2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-31 22:45:39 +00:00

minor tweaks

This commit is contained in:
Brian Wellington
2000-07-26 00:47:17 +00:00
parent 53dc771403
commit 15ba758c3a
8 changed files with 156 additions and 146 deletions

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-keygen.8,v 1.3 2000/06/28 23:40:58 jim Exp $ .\" $Id: dnssec-keygen.8,v 1.4 2000/07/26 00:47:13 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-KEYGEN 8 .Dt DNSSEC-KEYGEN 8
@@ -25,12 +25,12 @@
.Nd key generation tool for DNSSEC .Nd key generation tool for DNSSEC
.Sh SYNOPSIS .Sh SYNOPSIS
.Nm dnssec-keygen .Nm dnssec-keygen
.Op Fl a Ar algorithm .Fl a Ar algorithm
.Op Fl b Ar keysize .Fl b Ar keysize
.Op Fl e .Op Fl e
.Op Fl g Ar generator .Op Fl g Ar generator
.Op Fl h .Op Fl h
.Op Fl n Ar nametype .Fl n Ar nametype
.Op Fl p Ar protocol-value .Op Fl p Ar protocol-value
.Op Fl r Ar randomdev .Op Fl r Ar randomdev
.Op Fl s Ar strength-value .Op Fl s Ar strength-value
@@ -42,11 +42,13 @@
generates keys for DNSSEC, Secure DNS, as defined in RFC2535. generates keys for DNSSEC, Secure DNS, as defined in RFC2535.
It also generates keys for use in Transaction Signatures, TSIG, which It also generates keys for use in Transaction Signatures, TSIG, which
is defined in RFC2845. is defined in RFC2845.
.Pp
A short summary of the options and arguments to A short summary of the options and arguments to
.Nm dnssec-keygen .Nm dnssec-keygen
is printed by the is printed by the
.Fl h .Fl h
(help) option. (help) option.
.Pp
The The
.Fl a , .Fl a ,
.Fl b , .Fl b ,
@@ -62,7 +64,7 @@ option to
.Nm dnssec-keygen . .Nm dnssec-keygen .
.Ar algorithm .Ar algorithm
must be one of must be one of
.Dv RSAMD5 .Dv RSAMD5 ,
.Dv DH , .Dv DH ,
.Dv DSA .Dv DSA
or or
@@ -71,8 +73,7 @@ to indicate that an RSA, Diffie-Hellman, Digital Signature
Algorithm or HMAC-MD5 key is required. Algorithm or HMAC-MD5 key is required.
An argument of An argument of
.Dv RSA .Dv RSA
can also be given. can also be given, which is equivalent to
It is equivalent to
.Dv RSAMD5 . .Dv RSAMD5 .
The argument identifying the encryption algorithm is case-insensitive. The argument identifying the encryption algorithm is case-insensitive.
DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one. DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one.
@@ -85,7 +86,7 @@ argument following the
option. option.
The choice of key size depends on the algorithm that is used. The choice of key size depends on the algorithm that is used.
RSA keys must be between 512 and 2048 bits. RSA keys must be between 512 and 2048 bits.
Diffie-Hellman keys have to be between 128 and 4096 bits. Diffie-Hellman keys must be between 128 and 4096 bits.
For DSA, the key size must be between 512 and 1024 bits and a multiple For DSA, the key size must be between 512 and 1024 bits and a multiple
of 64. of 64.
The length of an HMAC-MD5 key can be between 1 and 512 bits. The length of an HMAC-MD5 key can be between 1 and 512 bits.
@@ -124,7 +125,7 @@ that is to be used.
The only supported values value of The only supported values value of
.Ar generator .Ar generator
are 2 and 5. are 2 and 5.
If no Diffie-Hellman generator is supplied a known prime If no Diffie-Hellman generator is supplied, a known prime
from RFC2539 will be used if possible; otherwise 2 will be used as the from RFC2539 will be used if possible; otherwise 2 will be used as the
generator. generator.
.Pp .Pp
@@ -141,12 +142,12 @@ successors.
.Nm dnssec-keygen .Nm dnssec-keygen
uses random numbers to seed the process uses random numbers to seed the process
of generating keys. of generating keys.
If the system does not have a pseudo-device like If the system does not have a
.Pa /dev/random .Pa /dev/random
for generating random numbers, device that can be used for generating random numbers,
.Nm dnssec-keygen .Nm dnssec-keygen
will prompt for some keyboard input and use the time intervals between will prompt for keyboard input and use the time intervals between
keystrokes to provide some randomness. keystrokes to provide randomness.
The The
.Fl r .Fl r
option overrides this behaviour, making option overrides this behaviour, making
@@ -259,10 +260,12 @@ The private part of the key is used by
.Xr dnssec-signzone 8 .Xr dnssec-signzone 8
to generate signatures and the public part is used to verify the to generate signatures and the public part is used to verify the
signatures. signatures.
A Both
.Ar .key
and
.Ar .private .Ar .private
key file is generated for a symmetric encryption algorithm such as key files are generated for symmetric encryption algorithm such as
HDMAC-MD5, even though it has no private key. HMAC-MD5, even though the public and private key are equivalent.
.Sh EXAMPLE .Sh EXAMPLE
To generate a 768-bit DSA key for the domain To generate a 768-bit DSA key for the domain
.Dv example.com , .Dv example.com ,

