1DNSSEC-VERIFY(8) BIND 9 DNSSEC-VERIFY(8)
2
3
4
6 dnssec-verify - DNSSEC zone verification tool
7
9 dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin] [-q]
10 [-v level] [-V] [-x] [-z] {zonefile}
11
13 dnssec-verify verifies that a zone is fully signed for each algorithm
14 found in the DNSKEY RRset for the zone, and that the NSEC/NSEC3 chains
15 are complete.
16
18 -c class
19 This option specifies the DNS class of the zone.
20
21 -E engine
22 This option specifies the cryptographic hardware to use, when
23 applicable.
24
25 When BIND 9 is built with OpenSSL, this needs to be set to the
26 OpenSSL engine identifier that drives the cryptographic acceler‐
27 ator or hardware service module (usually pkcs11). When BIND is
28 built with native PKCS#11 cryptography (--enable-native-pkcs11),
29 it defaults to the path of the PKCS#11 provider library speci‐
30 fied via --with-pkcs11.
31
32 -I input-format
33 This option sets the format of the input zone file. Possible
34 formats are text (the default) and raw. This option is primarily
35 intended to be used for dynamic signed zones, so that the dumped
36 zone file in a non-text format containing updates can be veri‐
37 fied independently. This option is not useful for non-dynamic
38 zones.
39
40 -o origin
41 This option indicates the zone origin. If not specified, the
42 name of the zone file is assumed to be the origin.
43
44 -v level
45 This option sets the debugging level.
46
47 -V This option prints version information.
48
49 -q This option sets quiet mode, which suppresses output. Without
50 this option, when dnssec-verify is run it prints to standard
51 output the number of keys in use, the algorithms used to verify
52 the zone was signed correctly, and other status information.
53 With this option, all non-error output is suppressed, and only
54 the exit code indicates success.
55
56 -x This option verifies only that the DNSKEY RRset is signed with
57 key-signing keys. Without this flag, it is assumed that the
58 DNSKEY RRset is signed by all active keys. When this flag is
59 set, it is not an error if the DNSKEY RRset is not signed by
60 zone-signing keys. This corresponds to the -x option in
61 dnssec-signzone.
62
63 -z This option indicates that the KSK flag on the keys should be
64 ignored when determining whether the zone is correctly signed.
65 Without this flag, it is assumed that there is a non-revoked,
66 self-signed DNSKEY with the KSK flag set for each algorithm, and
67 that RRsets other than DNSKEY RRset are signed with a different
68 DNSKEY without the KSK flag set.
69
70 With this flag set, BIND 9 only requires that for each algo‐
71 rithm, there be at least one non-revoked, self-signed DNSKEY,
72 regardless of the KSK flag state, and that other RRsets be
73 signed by a non-revoked key for the same algorithm that includes
74 the self-signed key; the same key may be used for both purposes.
75 This corresponds to the -z option in dnssec-signzone.
76
77 zonefile
78 This option indicates the file containing the zone to be signed.
79
81 dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 4033.
82
84 Internet Systems Consortium
85
87 2022, Internet Systems Consortium
88
89
90
91
929.16.30-RH DNSSEC-VERIFY(8)