from small one page howto to huge articles all in one place
poll results
Last additions:
May 25th. 2007:
April, 26th. 2006:
|
You are here: manpages
DNSSEC\-DSFROMKEY
Section: BIND9 (8) Updated: 2012-05-02 Index
Return to Main Contents
NAME
dnssec-dsfromkey - DNSSEC DS RR generation tool
SYNOPSIS
-
dnssec-dsfromkey [-v level] [-1] [-2] [-a alg] [-C] [-l domain] [-T TTL] {keyfile}
-
dnssec-dsfromkey {-s} [-1] [-2] [-a alg] [-K directory] [-l domain] [-s] [-c class] [-T TTL] [-f file] [-A] [-v level] {dnsname}
-
dnssec-dsfromkey [-h] [-V]
DESCRIPTION
dnssec-dsfromkey
outputs the Delegation Signer (DS) resource record (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
OPTIONS
-1
-
Use SHA-1 as the digest algorithm (the default is to use both SHA-1 and SHA-256).
-2
-
Use SHA-256 as the digest algorithm.
-a algorithm
-
Select the digest algorithm. The value of
algorithm
must be one of SHA-1 (SHA1), SHA-256 (SHA256), GOST or SHA-384 (SHA384). These values are case insensitive.
-C
-
Generate CDS records rather than DS records. This is mutually exclusive with generating lookaside records.
-T TTL
-
Specifies the TTL of the DS records.
-K directory
-
Look for key files (or, in keyset mode,
keyset-
files) in
directory.
-f file
-
Zone file mode: in place of the keyfile name, the argument is the DNS domain name of a zone master file, which can be read from
file. If the zone name is the same as
file, then it may be omitted.
If
file
is set to
"-", then the zone data is read from the standard input. This makes it possible to use the output of the
dig
command as input, as in:
dig dnskey example.com | dnssec-dsfromkey -f - example.com
-A
-
Include ZSKs when generating DS records. Without this option, only keys which have the KSK flag set will be converted to DS records and printed. Useful only in zone file mode.
-l domain
-
Generate a DLV set instead of a DS set. The specified
domain
is appended to the name for each record in the set. The DNSSEC Lookaside Validation (DLV) RR is described in RFC 4431. This is mutually exclusive with generating CDS records.
-s
-
Keyset mode: in place of the keyfile name, the argument is the DNS domain name of a keyset file.
-c class
-
Specifies the DNS class (default is IN). Useful only in keyset or zone file mode.
-v level
-
Sets the debugging level.
-h
-
Prints usage information.
-V
-
Prints version information.
EXAMPLE
To build the SHA-256 DS RR from the
Kexample.com.+003+26160
keyfile name, the following command would be issued:
dnssec-dsfromkey -2 Kexample.com.+003+26160
The command would print something like:
example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94
FILES
The keyfile can be designed by the key identification
Knnnn.+aaa+iiiii
or the full file name
Knnnn.+aaa+iiiii.key
as generated by
dnssec-keygen(8).
The keyset file name is built from the
directory, the string
keyset-
and the
dnsname.
CAVEAT
A keyfile error can give a "file not found" even if the file exists.
SEE ALSO
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
RFC 3658,
RFC 4431.
RFC 4509.
AUTHOR
Internet Systems Consortium, Inc.
COPYRIGHT
Copyright © 2008-2012, 2014-2016 Internet Systems Consortium, Inc. ("ISC")
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- OPTIONS
-
- EXAMPLE
-
- FILES
-
- CAVEAT
-
- SEE ALSO
-
- AUTHOR
-
- COPYRIGHT
-
|