1DNSSEC-DSFROMKEY(8) BIND9 DNSSEC-DSFROMKEY(8)
2
3
4
6 dnssec-dsfromkey - DNSSEC DS RR generation tool
7
9 dnssec-dsfromkey [-v level] [-1] [-2] [-a alg] [-l domain] [-T TTL]
10 {keyfile}
11
12 dnssec-dsfromkey {-s} [-1] [-2] [-a alg] [-K directory] [-l domain]
13 [-s] [-c class] [-T TTL] [-f file] [-A] [-v level]
14 {dnsname}
15
17 dnssec-dsfromkey outputs the Delegation Signer (DS) resource record
18 (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
19
21 -1
22 Use SHA-1 as the digest algorithm (the default is to use both SHA-1
23 and SHA-256).
24
25 -2
26 Use SHA-256 as the digest algorithm.
27
28 -a algorithm
29 Select the digest algorithm. The value of algorithm must be one of
30 SHA-1 (SHA1), SHA-256 (SHA256), GOST or SHA-384 (SHA384). These
31 values are case insensitive.
32
33 -T TTL
34 Specifies the TTL of the DS records.
35
36 -K directory
37 Look for key files (or, in keyset mode, keyset- files) in
38 directory.
39
40 -f file
41 Zone file mode: in place of the keyfile name, the argument is the
42 DNS domain name of a zone master file, which can be read from file.
43 If the zone name is the same as file, then it may be omitted.
44
45 If file is set to "-", then the zone data is read from the standard
46 input. This makes it possible to use the output of the dig command
47 as input, as in:
48
49 dig dnskey example.com | dnssec-dsfromkey -f - example.com
50
51 -A
52 Include ZSK's when generating DS records. Without this option, only
53 keys which have the KSK flag set will be converted to DS records
54 and printed. Useful only in zone file mode.
55
56 -l domain
57 Generate a DLV set instead of a DS set. The specified domain is
58 appended to the name for each record in the set. The DNSSEC
59 Lookaside Validation (DLV) RR is described in RFC 4431.
60
61 -s
62 Keyset mode: in place of the keyfile name, the argument is the DNS
63 domain name of a keyset file.
64
65 -c class
66 Specifies the DNS class (default is IN). Useful only in keyset or
67 zone file mode.
68
69 -v level
70 Sets the debugging level.
71
73 To build the SHA-256 DS RR from the Kexample.com.+003+26160 keyfile
74 name, the following command would be issued:
75
76 dnssec-dsfromkey -2 Kexample.com.+003+26160
77
78 The command would print something like:
79
80 example.com. IN DS 26160 5 2
81 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94
82
84 The keyfile can be designed by the key identification Knnnn.+aaa+iiiii
85 or the full file name Knnnn.+aaa+iiiii.key as generated by
86 dnssec-keygen(8).
87
88 The keyset file name is built from the directory, the string keyset-
89 and the dnsname.
90
92 A keyfile error can give a "file not found" even if the file exists.
93
95 dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference
96 Manual, RFC 3658, RFC 4431. RFC 4509.
97
99 Internet Systems Consortium
100
102 Copyright © 2008-2012 Internet Systems Consortium, Inc. ("ISC")
103
104
105
106BIND9 August 26, 2009 DNSSEC-DSFROMKEY(8)