| Skip Navigation Links | |
| Exit Print View | |
![]() | man pages section 1M: System Administration Commands Oracle Solaris 11 Information Library |
- DNSSEC zone signing tool
dnssec-makekeyset [-ahp] [-sstart-time] [-eend-time] [-rrandomdev] [-tttl] [-vlevel]key...
Thednssec-makekeyset utility generates a key set from one or more keyscreated bydnssec-keygen(1M). It creates a file containing aKEY record for eachkey, and self-signs the key set with each zone key. The outputfile is of the formkeyset-nnnn., wherennnn is the zone name.
Verify all generated signatures.
Specify the date and time when the generated SIG records expire. As withstart-time, an absolute time is indicated inYYYYMMDDHHMMSS notation. A time relative to the start time is indicated with +N, which isN seconds from the start time. A time relative to the current time is indicated with now+N. If noend-time is specified, 30 days from the start time is used as a default.
Print a short summary of the options and arguments todnssec-makekeyset().
Use pseudo-random data when signing the zone. This is faster, but less secure, than using real random data. This option may be useful when signing large zones or when the entropy source is limited.
Specify the source of randomness. If the operating system does not provide a/dev/random or equivalent device, the default source of randomness is keyboard input. Therandomdev argument specifies the name of a character device or file containing random data to be used instead of the default. The special valuekeyboard indicates that keyboard input should be used.
Specify the date and time when the generatedSIG records become valid. This can be either an absolute or relative time. An absolute start time is indicated by a number inYYYYMMDDHHMMSS notation; 20000530144500 denotes 14:45:00 UTC on May 30th, 2000. A relative start time is indicated by +N, which is N seconds from the current time. If nostart-time is specified, the current time is used.
Specify the TTL (time to live) of theKEY andSIG records. The default is 3600 seconds.
Set the debugging level.
The following operands are supported:
The list of keys to be included in the keyset file. These keys are expressed in the formKnnnn.+aaa+iiiii as generated bydnssec-keygen.
Example 1 Generates a keyset containing the DSA key forexample.com.
The following command generates a keyset containing the DSA key forexample.comgenerated in thednssec-keygen(1M) manual page.
dnssec-makekeyset -t 86400 -s 20000701120000 -e +2592000 \Kexample.com.+003+26160
In this example,dnssec-makekeyset() creates the filekeyset-example.com. This file contains thespecified key and a self-generated signature.
The DNS administrator forexample.com could sendkeyset-example.com. to the DNS administratorfor.com for signing, if the .com zone is DNSSEC-aware and theadministrators of the two zones have some mechanism for authenticating each other andexchanging the keys and signatures securely.
Seeattributes(5) for descriptions of the following attributes:
|
dnssec-keygen(1M),dnssec-signkey(1M),attributes(5)
RFC 2535
BIND 9 Administrator Reference Manual
Source for BIND9 is available in the SUNWbind9S package.
Copyright © 2011, Oracle and/or its affiliates. All rights reserved.Legal Notices | ![]() ![]() |