- Use SHA-1 as the digest algorithm (the default is to use - both SHA-1 and SHA-256). -
- Use SHA-256 as the digest algorithm. -
algorithm
- Select the digest algorithm. The value of
- algorithm
must be one of SHA-1 (SHA1),
- SHA-256 (SHA256), GOST or SHA-384 (SHA384).
- These values are case insensitive.
-
algorithm
must be one of SHA-1 (SHA1),
+ SHA-256 (SHA256), GOST or SHA-384 (SHA384).
+ These values are case insensitive.
+
- Generate CDS records rather than DS records. This is mutually + Generate CDS records rather than DS records. This is mutually exclusive with generating lookaside records. -
TTL
- Specifies the TTL of the DS records. -
directory
- Look for key files (or, in keyset mode,
- keyset-
files) in
- directory
.
-
keyset-
files) in
+ directory
.
+
file
- Zone file mode: in place of the keyfile name, the argument is
- the DNS domain name of a zone master file, which can be read
- from file
. If the zone name is the same as
- file
, then it may be omitted.
-
file
. If the zone name is the same as
+ file
, then it may be omitted.
+
- If file
is set to "-"
, then
- the zone data is read from the standard input. This makes it
- possible to use the output of the dig
- command as input, as in:
-
file
is set to "-"
, then
+ the zone data is read from the standard input. This makes it
+ possible to use the output of the dig
+ command as input, as in:
+
- dig dnskey example.com | dnssec-dsfromkey -f - example.com
-
dig dnskey example.com | dnssec-dsfromkey -f - example.com
+
@@ -98,35 +98,35 @@
domain
- Generate a DLV set instead of a DS set. The specified
- domain
is appended to the name for each
- record in the set.
- The DNSSEC Lookaside Validation (DLV) RR is described
- in RFC 4431. This is mutually exclusive with generating
+ Generate a DLV set instead of a DS set. The specified
+ domain
is appended to the name for each
+ record in the set.
+ The DNSSEC Lookaside Validation (DLV) RR is described
+ in RFC 4431. This is mutually exclusive with generating
CDS records.
-
- Keyset mode: in place of the keyfile name, the argument is - the DNS domain name of a keyset file. -
class
- Specifies the DNS class (default is IN). Useful only - in keyset or zone file mode. -
level
- Sets the debugging level. -
- Prints usage information. -
- Prints version information. -
dnssec-importkey
[-K
] [directory
-L
] [ttl
-P
] [date/offset
-D
] [date/offset
-h
] [-v
] [level
-V
] {keyfile
}
dnssec-importkey
{-f
} [filename
-K
] [directory
-L
] [ttl
-P
] [date/offset
-D
] [date/offset
-h
] [-v
] [level
-V
] [dnsname
]
dnssec-importkey
[-K
] [directory
-L
] [ttl
-P
] [date/offset
-P sync
] [date/offset
-D
] [date/offset
-D sync
] [date/offset
-h
] [-v
] [level
-V
] {keyfile
}
dnssec-importkey
{-f
} [filename
-K
] [directory
-L
] [ttl
-P
] [date/offset
-P sync
] [date/offset
-D
] [date/offset
-D sync
] [date/offset
-h
] [-v
] [level
-V
] [dnsname
]
filename
- Zone file mode: instead of a public keyfile name, the argument
+ Zone file mode: instead of a public keyfile name, the argument
is the DNS domain name of a zone master file, which can be read
- from file
. If the domain name is the same as
- file
, then it may be omitted.
-
file
. If the domain name is the same as
+ file
, then it may be omitted.
+
- If file
is set to "-"
, then
- the zone data is read from the standard input.
-
file
is set to "-"
, then
+ the zone data is read from the standard input.
+
directory
- Sets the directory in which the key files are to reside. -
ttl
- Sets the default TTL to use for this key when it is converted
- into a DNSKEY RR. If the key is imported into a zone,
- this is the TTL that will be used for it, unless there was
- already a DNSKEY RRset in place, in which case the existing TTL
- would take precedence. Setting the default TTL to
- 0
or none
removes it.
-
0
or none
removes it.