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-makekeyset.8,v 1.3 2000/06/28 23:40:59 jim Exp $ .\" $Id: dnssec-makekeyset.8,v 1.4 2000/07/26 00:47:14 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-MAKEKEYSET 8 .Dt DNSSEC-MAKEKEYSET 8
@@ -30,7 +30,7 @@
.Op Fl e Ar end-time .Op Fl e Ar end-time
.Op Fl t Ar TTL .Op Fl t Ar TTL
.Op Fl r Ar randomdev .Op Fl r Ar randomdev
.Op Fl v level .Op Fl v Ar level
.Ar keyfile .... .Ar keyfile ....
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
@@ -125,8 +125,7 @@ If no
.Fl t .Fl t
option is provided, option is provided,
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
prints a warning and assumes that a default TTL of prints a warning and uses a default TTL of 3600 seconds.
3600 seconds was required.
.Pp .Pp
The The
.Fl v .Fl v
@@ -139,9 +138,10 @@ increases,
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
generates increasingly detailed reports about what it is doing. generates increasingly detailed reports about what it is doing.
The default level is zero. The default level is zero.
An option of .Pp
The
.Fl h .Fl h
gets option makes
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
to print a short summary of its options and arguments. to print a short summary of its options and arguments.
.Pp .Pp
@@ -178,7 +178,7 @@ will create a file called
.Pa example.com.keyset .Pa example.com.keyset
containing a SIG and KEY record for containing a SIG and KEY record for
.Dv example.com. .Dv example.com.
These records will have a TTL of 1 day: 86400 seconds. These records will have a TTL of 86400 seconds (1 day).
The SIG record becomes valid at noon UTC on July 1st 2000 and expires The SIG record becomes valid at noon UTC on July 1st 2000 and expires
30 days (2592000 seconds) later. 30 days (2592000 seconds) later.
.Pp .Pp

