4.11. dnssec-dsfromkey --- DS RR generator

4.11.1. Synopsis

dnssec-dsfromkey [-v level] [-1] [-2] [-a <algorithm>] [-C] [-l domain] [-T <ttl>] <keyfile>

dnssec-dsfromkey [-s] [-1] [-2] [-a <algorithm>] [-K directory] [-l domain] [-s] [-c class] [-T <ttl>] [-f file] [-A] [-v level] <dnsname>

dnssec-dsfromkey [-h] [-V]

4.11.2. Description

dnssec-dsfromkey generates the DS and CDS resource records for the given DNSKEYs.

4.11.3. Options

-1

Use SHA-1 as the digest algorithm (the default is to use both SHA-1 and SHA-256).

-2

Use SHA-256 as the digest algorithm.

-a <algorithm>

Select the digest algorithm. The value of <algorithm> must be one of SHA1 (SHA-1), SHA256 (SHA-256), or SHA384 (SHA-384). These values are case insensitive.

-C

Generate CDS records rather than DS records. This is mutually exclusive with generating lookaside records.

-T <ttl>

Specifies the TTL of the DS records.

-K <directory>

Look for key files (or, in keyset mode, keyset- files) in <directory>.

-f <file>

Zone file mode: in place of the keyfile name, the argument is the DNS domain name of a zone master file, which can be read from <file>. If the zone name is the same as <file>, then it may be omitted.

If <file> is set to -, then the zone data is read from the standard input. This makes it possible to use the output of the dig(1) command as input, as in:

$ dig dnskey example.com | dnssec-dsfromkey -f - example.com
-A

Include ZSKs when generating DS records. Without this option, only keys which have the KSK flag set will be converted to DS records and printed. Useful only in zone file mode.

-s

Keyset mode: in place of the keyfile name, the argument is the DNS domain name of a keyset file.

-c <class>

Specifies the DNS class. The default is IN. Useful only in keyset or zone file mode.

-v <level>

Set the verbosity level.

-h

Print usage information and exit.

-V

Print the program's version and exit.

4.11.4. Examples

To build the SHA-256 DS RR from the Kexample.com.+003+26160 keyfile name, the following command would be issued:

$ dnssec-dsfromkey -2 Kexample.com.+003+26160

The command would print something like:

example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94

4.11.5. Files

The keyfile can be designed by the key identification Knnnn.+aaa+iiiii or the full file name Knnnn.+aaa+iiiii.key as generated by dnssec-keygen(1).

The keyset file name is built from the <directory>, the string keyset- and the <dnsname>.

4.11.6. Caveat

A keyfile error can result in a "file not found" error even if the file exists.

4.11.7. See also

dnssec-keygen(1), dnssec-signzone(1)