</
code></
em></
span></
dt>
0N/A Zone file mode: in place of the keyfile name, the argument is
0N/A the DNS domain name of a zone master file, which can be read
0N/A from <
code class="option">file</
code>. If the zone name is the same as
0N/A <
code class="option">file</
code>, then it may be omitted.
0N/A If <
code class="option">file</
code> is set to <
code class="literal">"-"</
code>, then
0N/A the zone data is read from the standard input. This makes it
0N/A possible to use the output of the <
span><
strong class="command">dig</
strong></
span>
0N/A command as input, as in:
0N/A<
dt><
span class="term">-A</
span></
dt>
0N/A Include ZSKs when generating DS records. Without this option,
0N/A only keys which have the KSK flag set will be converted to DS
0N/A records and printed. Useful only in zone file mode.
0N/A<
dt><
span class="term">-l <
em class="replaceable"><
code>domain</
code></
em></
span></
dt>
0N/A Generate a DLV set instead of a DS set. The specified
0N/A <
code class="option">domain</
code> is appended to the name for each
0N/A The DNSSEC Lookaside Validation (DLV) RR is described
0N/A in RFC 4431. This is mutually exclusive with generating
258N/A<
dt><
span class="term">-s</
span></
dt>
0N/A Keyset mode: in place of the keyfile name, the argument is
0N/A the DNS domain name of a keyset file.
0N/A<
dt><
span class="term">-c <
em class="replaceable"><
code>class</
code></
em></
span></
dt>
0N/A Specifies the DNS class (default is IN). Useful only
0N/A in keyset or zone file mode.
0N/A<
dt><
span class="term">-v <
em class="replaceable"><
code>level</
code></
em></
span></
dt>
0N/A Sets the debugging level.
0N/A<
dt><
span class="term">-h</
span></
dt>
0N/A Prints usage information.
0N/A<
dt><
span class="term">-V</
span></
dt>
0N/A Prints version information.
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2622312"></
a><
h2>EXAMPLE</
h2>
0N/A To build the SHA-256 DS RR from the
0N/A keyfile name, the following command would be issued:
0N/A<
p><
strong class="userinput"><
code>dnssec-dsfromkey -2
Kexample.com.+003+26160</
code></
strong>
0N/A The command would print something like:
0N/A<
p><
strong class="userinput"><
code>
example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</
code></
strong>
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2622348"></
a><
h2>FILES</
h2>
0N/A The keyfile can be designed by the key identification
0N/A <
code class="filename">Knnnn.+aaa+iiiii</
code> or the full file name
0N/A <
code class="filename">Knnnn.+aaa+
iiiii.key</
code> as generated by
0N/A <
span class="refentrytitle">dnssec-keygen</
span>(8).
0N/A The keyset file name is built from the <
code class="option">directory</
code>,
0N/A the string <
code class="filename">keyset-</
code> and the
0N/A <
code class="option">dnsname</
code>.
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2622390"></
a><
h2>CAVEAT</
h2>
0N/A A keyfile error can give a "file not found" even if the file exists.
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2623492"></
a><
h2>SEE ALSO</
h2>
0N/A<
p><
span class="citerefentry"><
span class="refentrytitle">dnssec-keygen</
span>(8)</
span>,
0N/A <
span class="citerefentry"><
span class="refentrytitle">dnssec-signzone</
span>(8)</
span>,
0N/A <
em class="citetitle">BIND 9 Administrator Reference Manual</
em>,
0N/A <
em class="citetitle">RFC 3658</
em>,
0N/A <
em class="citetitle">RFC 4431</
em>.
0N/A <
em class="citetitle">RFC 4509</
em>.
0N/A<
div class="refsect1" lang="en">
0N/A<
a name="id2623531"></
a><
h2>AUTHOR</
h2>
0N/A<
p><
span class="corpauthor">Internet Systems Consortium</
span>
0N/A<
div class="navfooter">
0N/A<
table width="100%" summary="Navigation footer">
0N/A<
td width="40%" align="left">
0N/A<
td width="40%" align="left" valign="top">
0N/A<
span class="application">dnssec-coverage</
span>�</
td>
0N/A<
td width="20%" align="center"><
a accesskey="h" href="Bv9ARM.html">Home</
a></
td>
0N/A<
td width="40%" align="right" valign="top">�<
span class="application">dnssec-importkey</
span>
0N/A<
p style="text-align: center;">BIND 9.11.0pre-alpha</
p>