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-signkey.8,v 1.3 2000/06/28 23:41:00 jim Exp $ .\" $Id: dnssec-signkey.8,v 1.4 2000/07/26 00:47:16 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-SIGNKEY 8 .Dt DNSSEC-SIGNKEY 8
@@ -55,31 +55,38 @@ This allows the child's keys to be signed by more than 1 parent zone
key if these exist. key if these exist.
.Pp .Pp
The The
.Fl h
option makes
.Nm dnssec-signkey
print a short summary of its command line options
and arguments.
.Pp
The
.Fl p .Fl p
option instructs option instructs
.Nm dnssec-signkey .Nm dnssec-signkey
to use pseudo-random data when signing the keys which is faster, but to use pseudo-random data when signing the keys. This is faster, but
less secure, than using genuinely random data for signing. less secure, than using genuinely random data for signing.
This option may be useful when there are many child zone keysets to This option may be useful when there are many child zone keysets to
sign of if the entropy source is limited. sign or if the entropy source is limited.
It could also be used for short-lived keys and signatures that don't It could also be used for short-lived keys and signatures that don't
require strengthening against cryptanalysis: for instance when the key require as much protection against cryptanalysis, such as when the key
will be discarded long before it could be compromised. will be discarded long before it could be compromised.
.Pp
An alternate file for obtaining random data can be used with the
.Fl r
option.
.Ar filename
is the name of the file to use.
If no
.Fl r
option is used and the default file for random data
.Pa /dev/random
does not exist,
.Nm dnssec-signkey .Nm dnssec-signkey
will prompt for input from the keyboard. may need random numbers in the process of generating keys.
The time between keystrokes will be measured and used to derive random If the system does not have a
data. .Pa /dev/random
device that can be used for generating random numbers,
.Nm dnssec-signkey
will prompt for keyboard input and use the time intervals between
keystrokes to provide randomness.
The
.Fl r
option overrides this behaviour, making
.Nm dnssec-signkey
use
.Ar randomdev
as a source of random data.
.Pp .Pp
The The
.Fl v .Fl v
@@ -93,13 +100,6 @@ increases,
generates increasingly detailed reports about what it is doing. generates increasingly detailed reports about what it is doing.
The default level is zero. The default level is zero.
.Pp .Pp
An option of
.Fl h
makes
.Nm dnssec-signkey
print a short summary of its command line options
and arguments.
.Pp
When When
.Nm dnssec-signkey .Nm dnssec-signkey
completes successfully, it generates a file called completes successfully, it generates a file called
@@ -129,13 +129,14 @@ sign the
file for file for
.Dv example.com .Dv example.com
created in the example shown in the man page for created in the example shown in the man page for
.Nm dnssec-makekeyset : .Xr dnssec-makekeyset 8 :
.Pp
.Dl # dnssec-signkey example.com.keyset Kcom.+003+51944 .Dl # dnssec-signkey example.com.keyset Kcom.+003+51944
.Pp .Pp
where where
.Dv Kcom.+003+51944 .Dv Kcom.+003+51944
was a key file identifier that was produced when was a key file identifier that was produced when
.Nm dnssec-keygen .Xr dnssec-keygen 8
generated a key for the generated a key for the
.Dv .com .Dv .com
zone. zone.

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-signzone.8,v 1.3 2000/06/28 23:41:01 jim Exp $ .\" $Id: dnssec-signzone.8,v 1.4 2000/07/26 00:47:17 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-SIGNZONE 8 .Dt DNSSEC-SIGNZONE 8
@@ -46,8 +46,8 @@ files for the zone to be signed should be present in the current
directory, along with the keys that will be used to sign the zone. directory, along with the keys that will be used to sign the zone.
If no If no
.Ar keyfile .Ar keyfile
arguments are supplied, the default behaviour is to use all the zone's arguments are supplied, the default behaviour is to use all of the zone's
keys. keys that are present in the current directory.
Providing specific Providing specific
.Ar keyfile .Ar keyfile
arguments constrains arguments constrains
@@ -182,29 +182,30 @@ determine when fresh SIG records should be generated.
The The
.Fl p .Fl p
option instructs option instructs
.Nm dnssec-signzone .Nm dnssec-signkey
to use pseudo-random data when signing the zone's resource records. to use pseudo-random data when signing the keys. This is faster, but
This is faster but less secure than using genuinely random data for signing. less secure, than using genuinely random data for signing.
This option may be useful when the zone has many resource records to be This option may be useful when there are many child zone keysets to
signed and the entropy source is limited. sign or if the entropy source is limited.
It could also be used for short-lived keys and signatures that don't It could also be used for short-lived keys and signatures that don't
require strengthening against cryptanalysis: for instance when the signatures require as much protection against cryptanalysis, such as when the key
will be discarded long before the signed data could be compromised. will be discarded long before it could be compromised.
.Pp .Pp
An alternate source of random data can be specified with the
.Fl r
option.
.Ar randomdev
is the name of the file to use to obtain random data.
By default
.Pa /dev/random
is used if this device is available.
If it is not provided by the operating system and no
.Fl r
option is used,
.Nm dnssec-signzone .Nm dnssec-signzone
will prompt the user for input from the keyboard and use the time may need random numbers in the process of signing the zone.
between keystrokes to derive some random data. If the system does not have a
.Pa /dev/random
device that can be used for generating random numbers,
.Nm dnssec-signzone
will prompt for keyboard input and use the time intervals between
keystrokes to provide randomness.
The
.Fl r
option overrides this behaviour, making
.Nm dnssec-signzone
use
.Ar randomdev
as a source of random data.
.Pp .Pp
An option of An option of
.Fl h .Fl h

