1<!--
2 - Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
3 - Copyright (C) 2000-2003 Internet Software Consortium.
4 - 
5 - Permission to use, copy, modify, and/or distribute this software for any
6 - purpose with or without fee is hereby granted, provided that the above
7 - copyright notice and this permission notice appear in all copies.
8 - 
9 - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 - PERFORMANCE OF THIS SOFTWARE.
16-->
17<!-- Id -->
18<html>
19<head>
20<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
21<title>dnssec-dsfromkey</title>
22<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
23<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
24<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
25<link rel="prev" href="man.host.html" title="host">
26<link rel="next" href="man.dnssec-keyfromlabel.html" title="dnssec-keyfromlabel">
27</head>
28<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
29<div class="navheader">
30<table width="100%" summary="Navigation header">
31<tr><th colspan="3" align="center"><span class="application">dnssec-dsfromkey</span></th></tr>
32<tr>
33<td width="20%" align="left">
34<a accesskey="p" href="man.host.html">Prev</a>�</td>
35<th width="60%" align="center">Manual pages</th>
36<td width="20%" align="right">�<a accesskey="n" href="man.dnssec-keyfromlabel.html">Next</a>
37</td>
38</tr>
39</table>
40<hr>
41</div>
42<div class="refentry" lang="en">
43<a name="man.dnssec-dsfromkey"></a><div class="titlepage"></div>
44<div class="refnamediv">
45<h2>Name</h2>
46<p><span class="application">dnssec-dsfromkey</span> &#8212; DNSSEC DS RR generation tool</p>
47</div>
48<div class="refsynopsisdiv">
49<h2>Synopsis</h2>
50<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code>  [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] {keyfile}</p></div>
51<div class="cmdsynopsis"><p><code class="command">dnssec-dsfromkey</code>  {-s} [<code class="option">-1</code>] [<code class="option">-2</code>] [<code class="option">-a <em class="replaceable"><code>alg</code></em></code>] [<code class="option">-K <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-l <em class="replaceable"><code>domain</code></em></code>] [<code class="option">-s</code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-T <em class="replaceable"><code>TTL</code></em></code>] [<code class="option">-f <em class="replaceable"><code>file</code></em></code>] [<code class="option">-A</code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] {dnsname}</p></div>
52</div>
53<div class="refsect1" lang="en">
54<a name="id2612624"></a><h2>DESCRIPTION</h2>
55<p><span><strong class="command">dnssec-dsfromkey</strong></span>
56      outputs the Delegation Signer (DS) resource record (RR), as defined in
57      RFC 3658 and RFC 4509, for the given key(s).
58    </p>
59</div>
60<div class="refsect1" lang="en">
61<a name="id2612637"></a><h2>OPTIONS</h2>
62<div class="variablelist"><dl>
63<dt><span class="term">-1</span></dt>
64<dd><p>
65            Use SHA-1 as the digest algorithm (the default is to use
66            both SHA-1 and SHA-256).
67          </p></dd>
68<dt><span class="term">-2</span></dt>
69<dd><p>
70            Use SHA-256 as the digest algorithm.
71          </p></dd>
72<dt><span class="term">-a <em class="replaceable"><code>algorithm</code></em></span></dt>
73<dd><p>
74            Select the digest algorithm. The value of
75            <code class="option">algorithm</code> must be one of SHA-1 (SHA1),
76            SHA-256 (SHA256), GOST or SHA-384 (SHA384).
77            These values are case insensitive.
78          </p></dd>
79<dt><span class="term">-T <em class="replaceable"><code>TTL</code></em></span></dt>
80<dd><p>
81            Specifies the TTL of the DS records.
82          </p></dd>
83<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
84<dd><p>
85            Look for key files (or, in keyset mode,
86            <code class="filename">keyset-</code> files) in
87            <code class="option">directory</code>.
88          </p></dd>
89<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
90<dd>
91<p>
92            Zone file mode: in place of the keyfile name, the argument is
93            the DNS domain name of a zone master file, which can be read
94            from <code class="option">file</code>.  If the zone name is the same as
95            <code class="option">file</code>, then it may be omitted.