+
Emit usage message and exit.
level
- Sets the debugging level. -
Prints version information. @@ -110,16 +110,26 @@
date/offset
- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. -
date/offset
+ Sets the date on which CDS and CDNSKEY records that match this + key are to be published to the zone. +
date/offset
- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -
date/offset
+ Sets the date on which the CDS and CDNSKEY records that match + this key are to be deleted. +
dnssec-keyfromlabel
{-l label
} [-3
] [-a
] [algorithm
-A
] [date/offset
-c
] [class
-D
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-I
] [date/offset
-i
] [interval
-k
] [-K
] [directory
-L
] [ttl
-n
] [nametype
-P
] [date/offset
-p
] [protocol
-R
] [date/offset
-S
] [key
-t
] [type
-v
] [level
-V
] [-y
] {name}
dnssec-keyfromlabel
{-l label
} [-3
] [-a
] [algorithm
-A
] [date/offset
-c
] [class
-D
] [date/offset
-D sync
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-I
] [date/offset
-i
] [interval
-k
] [-K
] [directory
-L
] [ttl
-n
] [nametype
-P
] [date/offset
-P sync
] [date/offset
-p
] [protocol
-R
] [date/offset
-S
] [key
-t
] [type
-v
] [level
-V
] [-y
] {name}
Selects the cryptographic algorithm. The value of
- algorithm
must be one of RSAMD5, RSASHA1,
+ algorithm
must be one of RSAMD5, RSASHA1,
DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
ECDSAP256SHA256 or ECDSAP384SHA384.
These values are case insensitive.
- If no algorithm is specified, then RSASHA1 will be used by
- default, unless the -3
option is specified,
- in which case NSEC3RSASHA1 will be used instead. (If
- -3
is used and an algorithm is specified,
- that algorithm will be checked for compatibility with NSEC3.)
-
-3
option is specified,
+ in which case NSEC3RSASHA1 will be used instead. (If
+ -3
is used and an algorithm is specified,
+ that algorithm will be checked for compatibility with NSEC3.)
+
- Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement - algorithm, and DSA is recommended. -
+ Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement + algorithm, and DSA is recommended. +- Note 2: DH automatically sets the -k flag. -
+ Note 2: DH automatically sets the -k flag. +Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used and no algorithm is explicitly - set on the command line, NSEC3RSASHA1 will be used by - default. -
engine
- Specifies the cryptographic hardware to use. -
+ Specifies the cryptographic hardware to use. +- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -
+ When BIND is built with OpenSSL PKCS#11 support, this defaults + to the string "pkcs11", which identifies an OpenSSL engine + that can drive a cryptographic accelerator or hardware service + module. When BIND is built with native PKCS#11 cryptography + (--enable-native-pkcs11), it defaults to the path of the PKCS#11 + provider library specified via "--with-pkcs11". +label
- Specifies the label for a key pair in the crypto hardware. -
+ Specifies the label for a key pair in the crypto hardware. +
- When BIND 9 is built with OpenSSL-based
- PKCS#11 support, the label is an arbitrary string that
- identifies a particular key. It may be preceded by an
- optional OpenSSL engine name, followed by a colon, as in
- "pkcs11:keylabel
".
-
keylabel
".
+
- When BIND 9 is built with native PKCS#11
- support, the label is a PKCS#11 URI string in the format
- "pkcs11:keyword
=value
[;keyword
=value
;...]"
- Keywords include "token", which identifies the HSM; "object", which
- identifies the key; and "pin-source", which identifies a file from
- which the HSM's PIN code can be obtained. The label will be
- stored in the on-disk "private" file.
-
keyword
=value
[;keyword
=value
;...]"
+ Keywords include "token", which identifies the HSM; "object", which
+ identifies the key; and "pin-source", which identifies a file from
+ which the HSM's PIN code can be obtained. The label will be
+ stored in the on-disk "private" file.
+
- If the label contains a
- pin-source
field, tools using the generated
- key files will be able to use the HSM for signing and other
- operations without any need for an operator to manually enter
- a PIN. Note: Making the HSM's PIN accessible in this manner
- may reduce the security advantage of using an HSM; be sure
- this is what you want to do before making use of this feature.