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-keygen.8,v 1.3 2000/06/28 23:40:58 jim Exp $ .\" $Id: dnssec-keygen.8,v 1.4 2000/07/26 00:47:13 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-KEYGEN 8 .Dt DNSSEC-KEYGEN 8
@@ -25,12 +25,12 @@
.Nd key generation tool for DNSSEC .Nd key generation tool for DNSSEC
.Sh SYNOPSIS .Sh SYNOPSIS
.Nm dnssec-keygen .Nm dnssec-keygen
.Op Fl a Ar algorithm .Fl a Ar algorithm
.Op Fl b Ar keysize .Fl b Ar keysize
.Op Fl e .Op Fl e
.Op Fl g Ar generator .Op Fl g Ar generator
.Op Fl h .Op Fl h
.Op Fl n Ar nametype .Fl n Ar nametype
.Op Fl p Ar protocol-value .Op Fl p Ar protocol-value
.Op Fl r Ar randomdev .Op Fl r Ar randomdev
.Op Fl s Ar strength-value .Op Fl s Ar strength-value
@@ -42,11 +42,13 @@
generates keys for DNSSEC, Secure DNS, as defined in RFC2535. generates keys for DNSSEC, Secure DNS, as defined in RFC2535.
It also generates keys for use in Transaction Signatures, TSIG, which It also generates keys for use in Transaction Signatures, TSIG, which
is defined in RFC2845. is defined in RFC2845.
.Pp
A short summary of the options and arguments to A short summary of the options and arguments to
.Nm dnssec-keygen .Nm dnssec-keygen
is printed by the is printed by the
.Fl h .Fl h
(help) option. (help) option.
.Pp
The The
.Fl a , .Fl a ,
.Fl b , .Fl b ,
@@ -62,7 +64,7 @@ option to
.Nm dnssec-keygen . .Nm dnssec-keygen .
.Ar algorithm .Ar algorithm
must be one of must be one of
.Dv RSAMD5 .Dv RSAMD5 ,
.Dv DH , .Dv DH ,
.Dv DSA .Dv DSA
or or
@@ -71,8 +73,7 @@ to indicate that an RSA, Diffie-Hellman, Digital Signature
Algorithm or HMAC-MD5 key is required. Algorithm or HMAC-MD5 key is required.
An argument of An argument of
.Dv RSA .Dv RSA
can also be given. can also be given, which is equivalent to
It is equivalent to
.Dv RSAMD5 . .Dv RSAMD5 .
The argument identifying the encryption algorithm is case-insensitive. The argument identifying the encryption algorithm is case-insensitive.
DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one. DNSSEC specifies DSA as a mandatory algorithm and RSA as a recommended one.
@@ -85,7 +86,7 @@ argument following the
option. option.
The choice of key size depends on the algorithm that is used. The choice of key size depends on the algorithm that is used.
RSA keys must be between 512 and 2048 bits. RSA keys must be between 512 and 2048 bits.
Diffie-Hellman keys have to be between 128 and 4096 bits. Diffie-Hellman keys must be between 128 and 4096 bits.
For DSA, the key size must be between 512 and 1024 bits and a multiple For DSA, the key size must be between 512 and 1024 bits and a multiple
of 64. of 64.
The length of an HMAC-MD5 key can be between 1 and 512 bits. The length of an HMAC-MD5 key can be between 1 and 512 bits.
@@ -124,7 +125,7 @@ that is to be used.
The only supported values value of The only supported values value of
.Ar generator .Ar generator
are 2 and 5. are 2 and 5.
If no Diffie-Hellman generator is supplied a known prime If no Diffie-Hellman generator is supplied, a known prime
from RFC2539 will be used if possible; otherwise 2 will be used as the from RFC2539 will be used if possible; otherwise 2 will be used as the
generator. generator.
.Pp .Pp
@@ -141,12 +142,12 @@ successors.
.Nm dnssec-keygen .Nm dnssec-keygen
uses random numbers to seed the process uses random numbers to seed the process
of generating keys. of generating keys.
If the system does not have a pseudo-device like If the system does not have a
.Pa /dev/random .Pa /dev/random
for generating random numbers, device that can be used for generating random numbers,
.Nm dnssec-keygen .Nm dnssec-keygen
will prompt for some keyboard input and use the time intervals between will prompt for keyboard input and use the time intervals between
keystrokes to provide some randomness. keystrokes to provide randomness.
The The
.Fl r .Fl r
option overrides this behaviour, making option overrides this behaviour, making
@@ -259,10 +260,12 @@ The private part of the key is used by
.Xr dnssec-signzone 8 .Xr dnssec-signzone 8
to generate signatures and the public part is used to verify the to generate signatures and the public part is used to verify the
signatures. signatures.
A Both
.Ar .key
and
.Ar .private .Ar .private
key file is generated for a symmetric encryption algorithm such as key files are generated for symmetric encryption algorithm such as
HDMAC-MD5, even though it has no private key. HMAC-MD5, even though the public and private key are equivalent.
.Sh EXAMPLE .Sh EXAMPLE
To generate a 768-bit DSA key for the domain To generate a 768-bit DSA key for the domain
.Dv example.com , .Dv example.com ,

