man.dnssec-keyfromlabel.html revision 1700442a7751c2bbdafe2d039cebbd8316496957
c92c50783e4e93699f2a42643b8f200b9b719c87Automatic Updater - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
4a14ce5ba00ab7bc55c99ffdcf59c7a4ab902721Automatic Updater - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews<link rel="home" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="prev" href="man.dnssec-importkey.html" title="dnssec-importkey">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="next" href="man.dnssec-keygen.html" title="dnssec-keygen">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<tr><th colspan="3" align="center"><span class="application">dnssec-keyfromlabel</span></th></tr>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="man.dnssec-importkey.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-keygen.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="man.dnssec-keyfromlabel"></a><div class="titlepage"></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="application">dnssec-keyfromlabel</span> — DNSSEC key generation tool</p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dnssec-keyfromlabel</code> {-l <em class="replaceable"><code>label</code></em>} [<code class="option">-3</code>] [<code class="option">-a <em class="replaceable"><code>algorithm</code></em></code>] [<code class="option">-A <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-D <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-D sync <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-E <em class="replaceable"><code>engine</code></em></code>] [<code class="option">-f <em class="replaceable"><code>flag</code></em></code>] [<code class="option">-G</code>] [<code class="option">-I <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-i <em class="replaceable"><code>interval</code></em></code>] [<code class="option">-k</code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-L <em class="replaceable"><code>ttl</code></em></code>] [<code class="option">-n <em class="replaceable"><code>nametype</code></em></code>] [<code class="option">-P <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-P sync <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-p <em class="replaceable"><code>protocol</code></em></code>] [<code class="option">-R <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-S <em class="replaceable"><code>key</code></em></code>] [<code class="option">-t <em class="replaceable"><code>type</code></em></code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-V</code>] [<code class="option">-y</code>] {name}</p></div>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User generates a key pair of files that referencing a key object stored
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in a cryptographic hardware service module (HSM). The private key
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User file can be used for DNSSEC signing of zone data as if it were a
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User conventional signing key created by <span class="command"><strong>dnssec-keygen</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but the key material is stored within the HSM, and the actual signing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein takes place there.
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater The <code class="option">name</code> of the key is specified on the command
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews line. This must match the name of the zone for which the key is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews being generated.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="variablelist"><dl class="variablelist">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Selects the cryptographic algorithm. The value of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">algorithm</code> must be one of RSAMD5, RSASHA1,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ECDSAP256SHA256 or ECDSAP384SHA384.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These values are case insensitive.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no algorithm is specified, then RSASHA1 will be used by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default, unless the <code class="option">-3</code> option is specified,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in which case NSEC3RSASHA1 will be used instead. (If
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson <code class="option">-3</code> is used and an algorithm is specified,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce that algorithm will be checked for compatibility with NSEC3.)
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson algorithm, and DSA is recommended.
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Note 2: DH automatically sets the -k flag.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Use an NSEC3-capable algorithm to generate a DNSSEC key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If this option is used and no algorithm is explicitly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set on the command line, NSEC3RSASHA1 will be used by
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="term">-E <em class="replaceable"><code>engine</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies the cryptographic hardware to use.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When BIND is built with OpenSSL PKCS#11 support, this defaults
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the string "pkcs11", which identifies an OpenSSL engine
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater that can drive a cryptographic accelerator or hardware service
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater module. When BIND is built with native PKCS#11 cryptography
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater (--enable-native-pkcs11), it defaults to the path of the PKCS#11
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater provider library specified via "--with-pkcs11".
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater<dt><span class="term">-l <em class="replaceable"><code>label</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Specifies the label for a key pair in the crypto hardware.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce When <acronym class="acronym">BIND</acronym> 9 is built with OpenSSL-based
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce PKCS#11 support, the label is an arbitrary string that
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce identifies a particular key. It may be preceded by an
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce optional OpenSSL engine name, followed by a colon, as in
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce "pkcs11:<em class="replaceable"><code>keylabel</code></em>".
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce When <acronym class="acronym">BIND</acronym> 9 is built with native PKCS#11
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce support, the label is a PKCS#11 URI string in the format
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater "pkcs11:<code class="option">keyword</code>=<em class="replaceable"><code>value</code></em>[<span class="optional">;<code class="option">keyword</code>=<em class="replaceable"><code>value</code></em>;...</span>]"
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Keywords include "token", which identifies the HSM; "object", which
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce identifies the key; and "pin-source", which identifies a file from
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce which the HSM's PIN code can be obtained. The label will be
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce stored in the on-disk "private" file.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce If the label contains a
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <code class="option">pin-source</code> field, tools using the generated
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce key files will be able to use the HSM for signing and other
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce operations without any need for an operator to manually enter
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce a PIN. Note: Making the HSM's PIN accessible in this manner
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce may reduce the security advantage of using an HSM; be sure
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce this is what you want to do before making use of this feature.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-n <em class="replaceable"><code>nametype</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies the owner type of the key. The value of
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User <code class="option">nametype</code> must either be ZONE (for a DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a host (KEY)),
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews USER (for a key associated with a user(KEY)) or OTHER (DNSKEY).
