- stretch 1:9.10.3.dfsg.P4-12.3+deb9u4
- testing 1:9.11.5.P4+dfsg-5
- stretch-backports 1:9.11.5.P4+dfsg-5~bpo9+1
- unstable 1:9.11.5.P4+dfsg-5.1
- experimental 1:9.13.3-1
DNSSEC-VERIFY(8) | BIND9 | DNSSEC-VERIFY(8) |
NAME¶
dnssec-verify - DNSSEC zone verification toolSYNOPSIS¶
dnssec-verify [-c class] [-E engine] [-I input-format] [-o origin] [-v level] [-V] [-x] [-z] {zonefile}
DESCRIPTION¶
dnssec-verify verifies that a zone is fully signed for each algorithm found in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 chains are complete.OPTIONS¶
-c class-E engine
When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module. When BIND is built with native PKCS#11 cryptography (--enable-native-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "--with-pkcs11".
-I input-format
-o origin
-v level
-V
-x
-z
With this flag set, we only require that for each algorithm, there will be at least one non-revoked, self-signed DNSKEY, regardless of the KSK flag state, and that other RRsets will be signed by a non-revoked key for the same algorithm that includes the self-signed key; the same key may be used for both purposes. This corresponds to the -z option in dnssec-signzone.
zonefile
SEE ALSO¶
dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 4033.AUTHOR¶
Internet Systems ConsortiumCOPYRIGHT¶
Copyright © 2012, 2014 Internet Systems Consortium, Inc. ("ISC")January 15, 2014 | BIND9 |