1DNSSEC-VERIFY(1)                    BIND 9                    DNSSEC-VERIFY(1)
2
3
4

NAME

6       dnssec-verify - DNSSEC zone verification tool
7

SYNOPSIS

9       dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin] [-q]
10       [-v level] [-V] [-x] [-z] {zonefile}
11

DESCRIPTION

13       dnssec-verify verifies that a zone is fully signed for  each  algorithm
14       found  in the DNSKEY RRset for the zone, and that the NSEC/NSEC3 chains
15       are complete.
16

OPTIONS

18       -c class
19              This option specifies the DNS class of the zone.
20
21       -E engine
22              This option specifies the cryptographic hardware  to  use,  when
23              applicable.
24
25              When  BIND  9 is built with OpenSSL, this needs to be set to the
26              OpenSSL engine identifier that drives the cryptographic acceler‐
27              ator or hardware service module (usually pkcs11).
28
29       -I input-format
30              This  option  sets  the  format of the input zone file. Possible
31              formats are text (the default) and raw. This option is primarily
32              intended to be used for dynamic signed zones, so that the dumped
33              zone file in a non-text format containing updates can  be  veri‐
34              fied  independently.   This option is not useful for non-dynamic
35              zones.
36
37       -o origin
38              This option indicates the zone origin.  If  not  specified,  the
39              name of the zone file is assumed to be the origin.
40
41       -v level
42              This option sets the debugging level.
43
44       -V     This option prints version information.
45
46       -q     This  option  sets quiet mode, which suppresses output.  Without
47              this option, when dnssec-verify is run  it  prints  to  standard
48              output  the number of keys in use, the algorithms used to verify
49              the zone was signed correctly,  and  other  status  information.
50              With  this  option, all non-error output is suppressed, and only
51              the exit code indicates success.
52
53       -x     This option verifies only that the DNSKEY RRset is  signed  with
54              key-signing  keys.   Without  this  flag, it is assumed that the
55              DNSKEY RRset is signed by all active keys.  When  this  flag  is
56              set,  it  is  not  an error if the DNSKEY RRset is not signed by
57              zone-signing  keys.  This  corresponds  to  the  -x  option   in
58              dnssec-signzone.
59
60       -z     This  option  indicates  that the KSK flag on the keys should be
61              ignored when determining whether the zone is  correctly  signed.
62              Without  this  flag,  it is assumed that there is a non-revoked,
63              self-signed DNSKEY with the KSK flag set for each algorithm, and
64              that  RRsets other than DNSKEY RRset are signed with a different
65              DNSKEY without the KSK flag set.
66
67              With this flag set, BIND 9 only requires  that  for  each  algo‐
68              rithm,  there  be  at least one non-revoked, self-signed DNSKEY,
69              regardless of the KSK flag  state,  and  that  other  RRsets  be
70              signed by a non-revoked key for the same algorithm that includes
71              the self-signed key; the same key may be used for both purposes.
72              This corresponds to the -z option in dnssec-signzone.
73
74       zonefile
75              This option indicates the file containing the zone to be signed.
76

SEE ALSO

78       dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 4033.
79

AUTHOR

81       Internet Systems Consortium
82
84       2023, Internet Systems Consortium
85
86
87
88
899.19.18                                                       DNSSEC-VERIFY(1)
Impressum