man.dnssec-dsfromkey.html revision 150d28abc8fc6f8a3df17650c61ce1635aeb192c
392N/A<!--
392N/A - Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
392N/A - Copyright (C) 2000-2003 Internet Software Consortium.
785N/A -
392N/A - Permission to use, copy, modify, and/or distribute this software for any
392N/A - purpose with or without fee is hereby granted, provided that the above
392N/A - copyright notice and this permission notice appear in all copies.
392N/A -
392N/A - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
392N/A - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
392N/A - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
392N/A - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
392N/A - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
392N/A - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
392N/A - PERFORMANCE OF THIS SOFTWARE.
392N/A-->
392N/A<!-- $Id: man.dnssec-dsfromkey.html,v 1.104 2012/02/01 01:04:17 tbox Exp $ -->
392N/A<html>
392N/A<head>
392N/A<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
392N/A<title>dnssec-dsfromkey</title>
392N/A<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
392N/A<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
392N/A<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
392N/A<link rel="prev" href="man.host.html" title="host">
392N/A<link rel="next" href="man.dnssec-keyfromlabel.html" title="dnssec-keyfromlabel">
392N/A</head>
392N/A<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
392N/A<div class="navheader">
392N/A<table width="100%" summary="Navigation header">
392N/A<tr><th colspan="3" align="center"><span class="application">dnssec-dsfromkey</span></th></tr>
392N/A<tr>
392N/A<td width="20%" align="left">
392N/A<a accesskey="p" href="man.host.html">Prev</a>�</td>
392N/A<th width="60%" align="center">Manual pages</th>
392N/A<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-keyfromlabel.html">Next</a>
392N/A</td>
392N/A</tr>
392N/A</table>
392N/A<hr>
392N/A</div>
392N/A<div class="refentry" lang="en">
392N/A<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div>
392N/A<div class="refnamediv">
392N/A<h2>Name</h2>
392N/A<p><span class="application">dnssec-dsfromkey</span> &#8212; DNSSEC DS RR generation tool</p>
392N/A</div>
392N/A<div class="refsynopsisdiv">
633N/A<h2>Synopsis</h2>
633N/A<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] {keyfile}</p></div>
392N/A<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div>
392N/A</div>
392N/A<div class="refsect1" lang="en">
392N/A<a name="id2612522"></a><h2>DESCRIPTION</h2>
392N/A<p><span><strong class="command">dnssec-dsfromkey</strong></span>
392N/A outputs the Delegation Signer (DS) resource record (RR), as defined in
392N/A RFC 3658 and RFC 4509, for the given key(s).
392N/A </p>
392N/A</div>
392N/A<div class="refsect1" lang="en">
392N/A<a name="id2612536"></a><h2>OPTIONS</h2>
392N/A<div class="variablelist"><dl>
392N/A<dt><span class="term">-1</span></dt>
392N/A<dd><p>
392N/A Use SHA-1 as the digest algorithm (the default is to use
392N/A both SHA-1 and SHA-256).
392N/A </p></dd>
392N/A<dt><span class="term">-2</span></dt>
392N/A<dd><p>
785N/A Use SHA-256 as the digest algorithm.
392N/A </p></dd>
392N/A<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
392N/A<dd><p>
392N/A Select the digest algorithm. The value of
392N/A <code class="option">algorithm</code> must be one of SHA-1 (SHA1),
392N/A SHA-256 (SHA256) or GOST. These values are case insensitive.
392N/A </p></dd>
392N/A<dt><span class="term">-T <em class="replaceable"><code>TTL</code></em></span></dt>
392N/A<dd><p>
392N/A Specifies the TTL of the DS records.
392N/A </p></dd>
392N/A<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
392N/A<dd><p>
392N/A Look for key files (or, in keyset mode,
392N/A <code class="filename">keyset-</code> files) in
392N/A <code class="option">directory</code>.
392N/A </p></dd>
392N/A<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
392N/A<dd>
392N/A<p>
392N/A Zone file mode: in place of the keyfile name, the argument is
392N/A the DNS domain name of a zone master file, which can be read
392N/A from <code class="option">file</code>. If the zone name is the same as
392N/A <code class="option">file</code>, then it may be omitted.
