1 .\" $NetBSD: dnssec-zkt.8,v 1.1.1.1 2015/07/08 15:37:49 christos Exp $
3 .TH dnssec-zkt 8 "August 1, 2009" "ZKT 0.99b" ""
4 \" turn off hyphenation
8 dnssec-zkt \(em Secure DNS zone key tool
20 .RI [{ keyfile | dir }
30 .RI [{ keyfile | dir }
34 .BR \-\-create= <label>
40 .RI [{ keyfile | dir }
44 .BR \- { P | A | D | R } <keytag>
50 .RI [{ keyfile | dir }
54 .BR \-\-published= <keytag>
60 .RI [{ keyfile | dir }
64 .BR \-\-active= <keytag>
70 .RI [{ keyfile | dir }
74 .BR \-\-depreciate= <keytag>
80 .RI [{ keyfile | dir }
84 .BR \-\-rename= <keytag>
90 .RI [{ keyfile | dir }
94 .BR \-\-destroy= <keytag>
100 .RI [{ keyfile | dir }
112 .RI [{ keyfile | dir }
116 .B \-\-list-trustedkeys
124 .RI [{ keyfile | dir }
136 .RI [{ keyfile | dir }
148 .RI [{ keyfile | dir }
166 .B \-9 | \-\-ksk-rollover
169 .B \-1 | \-\-ksk-roll-phase1
177 .B \-2 | \-\-ksk-roll-phase2
185 .B \-3 | \-\-ksk-roll-phase3
193 .B \-0 | \-\-ksk-roll-stat
205 command is a wrapper around
207 to assist in dnssec zone key management.
209 In the common usage the command prints out information about
210 all dnssec (zone) keys found in the given (or predefined default) directory.
211 It is also possible to specify keyfiles (K*.key) as arguments.
214 subdirectories will be searched recursively, and all dnssec keys found
215 will be listed sorted by domain name, key type and generation time.
216 In that mode the use of the
218 option may be helpful to find the location of the keyfile in the directory tree.
220 Other forms of the command print out keys in a format suitable for
221 a trusted-key section or as a DNSKEY resource record.
223 The command is also useful in dns key management.
224 It offers monitoring of key lifetime and modification of key status.
228 .BI \-V " view" ", \-\-view=" view
229 Try to read the default configuration out of a file named
230 .I dnssec-<view>.conf .
231 Instead of specifying the \-V or --view option every time,
232 it is also possible to create a hard or softlink to the
233 executable file to give it an additional name like
234 .I dnssec-zkt-<view> .
236 .BI \-c " file" ", \-\-config=" file
237 Read default values from the specified config file.
238 Otherwise the default config file is read or build in defaults
241 .BI \-O " optstr" ", \-\-config-option=" optstr
242 Set any config file option via the commandline.
243 Several config file options could be specified at the argument string
244 but have to be delimited by semicolon (or newline).
247 Print out information solely about domains given in the comma or space separated
249 Take care of, that every domain name has a trailing dot.
251 .BR \-d ", " \-\-directory
252 Skip directory arguments.
253 This will be useful in combination with wildcard arguments
254 to prevent dnsssec-zkt to list all keys found in subdirectories.
255 For example "dnssec-zkt -d *" will print out a list of all keys only found in
256 the current directory.
257 Maybe it is easier to use "dnssec-zkt ." instead (without -r set).
258 The option works similar to the \-d option of
261 .BR \-L ", " \-\-left-justify
262 Print out the domain name left justified.
265 Select and print key signing keys only (default depends on command mode).
268 Select and print zone signing keys only (default depends on command mode).
270 .BR \-r ", " \-\-recursive
271 Recursive mode (default is off).
273 Also settable in the dnssec.conf file (Parameter: Recursive).
275 .BR \-p ", " \-\-path
276 Print pathname in listing mode.
277 In -C mode, don't create the new key in the same directory as (already existing)
278 keys with the same label.
281 Print age of key in weeks, days, hours, minutes and seconds (default is off).
283 Also settable in the dnssec.conf file (Parameter: PrintAge).
285 .BR \-f ", " \-\-lifetime
286 Print the key lifetime.
288 .BR \-F ", " \-\-setlifetime
289 Set the key lifetime of all the selected keys.
290 Use option -k, -z, -l or the file and dir argument for key selection.
292 .BR \-e ", " \-\-exptime
293 Print the key expiration time.
295 .BR \-t ", " \-\-time
296 Print the key generation time (default is on).
298 Also settable in the dnssec.conf file (Parameter: PrintTime).
301 No header or trusted-key section header and trailer in -T mode
306 .BR \-H ", " \-\-help
307 Print out the online help.
309 .BR \-T ", " \-\-list-trustedkeys
310 List all key signing keys as a
315 to supress the section header/trailer.