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews These values are case insensitive.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Compatibility mode: generates an old-style key, without
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any metadata. By default, <span class="command"><strong>dnssec-keyfromlabel</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will include the key's creation date in the metadata stored
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the private key, and other dates may be set there as well
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (publication date, activation date, etc). Keys that include
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this data may be incompatible with older versions of BIND; the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">-C</code> option suppresses them.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Indicates that the DNS record containing the key should have
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the specified class. If not specified, class IN is used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-f <em class="replaceable"><code>flag</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Set the specified flag in the flag field of the KEY/DNSKEY record.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The only recognized flags are KSK (Key Signing Key) and REVOKE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Generate a key, but do not publish it or sign with it. This
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option is incompatible with -P and -A.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Prints a short summary of the options and arguments to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dnssec-keyfromlabel</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the directory in which the key files are to be written.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Generate KEY records rather than DNSKEY records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-L <em class="replaceable"><code>ttl</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the default TTL to use for this key when it is converted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein into a DNSKEY RR. If the key is imported into a zone,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this is the TTL that will be used for it, unless there was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein already a DNSKEY RRset in place, in which case the existing TTL
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein would take precedence. Setting the default TTL to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">0</code> or <code class="literal">none</code> removes it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-p <em class="replaceable"><code>protocol</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the protocol value for the key. The protocol
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is a number between 0 and 255. The default is 3 (DNSSEC).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Other possible values for this argument are listed in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RFC 2535 and its successors.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-S <em class="replaceable"><code>key</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Generate a key as an explicit successor to an existing key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The name, algorithm, size, and type of the key will be set
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to match the predecessor. The activation date of the new
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key will be set to the inactivation date of the existing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one. The publication date will be set to the activation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein date minus the prepublication interval, which defaults to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-t <em class="replaceable"><code>type</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Indicates the use of the key. <code class="option">type</code> must be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is AUTHCONF. AUTH refers to the ability to authenticate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein data, and CONF the ability to encrypt data.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the debugging level.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Prints version information.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Allows DNSSEC key files to be generated even if the key ID
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein would collide with that of an existing key, in the event of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein either key being revoked. (This is only safe to use if you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are sure you won't be using RFC 5011 trust anchor maintenance
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with either of the keys involved.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id-1.14.9.9"></a><h2>TIMING OPTIONS</h2>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the argument begins with a '+' or '-', it is interpreted as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an offset from the present time. For convenience, if such an offset
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi',
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then the offset is computed in years (defined as 365 24-hour days,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ignoring leap years), months (defined as 30 24-hour days), weeks,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein days, hours, or minutes, respectively. Without a suffix, the offset
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is computed in seconds. To explicitly prevent a date from being
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set, use 'none' or 'never'.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="variablelist"><dl class="variablelist">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-P <em class="replaceable"><code>date/offset</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the date on which a key is to be published to the zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein After that date, the key will be included in the zone but will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not be used to sign it. If not set, and if the -G option has
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not been used, the default is "now".
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-P sync <em class="replaceable"><code>date/offset</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the date on which the CDS and CDNSKEY records which match
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this key are to be published to the zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-A <em class="replaceable"><code>date/offset</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the date on which the key is to be activated. After that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein date, the key will be included in the zone and used to sign
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it. If not set, and if the -G option has not been used, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default is "now".
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<dt><span class="term">-R <em class="replaceable"><code>date/offset</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the date on which the key is to be revoked. After that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein date, the key will be flagged as revoked. It will be included
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the zone and will be used to sign it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-I <em class="replaceable"><code>date/offset</code></em></span></dt>
f7b2875691497b292eacb60609be23a813d14e63Automatic Updater Sets the date on which the key is to be retired. After that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein date, the key will still be included in the zone, but it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will not be used to sign it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-D <em class="replaceable"><code>date/offset</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the date on which the key is to be deleted. After that
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User date, the key will no longer be included in the zone. (It
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may remain in the key repository, however.)
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="term">-D sync <em class="replaceable"><code>date/offset</code></em></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Sets the date on which the CDS and CDNSKEY records which match
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews this key are to be deleted.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term">-i <em class="replaceable"><code>interval</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the prepublication interval for a key. If set, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the publication and activation dates must be separated by at least
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this much time. If the activation date is specified but the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein publication date isn't, then the publication date will default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to this much time before the activation date; conversely, if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the publication date is specified but activation date isn't,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then activation will be set to this much time after publication.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the key is being created as an explicit successor to another
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key, then the default prepublication interval is 30 days;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein otherwise it is zero.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein As with date offsets, if the argument is followed by one of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interval is measured in years, months, weeks, days, hours,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or minutes, respectively. Without a suffix, the interval is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein measured in seconds.
58d9e9169e7ab4355a0b0bfc13bc616bc5247dfeAutomatic Updater<a name="id-1.14.9.10"></a><h2>GENERATED KEY FILES</h2>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When <span class="command"><strong>dnssec-keyfromlabel</strong></span> completes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein successfully,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it prints a string of the form <code class="filename">Knnnn.+aaa+iiiii</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the standard output. This is an identification string for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the key files it has generated.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li class="listitem"><p><code class="filename">nnnn</code> is the key name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li class="listitem"><p><code class="filename">aaa</code> is the numeric representation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the algorithm.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li class="listitem"><p><code class="filename">iiiii</code> is the key identifier (or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein creates two files, with names based
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the printed string. <code class="filename">Knnnn.+aaa+iiiii.key</code>
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews contains the public key, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">Knnnn.+aaa+iiiii.private</code> contains the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein private key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <code class="filename">.key</code> file contains a DNS KEY record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be inserted into a zone file (directly or with a $INCLUDE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <code class="filename">.private</code> file contains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein algorithm-specific
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein fields. For obvious security reasons, this file does not have
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein general read permission.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="citetitle">The PKCS#11 URI Scheme (draft-pechanec-pkcs11uri-13)</em>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="man.dnssec-importkey.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch13.html">Up</a></td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="right">�<a accesskey="n" href="man.dnssec-keygen.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span class="application">dnssec-importkey</span>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="right" valign="top">�<span class="application">dnssec-keygen</span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p xmlns:db="http://docbook.org/ns/docbook" style="text-align: center;">BIND 9.11.0b2</p>