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-makekeyset.8,v 1.3 2000/06/28 23:40:59 jim Exp $ .\" $Id: dnssec-makekeyset.8,v 1.4 2000/07/26 00:47:14 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-MAKEKEYSET 8 .Dt DNSSEC-MAKEKEYSET 8
@@ -30,7 +30,7 @@
.Op Fl e Ar end-time .Op Fl e Ar end-time
.Op Fl t Ar TTL .Op Fl t Ar TTL
.Op Fl r Ar randomdev .Op Fl r Ar randomdev
.Op Fl v level .Op Fl v Ar level
.Ar keyfile .... .Ar keyfile ....
.Sh DESCRIPTION .Sh DESCRIPTION
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
@@ -125,8 +125,7 @@ If no
.Fl t .Fl t
option is provided, option is provided,
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
prints a warning and assumes that a default TTL of prints a warning and uses a default TTL of 3600 seconds.
3600 seconds was required.
.Pp .Pp
The The
.Fl v .Fl v
@@ -139,9 +138,10 @@ increases,
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
generates increasingly detailed reports about what it is doing. generates increasingly detailed reports about what it is doing.
The default level is zero. The default level is zero.
An option of .Pp
The
.Fl h .Fl h
gets option makes
.Nm dnssec-makekeyset .Nm dnssec-makekeyset
to print a short summary of its options and arguments. to print a short summary of its options and arguments.
.Pp .Pp
@@ -178,7 +178,7 @@ will create a file called
.Pa example.com.keyset .Pa example.com.keyset
containing a SIG and KEY record for containing a SIG and KEY record for
.Dv example.com. .Dv example.com.
These records will have a TTL of 1 day: 86400 seconds. These records will have a TTL of 86400 seconds (1 day).
The SIG record becomes valid at noon UTC on July 1st 2000 and expires The SIG record becomes valid at noon UTC on July 1st 2000 and expires
30 days (2592000 seconds) later. 30 days (2592000 seconds) later.
.Pp .Pp