317 .BR \-K ", " \-\-list-dnskeys
318 List the public part of all the keys in DNSKEY resource record format.
321 to suppress comment lines.
323 .BI \-C " zone" ", \-\-create=" zone
324 Create a new zone signing key for the given zone.
327 to create a key signing key.
328 The key algorithm and key length will be examined from built-in default values
329 or from the parameter settings in the
333 The keyfile will be created in the current directory if
338 .BI \-R " keyid" ", \-\-revoke=" keyid
339 Revoke the key signing key with the given keyid.
340 A revoked key has bit 8 in the flags filed set (see RFC5011).
341 The keyid is the numeric keytag with an optionally added zone name separated by a colon.
343 .BI \-\-rename=" keyid
344 Rename the key files of the key with the given keyid
345 (Look at key file names starting with an lower 'k').
346 The keyid is the numeric keytag with an optionally added zone name separated by a colon.
348 .BI \-\-destroy= keyid
349 Deletes the key with the given keyid.
350 The keyid is the numeric keytag with an optionally added zone name separated by a colon.
351 Beware that this deletes both private and public keyfiles, thus the key is
354 .BI \-P|A|D " keyid," " \-\-published=" keyid, " \-\-active=" keyid, " \-\-depreciated=" keyid
355 Change the status of the given dnssec key to
364 is the numeric keytag with an optionally added zone name separated by a colon.
365 Setting the status to "published" or "depreciate" will change the filename
366 of the private key file to ".published" or ".depreciated" respectivly.
367 This prevents the usage of the key as a signing key by the use of
368 .IR dnssec-signzone(8) .
369 The time of status change will be stored in the 'mtime' field of the corresponding
371 Key activation via option
373 will restore the original timestamp and file name (".private").
375 .BR \-Z ", " \-\-zone-config
376 Write all config parameters to stdout.
377 The output is suitable as a template for the
379 file, so the easiest way to create a
381 file is to redirect the standard output of the above command.
382 Pay attention not to overwrite an existing file.
384 .BI \-\-ksk-roll-phase[123] " do.ma.in."
385 Initiate a key signing key rollover of the specified domain.
386 This feature is currently in experimental status and is mainly for the use
387 in an hierachical environment.
388 Use --ksk-rollover for a little more detailed description.
396 Print out a list of all zone keys found below the current directory.
399 .B "dnssec-zkt \-Z \-c """"
401 Print out the compiled in default parameters.
404 .B "dnssec-zkt \-C example.net \-k \-r ./zonedir
406 Create a new key signing key for the zone "example.net".
407 Store the key in the same directory below "zonedir" where the other
408 "example.net" keys live.
411 .B "dnssec-zkt \-T ./zonedir/example.net
413 Print out a trusted-key section containing the key signing keys of "example.net".
416 .B "dnssec-zkt \-D 123245 \-r .
418 Depreciate the key with tag "12345" below the current directory,
421 .B "dnssec-zkt --view intern
423 Print out a list of all zone keys found below the directory where all
424 the zones of view intern live.
425 There should be a seperate dnssec config file
426 .I dnssec-intern.conf
427 with a directory option to take affect of this.
430 .B "dnssec-zkt-intern
435 has another link, named
439 examines argv[0] to find a view whose zones it proceeds to process.
441 .SH ENVIRONMENT VARIABLES
444 Specifies the name of the default global configuration files.
448 .I /var/named/dnssec.conf
449 Built-in default global configuration file.
450 The name of the default global config file is settable via
451 the environment variable ZKT_CONFFILE.
453 .I /var/named/dnssec-<view>.conf
454 View specific global configuration file.
457 Local configuration file (only used in
463 Some of the general options will not be meaningful in all of the command modes.
467 and the ksk rollover options
468 insist on domain names ending with a dot.
472 Holger Zuleger, Mans Nilsson
475 Copyright (c) 2005 \- 2008 by Holger Zuleger.
476 Licensed under the BSD Licences. There is NO warranty; not even for MERCHANTABILITY or
477 FITNESS FOR A PARTICULAR PURPOSE.
478 .\"--------------------------------------------------
480 dnssec-keygen(8), dnssec-signzone(8), rndc(8), named.conf(5), dnssec-signer(8),
483 "DNSSEC Operational Practices" by Miek Gieben and Olaf Kolkman,
485 DNSSEC HOWTO Tutorial by Olaf Kolkman, RIPE NCC
487 (http://www.nlnetlabs.nl/dnssec_howto/)