man.dnssec-keymgr.html revision 7911e6f9de303bca5a3d8b34f4330c8f7cecffae
8001ba81cb851b38d86650a2fef5817facffb763johanengelen<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<!--
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen - Copyright (C) 2000-2016 Internet Systems Consortium, Inc. ("ISC")
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen -
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen - This Source Code Form is subject to the terms of the Mozilla Public
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen - License, v. 2.0. If a copy of the MPL was not distributed with this
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen - file, You can obtain one at http://mozilla.org/MPL/2.0/.
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen-->
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<html lang="en">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<head>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<title>dnssec-keymgr</title>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<link rel="home" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<link rel="prev" href="man.dnssec-keygen.html" title="dnssec-keygen">
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen<link rel="next" href="man.dnssec-revoke.html" title="dnssec-revoke">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</head>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<div class="navheader">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<table width="100%" summary="Navigation header">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<tr><th colspan="3" align="center"><span class="application">dnssec-keymgr</span></th></tr>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<tr>
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen<td width="20%" align="left">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<a accesskey="p" href="man.dnssec-keygen.html">Prev</a>�</td>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<th width="60%" align="center">Manual pages</th>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-revoke.html">Next</a>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</td>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</tr>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</table>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<hr>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</div>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<div class="refentry">
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen<a name="man.dnssec-keymgr"></a><div class="titlepage"></div>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <div class="refnamediv">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<h2>Name</h2>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<p>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <span class="application">dnssec-keymgr</span>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen &#8212; Ensures correct DNSKEY coverage for a zone based on a defined policy
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen </p>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen</div>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <div class="refsynopsisdiv">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<h2>Synopsis</h2>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <div class="cmdsynopsis"><p>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <code class="command">dnssec-keymgr</code>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-c <em class="replaceable"><code>file</code></em></code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-f</code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-k</code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-q</code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-v</code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-z</code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-g <em class="replaceable"><code>path</code></em></code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-r <em class="replaceable"><code>path</code></em></code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [<code class="option">-s <em class="replaceable"><code>path</code></em></code>]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen [zone...]
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen </p></div>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen </div>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <div class="refsection">
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<a name="id-1.14.13.7"></a><h2>DESCRIPTION</h2>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <p>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen <span class="command"><strong>dnssec-keymgr</strong></span> is a high level Python wrapper
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen to facilitate the key rollover process for zones handled by
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould BIND. It uses the BIND commands for manipulating DNSSEC key
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould metadata: <span class="command"><strong>dnssec-keygen</strong></span> and
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <span class="command"><strong>dnssec-settime</strong></span>.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould DNSSEC policy can be read from a configuration file (default
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <code class="filename">/etc/dnssec-policy.conf</code>), from which the key
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould parameters, publication and rollover schedule, and desired
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould coverage duration for any given zone can be determined. This
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould file may be used to define individual DNSSEC policies on a
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould per-zone basis, or to set a default policy used for all zones.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould When <span class="command"><strong>dnssec-keymgr</strong></span> runs, it examines the DNSSEC
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould keys for one or more zones, comparing their timing metadata against
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould the policies for those zones. If key settings do not conform to the
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould DNSSEC policy (for example, because the policy has been changed),
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould they are automatically corrected.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould A zone policy can specify a duration for which we want to
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould ensure the key correctness (<code class="option">coverage</code>). It can
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould also specify a rollover period (<code class="option">roll-period</code>).
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould If policy indicates that a key should roll over before the
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould coverage period ends, then a successor key will automatically be
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould created and added to the end of the key series.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould If zones are specified on the command line,
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <span class="command"><strong>dnssec-keymgr</strong></span> will examine only those zones.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould If a specified zone does not already have keys in place, then
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould keys will be generated for it according to policy.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould If zones are <span class="emphasis"><em>not</em></span> specified on the command
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould line, then <span class="command"><strong>dnssec-keymgr</strong></span> will search the
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould key directory (either the current working directory or the directory
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould set by the <code class="option">-K</code> option), and check the keys for
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould all the zones represented in the directory.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould It is expected that this tool will be run automatically and
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould unattended (for example, by <span class="command"><strong>cron</strong></span>).
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen </div>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <div class="refsection">
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen<a name="id-1.14.13.8"></a><h2>OPTIONS</h2>
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen <div class="variablelist"><dl class="variablelist">
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-c <em class="replaceable"><code>file</code></em></span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould If <code class="option">-c</code> is specified, then the DNSSEC
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould policy is read from <code class="option">file</code>. (If not
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould specified, then the policy is read from
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <code class="filename">/etc/dnssec-policy.conf</code>; if that file
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould doesn't exist, a built-in global default policy is used.)
