Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

dane(1) [debian man page]

DANE(1) 							  Internet / DNS							   DANE(1)

dane - Generate TLSA/HASTLS DNS records by scanning SSL/TLS sites SYNTAX
dane [-v] [-q] [-h] [-v] [--draft|--rfc] [--sha256] [--sha512] [--full] [--insecure] [--pubkey] [--txt] [--eecert] [--cacert] [-4] [-6] [--axfr] [-n <nameserver>] host1 [host2 ...]] [@nameserver]] DESCRIPTION
dane generates TLSA/HASTLS records based on the IETF DANE working group proposal. These are currently in draft, so private RRTYPE assignments are used. Records are generated by connecting to the website using SSL and grabbing its (EE) certificate. If the nameserver of the domain allows zone tranfers (AXFR), an entire domain can be processed for all its A/AAAA records. OPTIONS
-n / --nameserver <hostname1> Use specified nameserver for AXFR query -q / --quiet Supress all warnings - useful when scanning lots of host where some do not run SSL --axfr Use AXFR. Implies -n nameserver (or @nameserver). Hosts are treated as zones to AXFR. --tlsa Output TLSA record from SSL server scan results (default) --eecert Output TLSA record format EE certificates (type 1) (default) --pubkey Output TLSA record for just the public key (type unassined) (not implemented yet) --txt Output Kaminsky style TXT record for (not implemented yet) --cacert Output TLSA record for the entire CA chain and EE-cert (not yet implemented) --sha256 Output TLSA record reference type 1 (SHA256) records (default) --sha512 Output TLSA record reference type 2 (SHA512) records --full Output TLSA record reference type 0 (full cert) records --draft Output Unknown Resource Record format with private RRTYPE assignment. This is used while the standard is still in draft form, and for when your nameserver does not (yet) support the new RRTYPE names. This option is the default (if --rfc is not specified) as long as dane is has not be released as RFC. --rfc Specify records using the RRTYPE's TLSA (and HASTLA) --insecure Continue scanning even if the A/AAAA records could not be validated using DNSSEC -4 Only use ipv4 networking - do not attempt to connect to AAAA SSL sites -6 Only use ipv6 networking - do not attempt to connect to A SSL sites -h / --help Output help information and exit. -v / --version Output version information and exit. FILES
~/.ssh/known_hosts REQUIREMENTS
dane requires python-dns and python-argparse( Fedora: yum install python-dns python-argparse Debian: apt-get install python-dnspython python-argparse BUGS
I'm sure there are EXAMPLES
typical usage: dane dane --rfc --sha512 dane --insecure --draft SEE ALSO
sshfp(1) ssh(1) and RFC-XXXX AUTHORS
Paul Wouters <> COPYRIGHT
Copyright 2011 Xelerance Corporation This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. See <>. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License (file COPYING in the distribution) for more details. Paul Wouters April 12, 2011 DANE(1)

Check Out this Related Man Page

Net::DNS::RR::TLSA(3)					User Contributed Perl Documentation				     Net::DNS::RR::TLSA(3)

Net::DNS::RR::TLSA - DNS TLSA resource record SYNOPSIS
use Net::DNS; $rr = new Net::DNS::RR('name TLSA usage selector matchingtype certificate'); DESCRIPTION
The Transport Layer Security Authentication (TLSA) DNS resource record is used to associate a TLS server certificate or public key with the domain name where the record is found, forming a "TLSA certificate association". The semantics of how the TLSA RR is interpreted are described in RFC6698. METHODS
The available methods are those inherited from the base class augmented by the type-specific methods defined in this package. Use of undocumented package features or direct access to internal data structures is discouraged and could result in program termination or other unpredictable behaviour. usage $usage = $rr->usage; $rr->usage( $usage ); 8-bit integer value which specifies the provided association that will be used to match the certificate presented in the TLS handshake. selector $selector = $rr->selector; $rr->selector( $selector ); 8-bit integer value which specifies which part of the TLS certificate presented by the server will be matched against the association data. matchingtype $matchingtype = $rr->matchingtype; $rr->matchingtype( $matchingtype ); 8-bit integer value which specifies how the certificate association is presented. cert $cert = $rr->cert; $rr->cert( $cert ); Hexadecimal representation of the certificate data. certbin $certbin = $rr->certbin; $rr->certbin( $certbin ); Binary representation of the certificate data. COPYRIGHT
Copyright (c)2012 Willem Toorop, NLnet Labs. All rights reserved. This program is free software; you may redistribute it and/or modify it under the same terms as Perl itself. Package template (c)2009,2012 O.M.Kolkman and R.W.Franks. SEE ALSO
perl, Net::DNS, Net::DNS::RR, RFC6698 perl v5.18.2 2014-01-16 Net::DNS::RR::TLSA(3)
Man Page

Featured Tech Videos