Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

getds(1p) [debian man page]

GETDS(1p)						User Contributed Perl Documentation						 GETDS(1p)

NAME
getds - Create a DS record from DNSKEYing information SYNOPSIS
getds <domain> DESCRIPTION
getds will create a DS record from DNSKEYs for the specified DNS domain. It does this by converting DNSKEYs to DS records using the specified hashing algorithm. The results can then be passed to upstream DNSSEC-supporting parents or to DLV registries. getds will also pull the parent's published DS records and compare them against the existing keys. It will then list any DS records not published in the parent, as well as any DS records that are published in the parent but which don't match an existing key. OPTIONS
getds takes the following options: -a ALGORITHMS --hash-algorithm algorithm ALGORITHMS This option specifies the hash algorithm to use when converting DNSKEYs to DS records. It may be a comma-separated list if multiple algorithms are desired. The algorithms to choose from may be either SHA256 or SHA1. The default is SHA256,SHA1 -z --print-zsks This option causes getds to print ZSK DS records, as well as KSK records. -p --dont-check-parent Instructs getds to not check the records in the parent for their published DS records. -q --quiet Produces quiet output with no explanatory headers. In other words, it only prints the DS records generated from the DNSKEYs. Note: Running with -q implies -p. SECURITY CONSIDERATIONS
By default, getds pulls data from the live DNS. If your DNS resolver isn't configured so that this is pulled securely, then the results can't be trusted. COPYRIGHT
Copyright 2008-2012 SPARTA, Inc. All rights reserved. See the COPYING file included with the DNSSEC-Tools package for details. AUTHOR
Wes Hardaker, hardaker AT AT AT users.sourceforge.net perl v5.14.2 2012-06-21 GETDS(1p)

Check Out this Related Man Page

DNSSEC-DSFROMKEY(8)						       BIND9						       DNSSEC-DSFROMKEY(8)

NAME
dnssec-dsfromkey - DNSSEC DS RR generation tool SYNOPSIS
dnssec-dsfromkey [-v level] [-1] [-2] [-a alg] [-l domain] {keyfile} dnssec-dsfromkey {-s} [-1] [-2] [-a alg] [-K directory] [-l domain] [-s] [-c class] [-f file] [-A] [-v level] {dnsname} DESCRIPTION
dnssec-dsfromkey outputs the Delegation Signer (DS) resource record (RR), as defined in RFC 3658 and RFC 4509, for the given key(s). OPTIONS
-1 Use SHA-1 as the digest algorithm (the default is to use both SHA-1 and SHA-256). -2 Use SHA-256 as the digest algorithm. -a algorithm Select the digest algorithm. The value of algorithm must be one of SHA-1 (SHA1) or SHA-256 (SHA256). These values are case insensitive. -K directory Look for key files (or, in keyset mode, keyset- files) in directory. -f file Zone file mode: in place of the keyfile name, the argument is the DNS domain name of a zone master file, which can be read from file. If the zone name is the same as file, then it may be omitted. -A Include ZSK's when generating DS records. Without this option, only keys which have the KSK flag set will be converted to DS records and printed. Useful only in zone file mode. -l domain Generate a DLV set instead of a DS set. The specified domain is appended to the name for each record in the set. The DNSSEC Lookaside Validation (DLV) RR is described in RFC 4431. -s Keyset mode: in place of the keyfile name, the argument is the DNS domain name of a keyset file. -c class Specifies the DNS class (default is IN). Useful only in keyset or zone file mode. -v level Sets the debugging level. EXAMPLE
To build the SHA-256 DS RR from the Kexample.com.+003+26160 keyfile name, the following command would be issued: dnssec-dsfromkey -2 Kexample.com.+003+26160 The command would print something like: example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0 C5EA0B94 FILES
The keyfile can be designed by the key identification Knnnn.+aaa+iiiii or the full file name Knnnn.+aaa+iiiii.key as generated by dnssec-keygen(8). The keyset file name is built from the directory, the string keyset- and the dnsname. CAVEAT
A keyfile error can give a "file not found" even if the file exists. SEE ALSO
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 3658, RFC 4431. RFC 4509. AUTHOR
Internet Systems Consortium COPYRIGHT
Copyright (C) 2008, 2009 Internet Systems Consortium, Inc. ("ISC") BIND9 August 26, 2009 DNSSEC-DSFROMKEY(8)
Man Page