-
pin-source
field, tools using the generated
+ key files will be able to use the HSM for signing and other
+ operations without any need for an operator to manually enter
+ a PIN. Note: Making the HSM's PIN accessible in this manner
+ may reduce the security advantage of using an HSM; be sure
+ this is what you want to do before making use of this feature.
+
nametype
- Specifies the owner type of the key. The value of
- nametype
must either be ZONE (for a DNSSEC
- zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with
- a host (KEY)),
- USER (for a key associated with a user(KEY)) or OTHER (DNSKEY).
- These values are case insensitive.
-
nametype
must either be ZONE (for a DNSSEC
+ zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with
+ a host (KEY)),
+ USER (for a key associated with a user(KEY)) or OTHER (DNSKEY).
+ These values are case insensitive.
+
Compatibility mode: generates an old-style key, without
@@ -142,84 +142,84 @@
(publication date, activation date, etc). Keys that include
this data may be incompatible with older versions of BIND; the
-C
option suppresses them.
-
class
- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -
flag
- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -
- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -
- Prints a short summary of the options and arguments to - dnssec-keyfromlabel. -
directory
- Sets the directory in which the key files are to be written. -
- Generate KEY records rather than DNSKEY records. -
ttl
- Sets the default TTL to use for this key when it is converted
- into a DNSKEY RR. If the key is imported into a zone,
- this is the TTL that will be used for it, unless there was
- already a DNSKEY RRset in place, in which case the existing TTL
- would take precedence. Setting the default TTL to
- 0
or none
removes it.
-
0
or none
removes it.
+
protocol
- Sets the protocol value for the key. The protocol - is a number between 0 and 255. The default is 3 (DNSSEC). - Other possible values for this argument are listed in - RFC 2535 and its successors. -
key
- Generate a key as an explicit successor to an existing key. + Generate a key as an explicit successor to an existing key. The name, algorithm, size, and type of the key will be set to match the predecessor. The activation date of the new key will be set to the inactivation date of the existing one. The publication date will be set to the activation date minus the prepublication interval, which defaults to 30 days. -
type
- Indicates the use of the key. type
must be
- one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
- is AUTHCONF. AUTH refers to the ability to authenticate
- data, and CONF the ability to encrypt data.
-
type
must be
+ one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
+ is AUTHCONF. AUTH refers to the ability to authenticate
+ data, and CONF the ability to encrypt data.
+
level
- Sets the debugging level. -
Prints version information.
- Allows DNSSEC key files to be generated even if the key ID + Allows DNSSEC key files to be generated even if the key ID would collide with that of an existing key, in the event of either key being revoked. (This is only safe to use if you - are sure you won't be using RFC 5011 trust anchor maintenance - with either of the keys involved.) -
date/offset
- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -
date/offset
+ Sets the date on which the CDS and CDNSKEY records which match + this key are to be published to the zone. +
date/offset
- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". -
date/offset
- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -
date/offset
- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -
date/offset
- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -
date/offset
+ Sets the date on which the CDS and CDNSKEY records which match + this key are to be deleted. +
interval
@@ -305,13 +315,13 @@
nnnn
is the key name.
-
aaa
is the numeric representation
- of the algorithm.
-
iiiii
is the key identifier (or
- footprint).
-
dnssec-keyfromlabel
creates two files, with names based
diff --git a/bin/dnssec/dnssec-keygen.8 b/bin/dnssec/dnssec-keygen.8
index 8a56cd5d25..55488e99c3 100644
--- a/bin/dnssec/dnssec-keygen.8
+++ b/bin/dnssec/dnssec-keygen.8
@@ -19,12 +19,12 @@
.\" Title: dnssec-keygen
.\" Author:
.\" Generator: DocBook XSL Stylesheets v1.78.1
dnssec-keygen
[-a
] [algorithm
-b
] [keysize
-n
] [nametype
-3
] [-A
] [date/offset
-C
] [-c
] [class
-D
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-g
] [generator
-h
] [-I
] [date/offset
-i
] [interval
-K
] [directory
-L
] [ttl
-k
] [-P
] [date/offset
-p
] [protocol
-q
] [-R
] [date/offset
-r
] [randomdev
-S
] [key
-s
] [strength
-t
] [type
-v
] [level
-V
] [-z
] {name}
dnssec-keygen
[-a
] [algorithm
-b
] [keysize
-n
] [nametype
-3
] [-A
] [date/offset
-C
] [-c
] [class
-D
] [date/offset
-D sync
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-g
] [generator
-h
] [-I
] [date/offset
-i
] [interval
-K
] [directory
-k
] [-L
] [ttl
-P
] [date/offset
-P sync
] [date/offset
-p
] [protocol
-q
] [-R
] [date/offset
-r
] [randomdev
-S
] [key
-s
] [strength
-t
] [type
-V
] [-v
] [level
-z
] {name}
algorithm
- Selects the cryptographic algorithm. For DNSSEC keys, the value
- of algorithm
must be one of RSAMD5, RSASHA1,
+ Selects the cryptographic algorithm. For DNSSEC keys, the value
+ of algorithm
must be one of RSAMD5, RSASHA1,
DSA, NSEC3RSASHA1, NSEC3DSA, RSASHA256, RSASHA512, ECCGOST,
ECDSAP256SHA256 or ECDSAP384SHA384.
