1DNSSEC-VERIFY(8)                     BIND9                    DNSSEC-VERIFY(8)
2
3
4

NAME

6       dnssec-verify - DNSSEC zone verification tool
7

SYNOPSIS

9       dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin]
10                     [-v level] [-x] [-z] {zonefile}
11

DESCRIPTION

13       dnssec-verify verifies that a zone is fully signed for each algorithm
14       found in the DNSKEY RRset for the zone, and that the NSEC / NSEC3
15       chains are complete.
16

OPTIONS

18       -c class
19           Specifies the DNS class of the zone.
20
21       -I input-format
22           The format of the input zone file. Possible formats are "text"
23           (default) and "raw". This option is primarily intended to be used
24           for dynamic signed zones so that the dumped zone file in a non-text
25           format containing updates can be verified independently. The use of
26           this option does not make much sense for non-dynamic zones.
27
28       -o origin
29           The zone origin. If not specified, the name of the zone file is
30           assumed to be the origin.
31
32       -v level
33           Sets the debugging level.
34
35       -x
36           Only verify that the DNSKEY RRset is signed with key-signing keys.
37           Without this flag, it is assumed that the DNSKEY RRset will be
38           signed by all active keys. When this flag is set, it will not be an
39           error if the DNSKEY RRset is not signed by zone-signing keys. This
40           corresponds to the -x option in dnssec-signzone.
41
42       -z
43           Ignore the KSK flag on the keys when determining whether the zone
44           if correctly signed. Without this flag it is assumed that there
45           will be a non-revoked, self-signed DNSKEY with the KSK flag set for
46           each algorithm and that RRsets other than DNSKEY RRset will be
47           signed with a different DNSKEY without the KSK flag set.
48
49           With this flag set, we only require that for each algorithm, there
50           will be at least one non-revoked, self-signed DNSKEY, regardless of
51           the KSK flag state, and that other RRsets will be signed by a
52           non-revoked key for the same algorithm that includes the
53           self-signed key; the same key may be used for both purposes. This
54           corresponds to the -z option in dnssec-signzone.
55
56       zonefile
57           The file containing the zone to be signed.
58

SEE ALSO

60       dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 4033.
61

AUTHOR

63       Internet Systems Consortium
64
66       Copyright © 2012 Internet Systems Consortium, Inc. ("ISC")
67
68
69
70BIND9                           April 12, 2012                DNSSEC-VERIFY(8)
Impressum