1DNSSEC-DSFROMKEY(8) BIND9 DNSSEC-DSFROMKEY(8)
2
3
4
6 dnssec-dsfromkey - DNSSEC DS RR generation tool
7
9 dnssec-dsfromkey [-v level] [-1] [-2] [-a alg] [-C] [-l domain]
10 [-T TTL] {keyfile}
11
12 dnssec-dsfromkey {-s} [-1] [-2] [-a alg] [-K directory] [-l domain]
13 [-s] [-c class] [-T TTL] [-f file] [-A] [-v level]
14 {dnsname}
15
16 dnssec-dsfromkey [-h] [-V]
17
19 dnssec-dsfromkey outputs the Delegation Signer (DS) resource record
20 (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
21
23 -1
24 Use SHA-1 as the digest algorithm (the default is to use both SHA-1
25 and SHA-256).
26
27 -2
28 Use SHA-256 as the digest algorithm.
29
30 -a algorithm
31 Select the digest algorithm. The value of algorithm must be one of
32 SHA-1 (SHA1), SHA-256 (SHA256), GOST or SHA-384 (SHA384). These
33 values are case insensitive.
34
35 -C
36 Generate CDS records rather than DS records. This is mutually
37 exclusive with generating lookaside records.
38
39 -T TTL
40 Specifies the TTL of the DS records.
41
42 -K directory
43 Look for key files (or, in keyset mode, keyset- files) in
44 directory.
45
46 -f file
47 Zone file mode: in place of the keyfile name, the argument is the
48 DNS domain name of a zone master file, which can be read from file.
49 If the zone name is the same as file, then it may be omitted.
50
51 If file is set to "-", then the zone data is read from the standard
52 input. This makes it possible to use the output of the dig command
53 as input, as in:
54
55 dig dnskey example.com | dnssec-dsfromkey -f - example.com
56
57 -A
58 Include ZSKs when generating DS records. Without this option, only
59 keys which have the KSK flag set will be converted to DS records
60 and printed. Useful only in zone file mode.
61
62 -l domain
63 Generate a DLV set instead of a DS set. The specified domain is
64 appended to the name for each record in the set. The DNSSEC
65 Lookaside Validation (DLV) RR is described in RFC 4431. This is
66 mutually exclusive with generating CDS records.
67
68 -s
69 Keyset mode: in place of the keyfile name, the argument is the DNS
70 domain name of a keyset file.
71
72 -c class
73 Specifies the DNS class (default is IN). Useful only in keyset or
74 zone file mode.
75
76 -v level
77 Sets the debugging level.
78
79 -h
80 Prints usage information.
81
82 -V
83 Prints version information.
84
86 To build the SHA-256 DS RR from the Kexample.com.+003+26160 keyfile
87 name, the following command would be issued:
88
89 dnssec-dsfromkey -2 Kexample.com.+003+26160
90
91 The command would print something like:
92
93 example.com. IN DS 26160 5 2
94 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94
95
97 The keyfile can be designed by the key identification Knnnn.+aaa+iiiii
98 or the full file name Knnnn.+aaa+iiiii.key as generated by
99 dnssec-keygen(8).
100
101 The keyset file name is built from the directory, the string keyset-
102 and the dnsname.
103
105 A keyfile error can give a "file not found" even if the file exists.
106
108 dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference
109 Manual, RFC 3658, RFC 4431. RFC 4509.
110
112 Internet Systems Consortium, Inc.
113
115 Copyright © 2008-2012, 2014-2016, 2018 Internet Systems Consortium,
116 Inc. ("ISC")
117
118
119
120ISC 2012-05-02 DNSSEC-DSFROMKEY(8)