For TSIG/TKEY, the value must
- be DH (Diffie Hellman), HMAC-MD5, HMAC-SHA1, HMAC-SHA224,
- HMAC-SHA256, HMAC-SHA384, or HMAC-SHA512. These values are
- case insensitive.
-
- If no algorithm is specified, then RSASHA1 will be used by
- default, unless the -3
option is specified,
- in which case NSEC3RSASHA1 will be used instead. (If
- -3
is used and an algorithm is specified,
- that algorithm will be checked for compatibility with NSEC3.)
-
-3
option is specified,
+ in which case NSEC3RSASHA1 will be used instead. (If
+ -3
is used and an algorithm is specified,
+ that algorithm will be checked for compatibility with NSEC3.)
+
- Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement - algorithm, and DSA is recommended. For TSIG, HMAC-MD5 is + Note 1: that for DNSSEC, RSASHA1 is a mandatory to implement + algorithm, and DSA is recommended. For TSIG, HMAC-MD5 is mandatory. -
+- Note 2: DH, HMAC-MD5, and HMAC-SHA1 through HMAC-SHA512 - automatically set the -T KEY option. -
+ Note 2: DH, HMAC-MD5, and HMAC-SHA1 through HMAC-SHA512 + automatically set the -T KEY option. +keysize
- Specifies the number of bits in the key. The choice of key - size depends on the algorithm used. RSA keys must be - between 512 and 2048 bits. Diffie Hellman keys must be between - 128 and 4096 bits. DSA keys must be between 512 and 1024 - bits and an exact multiple of 64. HMAC keys must be - between 1 and 512 bits. Elliptic curve algorithms don't need - this parameter. -
+ Specifies the number of bits in the key. The choice of key + size depends on the algorithm used. RSA keys must be + between 512 and 2048 bits. Diffie Hellman keys must be between + 128 and 4096 bits. DSA keys must be between 512 and 1024 + bits and an exact multiple of 64. HMAC keys must be + between 1 and 512 bits. Elliptic curve algorithms don't need + this parameter. +
- The key size does not need to be specified if using a default
- algorithm. The default key size is 1024 bits for zone signing
- keys (ZSKs) and 2048 bits for key signing keys (KSKs,
- generated with -f KSK
). However, if an
- algorithm is explicitly specified with the -a
,
- then there is no default key size, and the -b
- must be used.
-
-f KSK
). However, if an
+ algorithm is explicitly specified with the -a
,
+ then there is no default key size, and the -b
+ must be used.
+
nametype
- Specifies the owner type of the key. The value of
- nametype
must either be ZONE (for a DNSSEC
- zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with
- a host (KEY)),
- USER (for a key associated with a user(KEY)) or OTHER (DNSKEY).
- These values are case insensitive. Defaults to ZONE for DNSKEY
+ Specifies the owner type of the key. The value of
+ nametype
must either be ZONE (for a DNSSEC
+ zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with
+ a host (KEY)),
+ USER (for a key associated with a user(KEY)) or OTHER (DNSKEY).
+ These values are case insensitive. Defaults to ZONE for DNSKEY
generation.
