1<!-- 2 - Copyright (C) 2008-2012 Internet Systems Consortium, Inc. ("ISC") 3 - 4 - Permission to use, copy, modify, and/or distribute this software for any 5 - purpose with or without fee is hereby granted, provided that the above 6 - copyright notice and this permission notice appear in all copies. 7 - 8 - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 9 - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 10 - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 11 - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 12 - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 13 - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 14 - PERFORMANCE OF THIS SOFTWARE. 15--> 16<!-- Id --> 17<html> 18<head> 19<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> 20<title>dnssec-dsfromkey</title> 21<meta name="generator" content="DocBook XSL Stylesheets V1.71.1"> 22</head> 23<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en"> 24<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div> 25<div class="refnamediv"> 26<h2>Name</h2> 27<p><span class="application">dnssec-dsfromkey</span> — DNSSEC DS RR generation tool</p> 28</div> 29<div class="refsynopsisdiv"> 30<h2>Synopsis</h2> 31<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] {keyfile}</p></div> 32<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code> {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div> 33</div> 34<div class="refsect1" lang="en"> 35<a name="id2543489"></a><h2>DESCRIPTION</h2> 36<p><span><strong class="command">dnssec-dsfromkey</strong></span> 37 outputs the Delegation Signer (DS) resource record (RR), as defined in 38 RFC 3658 and RFC 4509, for the given key(s). 39 </p> 40</div> 41<div class="refsect1" lang="en"> 42<a name="id2543500"></a><h2>OPTIONS</h2> 43<div class="variablelist"><dl> 44<dt><span class="term">-1</span></dt> 45<dd><p> 46 Use SHA-1 as the digest algorithm (the default is to use 47 both SHA-1 and SHA-256). 48 </p></dd> 49<dt><span class="term">-2</span></dt> 50<dd><p> 51 Use SHA-256 as the digest algorithm. 52 </p></dd> 53<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt> 54<dd><p> 55 Select the digest algorithm. The value of 56 <code class="option">algorithm</code> must be one of SHA-1 (SHA1), 57 SHA-256 (SHA256), GOST or SHA-384 (SHA384). 58 These values are case insensitive. 59 </p></dd> 60<dt><span class="term">-T <em class="replaceable"><code>TTL</code></em></span></dt> 61<dd><p> 62 Specifies the TTL of the DS records. 63 </p></dd> 64<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt> 65<dd><p> 66 Look for key files (or, in keyset mode, 67 <code class="filename">keyset-</code> files) in 68 <code class="option">directory</code>. 69 </p></dd> 70<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt> 71<dd> 72<p> 73 Zone file mode: in place of the keyfile name, the argument is 74 the DNS domain name of a zone master file, which can be read 75 from <code class="option">file</code>. If the zone name is the same as 76 <code class="option">file</code>, then it may be omitted. 77 </p> 78<p> 79 If <code class="option">file</code> is set to <code class="literal">"-"</code>, then 80 the zone data is read from the standard input. This makes it 81 possible to use the output of the <span><strong class="command">dig</strong></span> 82 command as input, as in: 83 </p> 84<p> 85 <strong class="userinput"><code>dig dnskey example.com | dnssec-dsfromkey -f - example.com</code></strong> 86 </p> 87</dd> 88<dt><span class="term">-A</span></dt> 89<dd><p> 90 Include ZSK's when generating DS records. Without this option, 91 only keys which have the KSK flag set will be converted to DS 92 records and printed. Useful only in zone file mode. 93 </p></dd> 94<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt> 95<dd><p> 96 Generate a DLV set instead of a DS set. The specified 97 <code class="option">domain</code> is appended to the name for each 98 record in the set. 99 The DNSSEC Lookaside Validation (DLV) RR is described 100 in RFC 4431. 101 </p></dd> 102<dt><span class="term">-s</span></dt> 103<dd><p> 104 Keyset mode: in place of the keyfile name, the argument is 105 the DNS domain name of a keyset file. 106 </p></dd> 107<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt> 108<dd><p> 109 Specifies the DNS class (default is IN). Useful only 110 in keyset or zone file mode. 111 </p></dd> 112<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt> 113<dd><p> 114 Sets the debugging level. 115 </p></dd> 116</dl></div> 117</div> 118<div class="refsect1" lang="en"> 119<a name="id2543726"></a><h2>EXAMPLE</h2> 120<p> 121 To build the SHA-256 DS RR from the 122 <strong class="userinput"><code>Kexample.com.+003+26160</code></strong> 123 keyfile name, the following command would be issued: 124 </p> 125<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong> 126 </p> 127<p> 128 The command would print something like: 129 </p> 130<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong> 131 </p> 132</div> 133<div class="refsect1" lang="en"> 134<a name="id2543756"></a><h2>FILES</h2> 135<p> 136 The keyfile can be designed by the key identification 137 <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name 138 <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by 139 <span class="refentrytitle">dnssec-keygen</span>(8). 140 </p> 141<p> 142 The keyset file name is built from the <code class="option">directory</code>, 143 the string <code class="filename">keyset-</code> and the 144 <code class="option">dnsname</code>. 145 </p> 146</div> 147<div class="refsect1" lang="en"> 148<a name="id2543792"></a><h2>CAVEAT</h2> 149<p> 150 A keyfile error can give a "file not found" even if the file exists. 151 </p> 152</div> 153<div class="refsect1" lang="en"> 154<a name="id2543801"></a><h2>SEE ALSO</h2> 155<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>, 156 <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>, 157 <em class="citetitle">BIND 9 Administrator Reference Manual</em>, 158 <em class="citetitle">RFC 3658</em>, 159 <em class="citetitle">RFC 4431</em>. 160 <em class="citetitle">RFC 4509</em>. 161 </p> 162</div> 163<div class="refsect1" lang="en"> 164<a name="id2543841"></a><h2>AUTHOR</h2> 165<p><span class="corpauthor">Internet Systems Consortium</span> 166 </p> 167</div> 168</div></body> 169</html> 170