man.dnssec-keyfromlabel.html revision 335c82aebd0da12b401cfac28bd305da95a4d052
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - Copyright (C) 2000-2003 Internet Software Consortium.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - Permission to use, copy, modify, and/or distribute this software for any
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove - purpose with or without fee is hereby granted, provided that the above
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - copyright notice and this permission notice appear in all copies.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove - PERFORMANCE OF THIS SOFTWARE.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<!-- $Id$ -->
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<link rel="prev" href="man.dnssec-importkey.html" title="dnssec-importkey">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<link rel="next" href="man.dnssec-keygen.html" title="dnssec-keygen">
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove<tr><th colspan="3" align="center"><span class="application">dnssec-keyfromlabel</span></th></tr>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<a accesskey="p" href="man.dnssec-importkey.html">Prev</a>�</td>
813664623d90aab5b72760adaf668d7c53228968Ryan Grove<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-keygen.html">Next</a>
45b049d4232108bbc0a2a4b70218006543f494a6Ryan Grove<a name="man.dnssec-keyfromlabel"></a><div class="titlepage"></div>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<p><span class="application">dnssec-keyfromlabel</span> — DNSSEC key generation tool</p>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<div class="cmdsynopsis"><p><code class="command">dnssec-keyfromlabel</code> {-l <em class="replaceable"><code>label</code></em>} [<code class="option">-3</code>] [<code class="option">-a <em class="replaceable"><code>algorithm</code></em></code>] [<code class="option">-A <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-D <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-E <em class="replaceable"><code>engine</code></em></code>] [<code class="option">-f <em class="replaceable"><code>flag</code></em></code>] [<code class="option">-G</code>] [<code class="option">-I <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-i <em class="replaceable"><code>interval</code></em></code>] [<code class="option">-k</code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-L <em class="replaceable"><code>ttl</code></em></code>] [<code class="option">-n <em class="replaceable"><code>nametype</code></em></code>] [<code class="option">-P <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-p <em class="replaceable"><code>protocol</code></em></code>] [<code class="option">-R <em class="replaceable"><code>date/offset</code></em></code>] [<code class="option">-S <em class="replaceable"><code>key</code></em></code>] [<code class="option">-t <em class="replaceable"><code>type</code></em></code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-V</code>] [<code class="option">-y</code>] {name}</p></div>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<p><span><strong class="command">dnssec-keyfromlabel</strong></span>
dea2fd181c43d8942071d1385c4936b3753d097cRyan Grove generates a key pair of files that referencing a key object stored
dea2fd181c43d8942071d1385c4936b3753d097cRyan Grove in a cryptographic hardware service module (HSM). The private key
dea2fd181c43d8942071d1385c4936b3753d097cRyan Grove file can be used for DNSSEC signing of zone data as if it were a
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove conventional signing key created by <span><strong class="command">dnssec-keygen</strong></span>,
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove but the key material is stored within the HSM, and the actual signing
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove takes place there.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove The <code class="option">name</code> of the key is specified on the command
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove line. This must match the name of the zone for which the key is
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove being generated.
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove Selects the cryptographic algorithm. The value of
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove <code class="option">algorithm</code> must be one of RSAMD5, RSASHA1,
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove ECDSAP256SHA256 or ECDSAP384SHA384.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove These values are case insensitive.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove If no algorithm is specified, then RSASHA1 will be used by
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove default, unless the <code class="option">-3</code> option is specified,
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove in which case NSEC3RSASHA1 will be used instead. (If
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove <code class="option">-3</code> is used and an algorithm is specified,
d7da83936765176d7b96362d930f5ee3577ff4a2Ryan Grove that algorithm will be checked for compatibility with NSEC3.)
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove algorithm, and DSA is recommended.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove Note 2: DH automatically sets the -k flag.
813664623d90aab5b72760adaf668d7c53228968Ryan Grove Use an NSEC3-capable algorithm to generate a DNSSEC key.
813664623d90aab5b72760adaf668d7c53228968Ryan Grove If this option is used and no algorithm is explicitly
813664623d90aab5b72760adaf668d7c53228968Ryan Grove set on the command line, NSEC3RSASHA1 will be used by
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove<dt><span class="term">-E <em class="replaceable"><code>engine</code></em></span></dt>
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove Specifies the cryptographic hardware to use.
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove When BIND is built with OpenSSL PKCS#11 support, this defaults
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove to the string "pkcs11", which identifies an OpenSSL engine
e22b5063c722f3a7b75660ec1f291891b4a3a6f7Ryan Grove that can drive a cryptographic accelerator or hardware service