Go to main content

man pages section 8: System Administration Commands

Exit Print View

Updated: Wednesday, July 27, 2022
 
 

dnssec-importkey (8)

Name

dnssec-importkey - import DNSKEY records from external systems so they can be managed

Synopsis

dnssec-importkey [-K directory] [-L  ttl]  [-P  date/offset]  [-P  sync
date/offset]  [-D  date/offset]  [-D  sync date/offset] [-h] [-v level]
[-V] {keyfile}

dnssec-importkey {-f filename} [-K directory] [-L ttl] [-P date/offset]
[-P  sync  date/offset] [-D date/offset] [-D sync date/offset] [-h] [-v
level] [-V] [dnsname]

Description

DNSSEC-IMPORTKEY(8)                 BIND 9                 DNSSEC-IMPORTKEY(8)



NAME
       dnssec-importkey  - import DNSKEY records from external systems so they
       can be managed

SYNOPSIS
       dnssec-importkey [-K directory] [-L  ttl]  [-P  date/offset]  [-P  sync
       date/offset]  [-D  date/offset]  [-D  sync date/offset] [-h] [-v level]
       [-V] {keyfile}

       dnssec-importkey {-f filename} [-K directory] [-L ttl] [-P date/offset]
       [-P  sync  date/offset] [-D date/offset] [-D sync date/offset] [-h] [-v
       level] [-V] [dnsname]

DESCRIPTION
       dnssec-importkey reads a public DNSKEY record and generates a  pair  of
       .key/.private  files.  The  DNSKEY  record may be read from an existing
       .key file, in which case a corresponding .private file is generated, or
       it may be read from any other file or from the standard input, in which
       case both .key and .private files are generated.

       The newly created .private file does not contain private key data,  and
       cannot  be  used  for signing. However, having a .private file makes it
       possible to set publication (-P) and deletion (-D) times for  the  key,
       which  means the public key can be added to and removed from the DNSKEY
       RRset on schedule even if the true private key is stored offline.

OPTIONS
       -f filename
              This option indicates the zone file mode. Instead  of  a  public
              keyfile name, the argument is the DNS domain name of a zone mas-
              ter file, which can be read from filename. If the domain name is
              the same as filename, then it may be omitted.

              If  filename  is set to "-", then the zone data is read from the
              standard input.

       -K directory
              This option sets the directory in which the  key  files  are  to
              reside.

       -L ttl This  option sets the default TTL to use for this key when it is
              converted into a DNSKEY RR. This is the TTL used when the key is
              imported into a zone, unless there was already a DNSKEY RRset in
              place, in which case the existing TTL takes precedence.  Setting
              the default TTL to 0 or none removes it from the key.

       -h     This option emits a usage message and exits.

       -v level
              This option sets the debugging level.

       -V     This option prints version information.

TIMING OPTIONS
       Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the
       argument begins with a + or -, it is interpreted as an offset from  the
       present  time. For convenience, if such an offset is followed by one of
       the suffixes y, mo, w, d, h, or mi, then  the  offset  is  computed  in
       years  (defined  as  365  24-hour  days,  ignoring  leap years), months
       (defined as 30 24-hour days), weeks, days, hours, or  minutes,  respec-
       tively. Without a suffix, the offset is computed in seconds. To explic-
       itly prevent a date from being set, use none or never.

       -P date/offset
              This option sets the date on which a key is to be  published  to
              the  zone.  After that date, the key is included in the zone but
              is not used to sign it.

       -P sync date/offset
              This option sets the date on which CDS and CDNSKEY records  that
              match this key are to be published to the zone.

       -D date/offset
              This  option  sets  the  date on which the key is to be deleted.
              After that date, the key is no  longer  included  in  the  zone.
              (However, it may remain in the key repository.)

       -D sync date/offset
              This  option  sets the date on which the CDS and CDNSKEY records
              that match this key are to be deleted.

FILES
       A keyfile can be designed by the key identification Knnnn.+aaa+iiiii or
       the full file name Knnnn.+aaa+iiiii.key, as generated by dnssec-keygen.


ATTRIBUTES
       See attributes(7) for descriptions of the following attributes:


       +---------------+--------------------------+
       |ATTRIBUTE TYPE |     ATTRIBUTE VALUE      |
       +---------------+--------------------------+
       |Availability   | network/dns/bind         |
       +---------------+--------------------------+
       |Stability      | Pass-through uncommitted |
       +---------------+--------------------------+

SEE ALSO
       dnssec-keygen(8),  dnssec-signzone(8),  BIND  9 Administrator Reference
       Manual, RFC 5011.

AUTHOR
       Internet Systems Consortium

COPYRIGHT
       2022, Internet Systems Consortium



NOTES
       Source code for open source software components in Oracle  Solaris  can
       be found at https://www.oracle.com/downloads/opensource/solaris-source-
       code-downloads.html.

       This    software    was    built    from    source     available     at
       https://github.com/oracle/solaris-userland.    The  original  community
       source                was                downloaded                from
       http://ftp.isc.org/isc/bind9/9.16.29/bind-9.16.29.tar.xz.

       Further information about this software can be found on the open source
       community website at http://www.isc.org/software/bind/.



9.16.29                           2022-05-10               DNSSEC-IMPORTKEY(8)