96          </p>
97<p>
98            If <code class="option">file</code> is set to <code class="literal">"-"</code>, then
99            the zone data is read from the standard input.  This makes it
100            possible to use the output of the <span><strong class="command">dig</strong></span>
101            command as input, as in:
102          </p>
103<p>
104            <strong class="userinput"><code>dig dnskey example.com | dnssec-dsfromkey -f - example.com</code></strong>
105          </p>
106</dd>
107<dt><span class="term">-A</span></dt>
108<dd><p>
109            Include ZSK's when generating DS records.  Without this option,
110            only keys which have the KSK flag set will be converted to DS
111            records and printed.  Useful only in zone file mode. 
112          </p></dd>
113<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
114<dd><p>
115            Generate a DLV set instead of a DS set.  The specified
116            <code class="option">domain</code> is appended to the name for each
117            record in the set.
118            The DNSSEC Lookaside Validation (DLV) RR is described
119            in RFC 4431.
120          </p></dd>
121<dt><span class="term">-s</span></dt>
122<dd><p>
123            Keyset mode: in place of the keyfile name, the argument is
124            the DNS domain name of a keyset file.
125          </p></dd>
126<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
127<dd><p>
128            Specifies the DNS class (default is IN).  Useful only
129            in keyset or zone file mode.
130          </p></dd>
131<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt>
132<dd><p>
133            Sets the debugging level.
134          </p></dd>
135</dl></div>
136</div>
137<div class="refsect1" lang="en">
138<a name="id2613486"></a><h2>EXAMPLE</h2>
139<p>
140      To build the SHA-256 DS RR from the
141      <strong class="userinput"><code>Kexample.com.+003+26160</code></strong>
142      keyfile name, the following command would be issued:
143    </p>
144<p><strong class="userinput"><code>dnssec-dsfromkey -2 Kexample.com.+003+26160</code></strong>
145    </p>
146<p>
147      The command would print something like:
148    </p>
149<p><strong class="userinput"><code>example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94</code></strong>
150    </p>
151</div>
152<div class="refsect1" lang="en">
153<a name="id2613523"></a><h2>FILES</h2>
154<p>
155      The keyfile can be designed by the key identification
156      <code class="filename">Knnnn.+aaa+iiiii</code> or the full file name
157      <code class="filename">Knnnn.+aaa+iiiii.key</code> as generated by
158      <span class="refentrytitle">dnssec-keygen</span>(8).
159    </p>
160<p>
161      The keyset file name is built from the <code class="option">directory</code>,
162      the string <code class="filename">keyset-</code> and the
163      <code class="option">dnsname</code>.
164    </p>
165</div>
166<div class="refsect1" lang="en">
167<a name="id2613564"></a><h2>CAVEAT</h2>
168<p>
169      A keyfile error can give a "file not found" even if the file exists.
170    </p>
171</div>
172<div class="refsect1" lang="en">
173<a name="id2613574"></a><h2>SEE ALSO</h2>
174<p><span class="citerefentry"><span class="refentrytitle">dnssec-keygen</span>(8)</span>,
175      <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>,
176      <em class="citetitle">BIND 9 Administrator Reference Manual</em>,
177      <em class="citetitle">RFC 3658</em>,
178      <em class="citetitle">RFC 4431</em>.
179      <em class="citetitle">RFC 4509</em>.
180    </p>
181</div>
182<div class="refsect1" lang="en">
183<a name="id2613613"></a><h2>AUTHOR</h2>
184<p><span class="corpauthor">Internet Systems Consortium</span>
185    </p>
186</div>
187</div>
188<div class="navfooter">
189<hr>
190<table width="100%" summary="Navigation footer">
191<tr>
192<td width="40%" align="left">
193<a accesskey="p" href="man.host.html">Prev</a>�</td>
194<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch10.html">Up</a></td>
195<td width="40%" align="right">�<a accesskey="n" href="man.dnssec-keyfromlabel.html">Next</a>
196</td>
197</tr>
198<tr>
199<td width="40%" align="left" valign="top">host�</td>
200<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
201<td width="40%" align="right" valign="top">�<span class="application">dnssec-keyfromlabel</span>
202</td>
203</tr>
204</table>
205</div>
206</body>
207</html>
208