Go to main content

man pages section 8: System Administration Commands

Exit Print View

Updated: Wednesday, February 9, 2022

dnssec-verify (8)


dnssec-verify - DNSSEC zone verification tool


dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin]
[-v level] [-V] [-x] [-z] {zonefile}


DNSSEC-VERIFY(8)                     BIND9                    DNSSEC-VERIFY(8)

       dnssec-verify - DNSSEC zone verification tool

       dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin]
                     [-v level] [-V] [-x] [-z] {zonefile}

       dnssec-verify verifies that a zone is fully signed for each algorithm
       found in the DNSKEY RRset for the zone, and that the NSEC / NSEC3
       chains are complete.

       -c class
           Specifies the DNS class of the zone.

       -E engine
           Specifies the cryptographic hardware to use, when applicable.

           When BIND is built with OpenSSL PKCS#11 support, this defaults to
           the string "pkcs11", which identifies an OpenSSL engine that can
           drive a cryptographic accelerator or hardware service module. When
           BIND is built with native PKCS#11 cryptography
           (--enable-native-pkcs11), it defaults to the path of the PKCS#11
           provider library specified via "--with-pkcs11".

       -I input-format
           The format of the input zone file. Possible formats are "text"
           (default) and "raw". This option is primarily intended to be used
           for dynamic signed zones so that the dumped zone file in a non-text
           format containing updates can be verified independently. The use of
           this option does not make much sense for non-dynamic zones.

       -o origin
           The zone origin. If not specified, the name of the zone file is
           assumed to be the origin.

       -v level
           Sets the debugging level.

           Prints version information.

           Only verify that the DNSKEY RRset is signed with key-signing keys.
           Without this flag, it is assumed that the DNSKEY RRset will be
           signed by all active keys. When this flag is set, it will not be an
           error if the DNSKEY RRset is not signed by zone-signing keys. This
           corresponds to the -x option in dnssec-signzone.

           Ignore the KSK flag on the keys when determining whether the zone
           if correctly signed. Without this flag it is assumed that there
           will be a non-revoked, self-signed DNSKEY with the KSK flag set for
           each algorithm and that RRsets other than DNSKEY RRset will be
           signed with a different DNSKEY without the KSK flag set.

           With this flag set, we only require that for each algorithm, there
           will be at least one non-revoked, self-signed DNSKEY, regardless of
           the KSK flag state, and that other RRsets will be signed by a
           non-revoked key for the same algorithm that includes the
           self-signed key; the same key may be used for both purposes. This
           corresponds to the -z option in dnssec-signzone.

           The file containing the zone to be signed.

       See attributes(7) for descriptions of the following attributes:

       |Availability   | network/dns/bind         |
       |Stability      | Pass-through uncommitted |

       dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 4033.

       Internet Systems Consortium, Inc.

       Copyright (C) 2012, 2014-2016, 2018-2021 Internet Systems Consortium,
       Inc. ("ISC")

       Source code for open source software components in Oracle Solaris can
       be found at https://www.oracle.com/downloads/opensource/solaris-source-

       This software was built from source available at
       https://github.com/oracle/solaris-userland.  The original community
       source was downloaded from

       Further information about this software can be found on the open source
       community website at http://www.isc.org/software/bind/.

ISC                               2014-01-15                  DNSSEC-VERIFY(8)