Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ldns-keyfetcher(1) [centos man page]

ldns-keyfetcher(1)					      General Commands Manual						ldns-keyfetcher(1)

NAME
ldns-keyfetcher - retrieve the DNSSEC DNSKEYs for a zone SYNOPSIS
ldns-keyfetcher [ OPTIONS ] DOMAIN DESCRIPTION
ldns-keyfetcher is used to retrieve the DNSKEYs of a zone. First it finds all authoritative nameservers of the zone by tracing it from the root down. All authoritative nameservers are then queried (using TCP) for the DNSKEY RRset of the zone apex. If the results are all the same, the key resource record set is printed. OPTIONS
-4 Only use IPv4 -6 Only use IPv6 -h Show a help text and exit -i Insecurer mode; there will only be one query for the DNSKEYS. There will not be crosschecking of all authoritative nameservers. -v verbosity Set the verbosity level. The following levels are available: 0: default, only print the DNSKEY RRset found, or an error on failure. 1: Show the nameservers that are queried 2: Show more info on what is checked 3: Show the intermediate results (authority and dnskey rrsets) 4: Print the answer packets that are returned -r file Use file as the root hints file, should contain A records in presentation format. The default is /etc/named.root. You can get this file from http://www.internic.net/zones/named.root. -s Don't print the keys to stdout, but store them in files. The filenames will be of the format K<file>.+<alg>.+<keytag>.key AUTHOR
Written by Jelte Jansen for NLnet Labs. REPORTING BUGS
Report bugs to <ldns-team@nlnetlabs.nl>. COPYRIGHT
Copyright (C) 2006 NLnet Labs. This is free software. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PUR- POSE. 4 Apr 2006 ldns-keyfetcher(1)

Check Out this Related Man Page

ldns-verifyzone(1)					      General Commands Manual						ldns-verifyzone(1)

NAME
ldns-verify-zone - read a DNSSEC signed zone and verify it. SYNOPSIS
ldns-verify-zone ZONEFILE DESCRIPTION
ldns-verify-zone reads a DNS zone file and verifies it. RRSIG resource records are checked against the DNSKEY set at the zone apex. Each name is checked for an NSEC(3), if appropriate. OPTIONS
-h Show usage and exit -a Apex only, check only the zone apex -e period Signatures may not expire within this period. Default no period is used. -i period Signatures must have been valid at least this long. Default signatures should just be valid now. -k file A file that contains a trusted DNSKEY or DS rr. This option may be given more than once. Alternatively, if -k is not specified, and a default trust anchor (/var/lib/unbound/root.key) exists and contains a valid DNSKEY or DS record, it will be used as the trust anchor. -p [0-100] Only check this percentage of the zone. Which names to check is determined randomly. Defaults to 100. -S Chase signature(s) to a known key. The network may be accessed to validate the zone's DNSKEYs. (implies -k) -t YYYYMMDDhhmmss | [+|-]offset Set the validation time either by an absolute time value or as an offset in seconds from the current time. -v Show the version and exit -V number Set the verbosity level (default 3): 0: Be silent 1: Print result, and any errors 2: Same as 1 for now 3: Print result, any errors, and the names that are being checked 4: Same as 3 for now 5: Print the zone after it has been read, the result, any errors, and the names that are being checked periods are given in ISO 8601 duration format: P[n]Y[n]M[n]DT[n]H[n]M[n]S If no file is given standard input is read. FILES
/var/lib/unbound/root.key The file from which trusted keys are loaded for signature chasing, when no -k option is given. SEE ALSO
unbound-anchor(8) AUTHOR
Written by the ldns team as an example for ldns usage. REPORTING BUGS
Report bugs to <ldns-team@nlnetlabs.nl>. COPYRIGHT
Copyright (C) 2008 NLnet Labs. This is free software. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PUR- POSE. 27 May 2008 ldns-verifyzone(1)
Man Page