-
Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used and no algorithm is explicitly - set on the command line, NSEC3RSASHA1 will be used by - default. Note that RSASHA256, RSASHA512, ECCGOST, + If this option is used and no algorithm is explicitly + set on the command line, NSEC3RSASHA1 will be used by + default. Note that RSASHA256, RSASHA512, ECCGOST, ECDSAP256SHA256 and ECDSAP384SHA384 algorithms are NSEC3-capable. -
Compatibility mode: generates an old-style key, without
@@ -125,142 +125,142 @@
(publication date, activation date, etc). Keys that include
this data may be incompatible with older versions of BIND; the
-C
option suppresses them.
-
class
- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -
engine
- Specifies the cryptographic hardware to use, when applicable. -
+ Specifies the cryptographic hardware to use, when applicable. +- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -
+ When BIND is built with OpenSSL PKCS#11 support, this defaults + to the string "pkcs11", which identifies an OpenSSL engine + that can drive a cryptographic accelerator or hardware service + module. When BIND is built with native PKCS#11 cryptography + (--enable-native-pkcs11), it defaults to the path of the PKCS#11 + provider library specified via "--with-pkcs11". +flag
- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -
- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -
generator
- If generating a Diffie Hellman key, use this generator. - Allowed values are 2 and 5. If no generator - is specified, a known prime from RFC 2539 will be used - if possible; otherwise the default is 2. -
- Prints a short summary of the options and arguments to - dnssec-keygen. -
directory
- Sets the directory in which the key files are to be written. -
- Deprecated in favor of -T KEY. -
ttl
- Sets the default TTL to use for this key when it is converted
- into a DNSKEY RR. If the key is imported into a zone,
- this is the TTL that will be used for it, unless there was
- already a DNSKEY RRset in place, in which case the existing TTL
- would take precedence. If this value is not set and there
- is no existing DNSKEY RRset, the TTL will default to the
- SOA TTL. Setting the default TTL to 0
- or none
is the same as leaving it unset.
-
0
+ or none
is the same as leaving it unset.
+
protocol
- Sets the protocol value for the generated key. The protocol - is a number between 0 and 255. The default is 3 (DNSSEC). - Other possible values for this argument are listed in - RFC 2535 and its successors. -
- Quiet mode: Suppresses unnecessary output, including
- progress indication. Without this option, when
- dnssec-keygen is run interactively
- to generate an RSA or DSA key pair, it will print a string
- of symbols to stderr
indicating the
- progress of the key generation. A '.' indicates that a
- random number has been found which passed an initial
- sieve test; '+' means a number has passed a single
- round of the Miller-Rabin primality test; a space
- means that the number has passed all the tests and is
- a satisfactory key.
-
stderr
indicating the
+ progress of the key generation. A '.' indicates that a
+ random number has been found which passed an initial
+ sieve test; '+' means a number has passed a single
+ round of the Miller-Rabin primality test; a space
+ means that the number has passed all the tests and is
+ a satisfactory key.
+
randomdev
- Specifies the source of randomness. If the operating
- system does not provide a /dev/random
- or equivalent device, the default source of randomness
- is keyboard input. randomdev
- specifies
- the name of a character device or file containing random
- data to be used instead of the default. The special value
- keyboard
indicates that keyboard
- input should be used.
-
/dev/random
+ or equivalent device, the default source of randomness
+ is keyboard input. randomdev
+ specifies
+ the name of a character device or file containing random
+ data to be used instead of the default. The special value
+ keyboard
indicates that keyboard
+ input should be used.
+
key
- Create a new key which is an explicit successor to an - existing key. The name, algorithm, size, and type of the - key will be set to match the existing key. The activation - date of the new key will be set to the inactivation date of - the existing one. The publication date will be set to the - activation date minus the prepublication interval, which - defaults to 30 days. -
strength
- Specifies the strength value of the key. The strength is - a number between 0 and 15, and currently has no defined - purpose in DNSSEC. -
rrtype
- Specifies the resource record type to use for the key.
- rrtype
must be either DNSKEY or KEY. The
- default is DNSKEY when using a DNSSEC algorithm, but it can be
- overridden to KEY for use with SIG(0).
-
rrtype
must be either DNSKEY or KEY. The
+ default is DNSKEY when using a DNSSEC algorithm, but it can be
+ overridden to KEY for use with SIG(0).
