table of contents
DNSSEC-SETTIME(8) | BIND9 | DNSSEC-SETTIME(8) |
NAME¶
dnssec-settime - set the key timing metadata for a DNSSEC key
SYNOPSIS¶
dnssec-settime [-f] [-K directory] [-L ttl] [-P date/offset] [-P sync date/offset] [-A date/offset] [-R date/offset] [-I date/offset] [-D date/offset] [-D sync date/offset] [-S key] [-i interval] [-h] [-V] [-v level] [-E engine] [-s] [-g state] [-d state date/offset] [-k state date/offset] [-r state date/offset] [-z state date/offset] {keyfile}
DESCRIPTION¶
dnssec-settime reads a DNSSEC private key file and sets the key timing metadata as specified by the -P, -A, -R, -I, and -D options. The metadata can then be used by dnssec-signzone or other signing software to determine when a key is to be published, whether it should be used for signing a zone, etc.
If none of these options is set on the command line, then dnssec-settime simply prints the key timing metadata already stored in the key.
When key metadata fields are changed, both files of a key pair (Knnnn.+aaa+iiiii.key and Knnnn.+aaa+iiiii.private) are regenerated.
Metadata fields are stored in the private file. A human-readable description of the metadata is also placed in comments in the key file. The private file's permissions are always set to be inaccessible to anyone other than the owner (mode 0600).
When working with state files, it is possible to update the timing metadata in those files as well with -s. If this option is used you can also update key states with -d (DS), -k (DNSKEY), -r (RRSIG of KSK), or -z (RRSIG of ZSK). Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and UNRETENTIVE.
You can also set the goal state of the key with -g. This should be either HIDDEN or OMNIPRESENT (representing whether the key should be removed from the zone, or published).
It is NOT RECOMMENDED to manipulate state files manually except for testing purposes.
OPTIONS¶
-f
-K directory
-L ttl
-h
-V
-v level
-E engine
When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module. When BIND is built with native PKCS#11 cryptography (--enable-native-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "--with-pkcs11".
TIMING OPTIONS¶
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as an offset from the present time. For convenience, if such an offset is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the offset is computed in years (defined as 365 24-hour days, ignoring leap years), months (defined as 30 24-hour days), weeks, days, hours, or minutes, respectively. Without a suffix, the offset is computed in seconds. To unset a date, use 'none' or 'never'.
-P date/offset
-P sync date/offset
-A date/offset
-R date/offset
-I date/offset
-D date/offset
-D sync date/offset
-S predecessor key
-i interval
If the key is being set to be an explicit successor to another key, then the default prepublication interval is 30 days; otherwise it is zero.
As with date offsets, if the argument is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the interval is measured in years, months, weeks, days, hours, or minutes, respectively. Without a suffix, the interval is measured in seconds.
KEY STATE OPTIONS¶
Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. These should not be set manually except for testing purposes.
-s
-g
-d
-k
-r
-z
PRINTING OPTIONS¶
dnssec-settime can also be used to print the timing metadata associated with a key.
-u
-p C/P/Psync/A/R/I/D/Dsync/all
SEE ALSO¶
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 5011.
AUTHOR¶
Internet Systems Consortium, Inc.
COPYRIGHT¶
Copyright © 2009-2011, 2014-2020 Internet Systems Consortium, Inc. ("ISC")
2015-08-21 | ISC |