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-signkey.8,v 1.3 2000/06/28 23:41:00 jim Exp $ .\" $Id: dnssec-signkey.8,v 1.4 2000/07/26 00:47:16 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-SIGNKEY 8 .Dt DNSSEC-SIGNKEY 8
@@ -55,31 +55,38 @@ This allows the child's keys to be signed by more than 1 parent zone
key if these exist. key if these exist.
.Pp .Pp
The The
.Fl h
option makes
.Nm dnssec-signkey
print a short summary of its command line options
and arguments.
.Pp
The
.Fl p .Fl p
option instructs option instructs
.Nm dnssec-signkey .Nm dnssec-signkey
to use pseudo-random data when signing the keys which is faster, but to use pseudo-random data when signing the keys. This is faster, but
less secure, than using genuinely random data for signing. less secure, than using genuinely random data for signing.
This option may be useful when there are many child zone keysets to This option may be useful when there are many child zone keysets to
sign of if the entropy source is limited. sign or if the entropy source is limited.
It could also be used for short-lived keys and signatures that don't It could also be used for short-lived keys and signatures that don't
require strengthening against cryptanalysis: for instance when the key require as much protection against cryptanalysis, such as when the key
will be discarded long before it could be compromised. will be discarded long before it could be compromised.
.Pp
An alternate file for obtaining random data can be used with the
.Fl r
option.
.Ar filename
is the name of the file to use.
If no
.Fl r
option is used and the default file for random data
.Pa /dev/random
does not exist,
.Nm dnssec-signkey .Nm dnssec-signkey
will prompt for input from the keyboard. may need random numbers in the process of generating keys.
The time between keystrokes will be measured and used to derive random If the system does not have a
data. .Pa /dev/random
device that can be used for generating random numbers,
.Nm dnssec-signkey
will prompt for keyboard input and use the time intervals between
keystrokes to provide randomness.
The
.Fl r
option overrides this behaviour, making
.Nm dnssec-signkey
use
.Ar randomdev
as a source of random data.
.Pp .Pp
The The
.Fl v .Fl v
@@ -93,13 +100,6 @@ increases,
generates increasingly detailed reports about what it is doing. generates increasingly detailed reports about what it is doing.
The default level is zero. The default level is zero.
.Pp .Pp
An option of
.Fl h
makes
.Nm dnssec-signkey
print a short summary of its command line options
and arguments.
.Pp
When When
.Nm dnssec-signkey .Nm dnssec-signkey
completes successfully, it generates a file called completes successfully, it generates a file called
@@ -129,13 +129,14 @@ sign the
file for file for
.Dv example.com .Dv example.com
created in the example shown in the man page for created in the example shown in the man page for
.Nm dnssec-makekeyset : .Xr dnssec-makekeyset 8 :
.Pp
.Dl # dnssec-signkey example.com.keyset Kcom.+003+51944 .Dl # dnssec-signkey example.com.keyset Kcom.+003+51944
.Pp .Pp
where where
.Dv Kcom.+003+51944 .Dv Kcom.+003+51944
was a key file identifier that was produced when was a key file identifier that was produced when
.Nm dnssec-keygen .Xr dnssec-keygen 8
generated a key for the generated a key for the
.Dv .com .Dv .com
zone. zone.

View File

@@ -14,7 +14,7 @@
.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION .\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.\" $Id: dnssec-signzone.8,v 1.3 2000/06/28 23:41:01 jim Exp $ .\" $Id: dnssec-signzone.8,v 1.4 2000/07/26 00:47:17 bwelling Exp $
.\" .\"
.Dd Jun 30, 2000 .Dd Jun 30, 2000
.Dt DNSSEC-SIGNZONE 8 .Dt DNSSEC-SIGNZONE 8
@@ -46,8 +46,8 @@ files for the zone to be signed should be present in the current
directory, along with the keys that will be used to sign the zone. directory, along with the keys that will be used to sign the zone.
If no If no
.Ar keyfile .Ar keyfile
arguments are supplied, the default behaviour is to use all the zone's arguments are supplied, the default behaviour is to use all of the zone's
keys. keys that are present in the current directory.
Providing specific Providing specific
.Ar keyfile .Ar keyfile
arguments constrains arguments constrains
@@ -182,29 +182,30 @@ determine when fresh SIG records should be generated.
The The
.Fl p .Fl p
option instructs option instructs
.Nm dnssec-signzone .Nm dnssec-signkey
to use pseudo-random data when signing the zone's resource records. to use pseudo-random data when signing the keys. This is faster, but
This is faster but less secure than using genuinely random data for signing. less secure, than using genuinely random data for signing.
This option may be useful when the zone has many resource records to be This option may be useful when there are many child zone keysets to
signed and the entropy source is limited. sign or if the entropy source is limited.
It could also be used for short-lived keys and signatures that don't It could also be used for short-lived keys and signatures that don't
require strengthening against cryptanalysis: for instance when the signatures require as much protection against cryptanalysis, such as when the key
will be discarded long before the signed data could be compromised. will be discarded long before it could be compromised.
.Pp .Pp
An alternate source of random data can be specified with the
.Fl r
option.
.Ar randomdev
is the name of the file to use to obtain random data.
By default
.Pa /dev/random
is used if this device is available.
If it is not provided by the operating system and no
.Fl r
option is used,
.Nm dnssec-signzone .Nm dnssec-signzone
will prompt the user for input from the keyboard and use the time may need random numbers in the process of signing the zone.
between keystrokes to derive some random data. If the system does not have a
.Pa /dev/random
device that can be used for generating random numbers,
.Nm dnssec-signzone
will prompt for keyboard input and use the time intervals between
keystrokes to provide randomness.
The
.Fl r
option overrides this behaviour, making
.Nm dnssec-signzone
use
.Ar randomdev
as a source of random data.
.Pp .Pp
An option of An option of
.Fl h .Fl h