392N/A </p>
392N/A<p>
392N/A If <code class="option">file</code> is set to <code class="literal">"-"</code>, then
392N/A the zone data is read from the standard input. This makes it
392N/A possible to use the output of the <span><strong class="command">dig</strong></span>
392N/A command as input, as in:
392N/A </p>
392N/A<p>
633N/A <strong class="userinput"><code>dig dnskey example.com | dnssec-dsfromkey -f - example.com</code></strong>
392N/A </p>
392N/A</dd>
633N/A<dt><span class="term">-A</span></dt>
392N/A<dd><p>
392N/A Include ZSK's when generating DS records. Without this option,
392N/A only keys which have the KSK flag set will be converted to DS
392N/A records and printed. Useful only in zone file mode.
633N/A </p></dd>
392N/A<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
392N/A<dd><p>
392N/A Generate a DLV set instead of a DS set. The specified
392N/A <code class="option">domain</code> is appended to the name for each
392N/A record in the set.
392N/A The DNSSEC Lookaside Validation (DLV) RR is described
392N/A in RFC 4431.
392N/A </p></dd>
392N/A<dt><span class="term">-s</span></dt>
392N/A<dd><p>
392N/A Keyset mode: in place of the keyfile name, the argument is
392N/A the DNS domain name of a keyset file.
392N/A </p></dd>
392N/A<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
392N/A<dd><p>
392N/A Specifies the DNS class (default is IN). Useful only
392N/A in keyset or zone file mode.
392N/A </p></dd>
392N/A<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
392N/A<dd><p>
392N/A Sets the debugging level.
392N/A </p></dd>
392N/A</dl></div>
392N/A</div>
392N/A<div class="refsect1" lang="en">
392N/A<a name="id2613658"></a><h2>EXAMPLE</h2>
392N/A<p>
392N/A To build the SHA-256 DS RR from the
392N/A <strong class="userinput"><code>Kexample.com.+003+26160</code></strong>
392N/A keyfile name, the following command would be issued:
392N/A </p>
392N/A<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong>
392N/A </p>
392N/A<p>
392N/A The command would print something like:
392N/A </p>
392N/A<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong>
392N/A </p>
392N/A</div>
392N/A<div class="refsect1" lang="en">
392N/A<a name="id2613694"></a><h2>FILES</h2>
392N/A<p>
392N/A The keyfile can be designed by the key identification
392N/A <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name
392N/A <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by
392N/A <span class="refentrytitle">dnssec-keygen</span>(8).
</p>
<p>
The keyset file name is built from the <code class="option">directory</code>,
the string <code class="filename">keyset-</code> and the
<code class="option">dnsname</code>.
</p>
</div>
<div class="refsect1" lang="en">
<a name="id2613736"></a><h2>CAVEAT</h2>
<p>
A keyfile error can give a "file not found" even if the file exists.
</p>
</div>
<div class="refsect1" lang="en">
<a name="id2613746"></a><h2>SEE ALSO</h2>
<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
<span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
<em class="citetitle">BIND 9 Administrator Reference Manual</em>,
<em class="citetitle">RFC 3658</em>,
<em class="citetitle">RFC 4431</em>.
<em class="citetitle">RFC 4509</em>.
</p>
</div>
<div class="refsect1" lang="en">
<a name="id2613785"></a><h2>AUTHOR</h2>
<p><span class="corpauthor">Internet Systems Consortium</span>
</p>
</div>
</div>
<div class="navfooter">
<hr>
<table width="100%" summary="Navigation footer">
<tr>
<td width="40%" align="left">
<a accesskey="p" href="man.host.html">Prev</a>�</td>
<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch10.html">Up</a></td>
<td width="40%" align="right">�<a accesskey="n" href="man.dnssec-keyfromlabel.html">Next</a>
</td>
</tr>
<tr>
<td width="40%" align="left" valign="top">host�</td>
<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
<td width="40%" align="right" valign="top">�<span class="application">dnssec-keyfromlabel</span>
</td>
</tr>
</table>
</div>
</body>
</html>