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-f</span></dt>
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen<dd>
c3a8ad9235ff81909bd472707550aef5b91daf7bjohanengelen <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Force: allow updating of key events even if they are
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould already in the past. This is not recommended for use with
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould zones in which keys have already been published. However,
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould if a set of keys has been generated all of which have
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould publication and activation dates in the past, but the
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould keys have not been published in a zone as yet, then this
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould option can be used to clean them up and turn them into a
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould proper series of keys with appropriate rollover intervals.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-g <em class="replaceable"><code>keygen-path</code></em></span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Specifies a path to a <span class="command"><strong>dnssec-keygen</strong></span> binary.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Used for testing.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould See also the <code class="option">-s</code> option.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-h</span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Print the <span class="command"><strong>dnssec-keymgr</strong></span> help summary
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould and exit.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Sets the directory in which keys can be found. Defaults to the
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould current working directory.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-k</span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Only apply policies to KSK keys.
ea8dd7683dd12883474f6cf9b5f424f8ed831166Kris See also the <code class="option">-z</code> option.
76addc201c409e81eaaa73fe27cc0f79c4db097cKrzysztof Kosiński </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-q</span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Quiet: suppress printing of <span class="command"><strong>dnssec-keygen</strong></span>
6c3e745a94ef6b25a4ef9f018d350a7535aa45afTed Gould and <span class="command"><strong>dnssec-settime</strong></span>.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-r <em class="replaceable"><code>randomdev</code></em></span></dt>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould <p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould Specifies a path to a file containing random data.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould This is passed to the <span class="command"><strong>dnssec-keygen</strong></span> binary
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould using its <code class="option">-r</code> option.
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </p>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould </dd>
01d27eab5fca2dcb8e883011f8be77ae6b78a11cTed Gould<dt><span class="term">-s <em class="replaceable"><code>settime-path</code></em></span></dt>
981b809bc6ed10a21e89444d9447e5475801874fjohanengelen<dd>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen <p>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen Specifies a path to a <span class="command"><strong>dnssec-settime</strong></span> binary.
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen Used for testing.
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen See also the <code class="option">-g</code> option.
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen </p>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen </dd>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen<dt><span class="term">-v</span></dt>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen<dd>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen <p>
63267518b4ce196caab66ef8cbdcfc0921206b3djohanengelen Print the <span class="command"><strong>dnssec-keymgr</strong></span> version and exit.
a4030d5ca449e7e384bc699cd249ee704faaeab0Chris Morgan </p>
</dd>
<dt><span class="term">-z</span></dt>
<dd>
<p>
Only apply policies to ZSK keys.
See also the <code class="option">-k</code> option.
</p>
</dd>
</dl></div>
</div>
<div class="refsection">
<a name="id-1.14.13.9"></a><h2>POLICY CONFIGURATION</h2>
<p>
The <code class="filename">dnssec-policy.conf</code> file can specify three kinds
of policies:
</p>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
<li class="listitem">
<p>
<span class="emphasis"><em>Policy classes</em></span>
(<code class="option">policy <em class="replaceable"><code>name</code></em> { ... };</code>)
can be inherited by zone policies or other policy classes; these
can be used to create sets of different security profiles. For
example, a policy class <strong class="userinput"><code>normal</code></strong> might specify
1024-bit key sizes, but a class <strong class="userinput"><code>extra</code></strong> might
specify 2048 bits instead; <strong class="userinput"><code>extra</code></strong> would be
used for zones that had unusually high security needs.
</p>
</li>
<li class="listitem">
<p>
Algorithm policies:
(<code class="option">algorithm-policy <em class="replaceable"><code>algorithm</code></em> { ... };</code> )
override default per-algorithm settings. For example, by default,
RSASHA256 keys use 2048-bit key sizes for both KSK and ZSK. This
can be modified using <span class="command"><strong>algorithm-policy</strong></span>, and the
new key sizes would then be used for any key of type RSASHA256.
</p>
</li>
<li class="listitem">
<p>
Zone policies:
(<code class="option">zone <em class="replaceable"><code>name</code></em> { ... };</code> )
set policy for a single zone by name. A zone policy can inherit
a policy class by including a <code class="option">policy</code> option.
