man.dnssec-dsfromkey.html revision d060d8669f5558690e7faf4a1c12fe5c02a7c60d
ca41b452ede6feaa9d8739ec3cae19389a7b0d03Bob Halley - Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - Copyright (C) 2000-2003 Internet Software Consortium.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - Permission to use, copy, modify, and/or distribute this software for any
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - purpose with or without fee is hereby granted, provided that the above
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - copyright notice and this permission notice appear in all copies.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley - PERFORMANCE OF THIS SOFTWARE.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<!-- $Id: man.dnssec-dsfromkey.html,v 1.42 2009/10/16 04:20:32 tbox Exp $ -->
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
6a759e38699d133302d0df120d7afcd4af721951David Lawrence<link rel="prev" href="man.host.html" title="host">
1d9b3491ab3216c8f278dd821455a7a3b08ddfeeBob Halley<link rel="next" href="man.dnssec-keyfromlabel.html" title="dnssec-keyfromlabel">
f73e404eb9e1d314f85128cae48cdee036b405ecAndreas Gustafsson<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<tr><th colspan="3" align="center"><span class="application">dnssec-dsfromkey</span></th></tr>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<a accesskey="p" href="man.host.html">Prev</a>�</td>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-keyfromlabel.html">Next</a>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<p><span class="application">dnssec-dsfromkey</span> — DNSSEC DS RR generation tool</p>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] {keyfile}</p></div>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<p><span><strong class="command">dnssec-dsfromkey</strong></span>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley outputs the Delegation Signer (DS) resource record (RR), as defined in
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley RFC 3658 and RFC 4509, for the given key(s).
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Use SHA-1 as the digest algorithm (the default is to use
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley both SHA-1 and SHA-256).
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Use SHA-256 as the digest algorithm.
1d9b3491ab3216c8f278dd821455a7a3b08ddfeeBob Halley<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Select the digest algorithm. The value of
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <code class="option">algorithm</code> must be one of SHA-1 (SHA1) or
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley SHA-256 (SHA256). These values are case insensitive.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Look for key files (or, in keyset mode,
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Zone file mode: in place of the keyfile name, the argument is
6a759e38699d133302d0df120d7afcd4af721951David Lawrence the DNS domain name of a zone master file, which can be read
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley from <code class="option">file</code>. If the zone name is the same as
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <code class="option">file</code>, then it may be omitted.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Include ZSK's when generating DS records. Without this option,
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley only keys which have the KSK flag set will be converted to DS
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley records and printed. Useful only in zone file mode.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Generate a DLV set instead of a DS set. The specified
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <code class="option">domain</code> is appended to the name for each
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley record in the set.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley The DNSSEC Lookaside Validation (DLV) RR is described
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley in RFC 4431.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Keyset mode: in place of the keyfile name, the argument is
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley the DNS domain name of a keyset file.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Specifies the DNS class (default is IN). Useful only
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley in keyset or zone file mode.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley Sets the debugging level.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley To build the SHA-256 DS RR from the
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <strong class="userinput"><code>Kexample.com.+003+26160</code></strong>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley keyfile name, the following command would be issued:
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong>
01cc5813ca716d48c46960302d9845ef7c984f93Bob Halley The command would print something like:
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong>
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley The keyfile can be designed by the key identification
01cc5813ca716d48c46960302d9845ef7c984f93Bob Halley <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by
e4653123ecc6cdbfc0b9eda6e98e44af3b1f9a08Mark Andrews <span class="refentrytitle">dnssec-keygen</span>(8).
e4653123ecc6cdbfc0b9eda6e98e44af3b1f9a08Mark Andrews The keyset file name is built from the <code class="option">directory</code>,
e4653123ecc6cdbfc0b9eda6e98e44af3b1f9a08Mark Andrews the string <code class="filename">keyset-</code> and the
01cc5813ca716d48c46960302d9845ef7c984f93Bob Halley A keyfile error can give a "file not found" even if the file exists.
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
68d654930939926e4ddbe2b68234dd7c2da97de5Bob Halley <em class="citetitle">BIND 9 Administrator Reference Manual</em>,