1dnssec-makekeyset(1M)   System Administration Commands   dnssec-makekeyset(1M)
2
3
4

NAME

6       dnssec-makekeyset - DNSSEC zone signing tool
7

SYNOPSIS

9       dnssec-makekeyset [-ahp] [-s start-time] [-e end-time]
10            [-r randomdev] [-t ttl] [-v level] key...
11
12

DESCRIPTION

14       The dnssec-makekeyset utility generates a key set from one or more keys
15       created by dnssec-keygen(1M). It creates a file containing a KEY record
16       for each key, and self-signs the key set with each zone key. The output
17       file is of the form keyset-nnnn., where nnnn is the zone name.
18

OPTIONS

20       -a               Verify all generated signatures.
21
22
23       -e end-time      Specify the date  and  time  when  the  generated  SIG
24                        records  expire.  As with start-time, an absolute time
25                        is indicated in YYYYMMDDHHMMSS notation. A time  rela‐
26                        tive  to the start time is indicated with +N, which is
27                        N seconds from the start time. A time relative to  the
28                        current  time  is indicated with now+N. If no end-time
29                        is specified, 30 days from the start time is used as a
30                        default.
31
32
33       -h               Print  a short summary of the options and arguments to
34                        dnssec-makekeyset().
35
36
37       -p               Use pseudo-random data when signing the zone. This  is
38                        faster,  but less secure, than using real random data.
39                        This option may be useful when signing large zones  or
40                        when the entropy source is limited.
41
42
43       -r randomdev     Specify  the  source  of  randomness. If the operating
44                        system does not provide a  /dev/random  or  equivalent
45                        device,  the  default source of randomness is keyboard
46                        input. The randomdev argument specifies the name of  a
47                        character  device or file containing random data to be
48                        used instead of the default. The  special  value  key‐
49                        board indicates that keyboard input should be used.
50
51
52       -s start-time    Specify  the  date  and  time  when  the generated SIG
53                        records become valid. This can be either  an  absolute
54                        or  relative time. An absolute start time is indicated
55                        by a number in YYYYMMDDHHMMSS notation; 20000530144500
56                        denotes  14:45:00  UTC  on  May 30th, 2000. A relative
57                        start time is indicated by +N, which is N seconds from
58                        the  current  time. If no start-time is specified, the
59                        current time is used.
60
61
62       -t ttl           Specify the TTL (time to live)  of  the  KEY  and  SIG
63                        records. The default is 3600 seconds.
64
65
66       -v level         Set the debugging level.
67
68

OPERANDS

70       The following operands are supported:
71
72       key    The  list  of keys to be included in the keyset file. These keys
73              are expressed in  the  form  Knnnn.+aaa+iiiii  as  generated  by
74              dnssec-keygen.
75
76

EXAMPLES

78       Example 1 Generates a keyset containing the DSA key for example.com.
79
80
81       The  following  command  generates  a keyset containing the DSA key for
82       example.com generated in the dnssec-keygen(1M) manual page.
83
84
85         dnssec-makekeyset -t 86400 -s 20000701120000 -e +2592000 \
86         Kexample.com.+003+26160
87
88
89
90
91       In this example,  dnssec-makekeyset()  creates  the  file  keyset-exam‐
92       ple.com. This file contains the specified key and a self-generated sig‐
93       nature.
94
95
96
97       The DNS administrator for example.com could send keyset-example.com. to
98       the DNS administrator for .com for signing, if the .com zone is DNSSEC-
99       aware and the administrators of the two zones have some  mechanism  for
100       authenticating  each  other  and  exchanging  the  keys  and signatures
101       securely.
102
103

ATTRIBUTES

105       See attributes(5) for descriptions of the following attributes:
106
107
108
109
110       ┌───────────────────────────────────────────────────────────┐
111       │      ATTRIBUTE TYPE                ATTRIBUTE VALUE        │
112       │Availability                  SUNWbind9                    │
113       │Interface Stability           External                     │
114       └───────────────────────────────────────────────────────────┘
115

SEE ALSO

117       dnssec-keygen(1M), dnssec-signkey(1M), attributes(5)
118
119
120       RFC 2535
121
122
123       BIND 9 Administrator Reference Manual
124

NOTES

126       Source for BIND9 is available in the SUNWbind9S package.
127
128
129
130SunOS 5.11                        20 Mar 2007            dnssec-makekeyset(1M)
Impressum