</p>
</li>
</ul></div>
<p>
Options that can be specified in policies:
</p>
<div class="variablelist"><dl class="variablelist">
<dt><span class="term"><span class="command"><strong>algorithm</strong></span></span></dt>
<dd>
<p>
The key algorithm. If no policy is defined, the default is
RSASHA256.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>coverage</strong></span></span></dt>
<dd>
<p>
The length of time to ensure that keys will be correct; no action
will be taken to create new keys to be activated after this time.
This can be represented as a number of seconds, or as a duration using
human-readable units (examples: "1y" or "6 months").
A default value for this option can be set in algorithm policies
as well as in policy classes or zone policies.
If no policy is configured, the default is six months.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>directory</strong></span></span></dt>
<dd>
<p>
Specifies the directory in which keys should be stored.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>key-size</strong></span></span></dt>
<dd>
<p>
Specifies the number of bits to use in creating keys.
Takes two arguments: keytype (eihter "zsk" or "ksk") and size.
A default value for this option can be set in algorithm policies
as well as in policy classes or zone policies. If no policy is
configured, the default is 1024 bits for DSA keys and 2048 for
RSA.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>keyttl</strong></span></span></dt>
<dd>
<p>
The key TTL. If no policy is defined, the default is one hour.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>post-publish</strong></span></span></dt>
<dd>
<p>
How long after inactivation a key should be deleted from the zone.
Note: If <code class="option">roll-period</code> is not set, this value is
ignored. Takes two arguments: keytype (eihter "zsk" or "ksk") and a
duration. A default value for this option can be set in algorithm
policies as well as in policy classes or zone policies. The default
is one month.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>pre-publish</strong></span></span></dt>
<dd>
<p>
How long before activation a key should be published. Note: If
<code class="option">roll-period</code> is not set, this value is ignored.
Takes two arguments: keytype (either "zsk" or "ksk") and a duration.
A default value for this option can be set in algorithm policies
as well as in policy classes or zone policies. The default is
one month.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>roll-period</strong></span></span></dt>
<dd>
<p>
How frequently keys should be rolled over.
Takes two arguments: keytype (eihter "zsk" or "ksk") and a duration.
A default value for this option can be set in algorithm policies
as well as in policy classes or zone policies. If no policy is
configured, the default is one year for ZSK's. KSK's do not
roll over by default.
</p>
</dd>
<dt><span class="term"><span class="command"><strong>standby</strong></span></span></dt>
<dd>
<p>
Not yet implemented.
</p>
</dd>
</dl></div>
</div>
<div class="refsection">
<a name="id-1.14.13.10"></a><h2>REMAINING WORK</h2>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
<li class="listitem">
<p>
Enable scheduling of KSK rollovers using the <code class="option">-P sync</code>
and <code class="option">-D sync</code> options to
<span class="command"><strong>dnssec-keygen</strong></span> and
<span class="command"><strong>dnssec-settime</strong></span>. Check the parent zone
(as in <span class="command"><strong>dnssec-checkds</strong></span>) to determine when it's
safe for the key to roll.
</p>
</li>
<li class="listitem">
<p>
Allow configuration of standby keys and use of the REVOKE bit,
for keys that use RFC 5011 semantics.
</p>
</li>
</ul></div>
</div>
<div class="refsection">
<a name="id-1.14.13.11"></a><h2>SEE ALSO</h2>
<p>
<span class="citerefentry">
<span class="refentrytitle">dnssec-coverage</span>(8)
</span>,
<span class="citerefentry">
<span class="refentrytitle">dnssec-keygen</span>(8)
</span>,
<span class="citerefentry">
<span class="refentrytitle">dnssec-settime</span>(8)
</span>,
<span class="citerefentry">
<span class="refentrytitle">dnssec-checkds</span>(8)
</span>
</p>
</div>
</div>
<div class="navfooter">
<hr>
<table width="100%" summary="Navigation footer">
<tr>
<td width="40%" align="left">
<a accesskey="p" href="man.dnssec-keygen.html">Prev</a>�</td>
<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch13.html">Up</a></td>
<td width="40%" align="right">�<a accesskey="n" href="man.dnssec-revoke.html">Next</a>
</td>
</tr>
<tr>
<td width="40%" align="left" valign="top">
<span class="application">dnssec-keygen</span>�</td>
<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
<td width="40%" align="right" valign="top">�<span class="application">dnssec-revoke</span>
</td>
</tr>
</table>
</div>
<p xmlns:db="http://docbook.org/ns/docbook" style="text-align: center;">BIND 9.11.0</p>
</body>
</html>