+
-
+- Using any TSIG algorithm (HMAC-* or DH) forces this option - to KEY. -
+ Using any TSIG algorithm (HMAC-* or DH) forces this option + to KEY. +type
- Indicates the use of the key. type
must be
- one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
- is AUTHCONF. AUTH refers to the ability to authenticate
- data, and CONF the ability to encrypt data.
-
type
must be
+ one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
+ is AUTHCONF. AUTH refers to the ability to authenticate
+ data, and CONF the ability to encrypt data.
+
level
- Sets the debugging level. -
Prints version information. @@ -283,38 +283,48 @@
date/offset
- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -
date/offset
+ Sets the date on which CDS and CDNSKEY records that match this + key are to be published to the zone. +
date/offset
- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". If set, if and -P is not set, then - the publication date will be set to the activation date - minus the prepublication interval. -
date/offset
- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -
date/offset
- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -
date/offset
- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -
date/offset
+ Sets the date on which the CDS and CDNSKEY records that match this + key are to be deleted. +
interval
@@ -352,14 +362,14 @@
nnnn
is the key name.
-
aaa
is the numeric representation
- of the
- algorithm.
-
iiiii
is the key identifier (or
- footprint).
-
dnssec-keygen
creates two files, with names based
diff --git a/bin/dnssec/dnssec-settime.8 b/bin/dnssec/dnssec-settime.8
index af1cfd9d76..599eca4776 100644
--- a/bin/dnssec/dnssec-settime.8
+++ b/bin/dnssec/dnssec-settime.8
@@ -18,12 +18,12 @@
.\" Title: dnssec-settime
.\" Author:
.\" Generator: DocBook XSL Stylesheets v1.78.1
dnssec-settime
[-f
] [-K
] [directory
-L
] [ttl
-P
] [date/offset
-A
] [date/offset
-R
] [date/offset
-I
] [date/offset
-D
] [date/offset
-h
] [-V
] [-v
] [level
-E
] {keyfile}engine
dnssec-settime
[-f
] [-K
] [directory
-L
] [ttl
-P
] [date/offset
-P sync
] [date/offset
-A
] [date/offset
-R
] [date/offset
-I
] [date/offset
-D sync
] [date/offset
-D sync
] [date/offset
-h
] [-V
] [-v
] [level
-E
] {keyfile}engine
- Force an update of an old-format key with no metadata fields. + Force an update of an old-format key with no metadata fields. Without this option, dnssec-settime will fail when attempting to update a legacy key. With this option, the key will be recreated in the new format, but with the @@ -68,7 +68,7 @@ set to the present time. If no other values are specified, then the key's publication and activation dates will also be set to the present time. -
directory
Sets the directory in which the key files are to reside. @@ -86,12 +86,12 @@
- Emit usage message and exit. -
- Prints version information. -
level
Sets the debugging level. @@ -131,6 +131,11 @@ After that date, the key will be included in the zone but will not be used to sign it.
date/offset
+ Sets the date on which CDS and CDNSKEY records that match this + key are to be published to the zone. +
date/offset
Sets the date on which the key is to be activated. After that @@ -155,6 +160,11 @@ date, the key will no longer be included in the zone. (It may remain in the key repository, however.)
date/offset
+ Sets the date on which the CDS and CDNSKEY records that match this + key are to be deleted. +
predecessor key
Select a key for which the key being modified will be an @@ -200,21 +210,24 @@
- Print times in UNIX epoch format. -
C/P/A/R/I/D/all
C/P/Psync/A/R/I/D/Dsync/all
- Print a specific metadata value or set of metadata values.
+ Print a specific metadata value or set of metadata values.
The -p
option may be followed by one or more
- of the following letters to indicate which value or values to print:
+ of the following letters or strings to indicate which value
+ or values to print:
C
for the creation date,
P
for the publication date,
+ Psync
for the CDS and CDNSKEY publication date,
A
for the activation date,
R
for the revocation date,
- I
for the inactivation date, or
- D
for the deletion date.
+ I
for the inactivation date,
+ D
for the deletion date, and
+ Dsync
for the CDS and CDNSKEY deletion date
To print all of the metadata, use -p all
.
-