Add code that can create a Key Signing Request (KSR) given a DNSSEC policy, a set of keys and an interval. Multiple keys that match the bundle and kasp parameters are sorted by keytag, mainly for testing purposes.
145 lines
4.0 KiB
ReStructuredText
145 lines
4.0 KiB
ReStructuredText
.. Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
..
|
|
.. SPDX-License-Identifier: MPL-2.0
|
|
..
|
|
.. This Source Code Form is subject to the terms of the Mozilla Public
|
|
.. License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
.. file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
..
|
|
.. See the COPYRIGHT file distributed with this work for additional
|
|
.. information regarding copyright ownership.
|
|
|
|
.. highlight: console
|
|
|
|
.. iscman:: dnssec-ksr
|
|
.. program:: dnssec-ksr
|
|
.. _man_dnssec-ksr:
|
|
|
|
dnssec-ksr - Create signed key response (SKR) files for offline KSK setups
|
|
--------------------------------------------------------------------------
|
|
|
|
Synopsis
|
|
~~~~~~~~
|
|
|
|
:program:`dnssec-ksr` [**-E** engine] [**-e** date/offset] [**-F**] [**-h**] [**-i** date/offset] [**-K** directory] [**-k** policy] [**-l** file] [**-V**] [**-v** level] {command} {zone}
|
|
|
|
Description
|
|
~~~~~~~~~~~
|
|
|
|
The :program:`dnssec-ksr` can be used to issue several commands that are needed
|
|
to generate presigned RRsets for a zone where the private key file of the Key
|
|
Signing Key (KSK) is typically offline. This requires Zone Signing Keys
|
|
(ZSKs) to be pregenerated, and the DNSKEY, CDNSKEY, and CDS RRsets to be
|
|
already signed in advance.
|
|
|
|
The latter is done by creating Key Signing Requests (KSRs) that can be imported
|
|
to the environment where the KSK is available. Once there, this program can
|
|
create Signed Key Responses (SKRs) that can be loaded by an authoritative DNS
|
|
server.
|
|
|
|
Options
|
|
~~~~~~~
|
|
|
|
.. option:: -E engine
|
|
|
|
This option specifies the cryptographic hardware to use, when applicable.
|
|
|
|
When BIND 9 is built with OpenSSL, this needs to be set to the OpenSSL
|
|
engine identifier that drives the cryptographic accelerator or
|
|
hardware service module (usually ``pkcs11``).
|
|
|
|
.. option:: -e date/offset
|
|
|
|
This option sets the end date for which keys or SKRs need to be generated
|
|
(depending on the command).
|
|
|
|
.. option:: -F
|
|
|
|
This options turns on FIPS (US Federal Information Processing Standards)
|
|
mode if the underlying crytographic library supports running in FIPS
|
|
mode.
|
|
|
|
.. option:: -h
|
|
|
|
This option prints a short summary of the options and arguments to
|
|
:program:`dnssec-ksr`.
|
|
|
|
.. option:: -i date/offset
|
|
|
|
This option sets the start date for which keys or SKRs need to be generated
|
|
(depending on the command).
|
|
|
|
.. option:: -K directory
|
|
|
|
This option sets the directory in which the key files are to be read or
|
|
written (depending on the command).
|
|
|
|
.. option:: -k policy
|
|
|
|
This option sets the specific ``dnssec-policy`` for which keys need to
|
|
be generated, or signed.
|
|
|
|
.. option:: -l file
|
|
|
|
This option provides a configuration file that contains a ``dnssec-policy``
|
|
statement (matching the policy set with :option:`-k`).
|
|
|
|
.. option:: -V
|
|
|
|
This option prints version information.
|
|
|
|
.. option:: -v level
|
|
|
|
This option sets the debugging level. Level 1 is intended to be usefully
|
|
verbose for general users; higher levels are intended for developers.
|
|
|
|
``command``
|
|
|
|
The KSR command to be executed. See below for the available commands.
|
|
|
|
``zone``
|
|
|
|
The name of the zone for which the KSR command is being executed.
|
|
|
|
Commands
|
|
~~~~~~~~
|
|
|
|
.. option:: keygen
|
|
|
|
Pregenerate a number of zone signing keys (ZSKs), given a DNSSEC policy and
|
|
an interval. The number of generated keys depends on the interval and the
|
|
ZSK lifetime.
|
|
|
|
.. option:: request
|
|
|
|
Create a Key Signing Request (KSR), given a DNSSEC policy and an interval.
|
|
|
|
Exit Status
|
|
~~~~~~~~~~~
|
|
|
|
The :program:`dnssec-ksr` command exits 0 on success, or non-zero if an error
|
|
occurred.
|
|
|
|
Examples
|
|
~~~~~~~~
|
|
|
|
When you need to generate keys for the zone "example.com" for the next year,
|
|
given a ``dnssec-policy`` named "mypolicy":
|
|
|
|
::
|
|
|
|
dnssec-ksr -i now -e +1y -k mypolicy -l named.conf keygen example.com
|
|
|
|
Creating a Key Signing Request for the same zone and period can be done with:
|
|
|
|
::
|
|
|
|
dnssec-ksr -i now -e +1y -k mypolicy -l named.conf request example.com
|
|
|
|
See Also
|
|
~~~~~~~~
|
|
|
|
:iscman:`dnssec-keygen(8) <dnssec-keygen>`,
|
|
:iscman:`dnssec-signzone(8) <dnssec-signzone>`,
|
|
BIND 9 Administrator Reference Manual.
|