1DNSSEC-DSFROMKEY(8)                  BIND9                 DNSSEC-DSFROMKEY(8)
2
3
4

NAME

6       dnssec-dsfromkey - DNSSEC DS RR generation tool
7

SYNOPSIS

9       dnssec-dsfromkey [-v level] [-1] [-2] [-a alg] [-l domain] [-T TTL]
10                        {keyfile}
11
12       dnssec-dsfromkey {-s} [-1] [-2] [-a alg] [-K directory] [-l domain]
13                        [-s] [-c class] [-T TTL] [-f file] [-A] [-v level]
14                        {dnsname}
15

DESCRIPTION

17       dnssec-dsfromkey outputs the Delegation Signer (DS) resource record
18       (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
19

OPTIONS

21       -1
22           Use SHA-1 as the digest algorithm (the default is to use both SHA-1
23           and SHA-256).
24
25       -2
26           Use SHA-256 as the digest algorithm.
27
28       -a algorithm
29           Select the digest algorithm. The value of algorithm must be one of
30           SHA-1 (SHA1), SHA-256 (SHA256), GOST or SHA-384 (SHA384). These
31           values are case insensitive.
32
33       -T TTL
34           Specifies the TTL of the DS records.
35
36       -K directory
37           Look for key files (or, in keyset mode, keyset- files) in
38           directory.
39
40       -f file
41           Zone file mode: in place of the keyfile name, the argument is the
42           DNS domain name of a zone master file, which can be read from file.
43           If the zone name is the same as file, then it may be omitted.
44
45           If file is set to "-", then the zone data is read from the standard
46           input. This makes it possible to use the output of the dig command
47           as input, as in:
48
49           dig dnskey example.com | dnssec-dsfromkey -f - example.com
50
51       -A
52           Include ZSK's when generating DS records. Without this option, only
53           keys which have the KSK flag set will be converted to DS records
54           and printed. Useful only in zone file mode.
55
56       -l domain
57           Generate a DLV set instead of a DS set. The specified domain is
58           appended to the name for each record in the set. The DNSSEC
59           Lookaside Validation (DLV) RR is described in RFC 4431.
60
61       -s
62           Keyset mode: in place of the keyfile name, the argument is the DNS
63           domain name of a keyset file.
64
65       -c class
66           Specifies the DNS class (default is IN). Useful only in keyset or
67           zone file mode.
68
69       -v level
70           Sets the debugging level.
71

EXAMPLE

73       To build the SHA-256 DS RR from the Kexample.com.+003+26160 keyfile
74       name, the following command would be issued:
75
76       dnssec-dsfromkey -2 Kexample.com.+003+26160
77
78       The command would print something like:
79
80       example.com. IN DS 26160 5 2
81       3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94
82

FILES

84       The keyfile can be designed by the key identification Knnnn.+aaa+iiiii
85       or the full file name Knnnn.+aaa+iiiii.key as generated by
86       dnssec-keygen(8).
87
88       The keyset file name is built from the directory, the string keyset-
89       and the dnsname.
90

CAVEAT

92       A keyfile error can give a "file not found" even if the file exists.
93

SEE ALSO

95       dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference
96       Manual, RFC 3658, RFC 4431.  RFC 4509.
97

AUTHOR

99       Internet Systems Consortium
100
102       Copyright © 2008-2012 Internet Systems Consortium, Inc. ("ISC")
103
104
105
106BIND9                           August 26, 2009            DNSSEC-DSFROMKEY(8)
Impressum