1<!-- 2 - Copyright (C) 2012, 2014 Internet Systems Consortium, Inc. ("ISC") 3 - 4 - Permission to use, copy, modify, and/or distribute this software for any 5 - purpose with or without fee is hereby granted, provided that the above 6 - copyright notice and this permission notice appear in all copies. 7 - 8 - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 9 - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 10 - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 11 - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 12 - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 13 - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 14 - PERFORMANCE OF THIS SOFTWARE. 15--> 16<!-- Id --> 17<html> 18<head> 19<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> 20<title>dnssec-verify</title> 21<meta name="generator" content="DocBook XSL Stylesheets V1.71.1"> 22</head> 23<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en"> 24<a name="man.dnssec-verify"></a><div class="titlepage"></div> 25<div class="refnamediv"> 26<h2>Name</h2> 27<p><span class="application">dnssec-verify</span> — DNSSEC zone verification tool</p> 28</div> 29<div class="refsynopsisdiv"> 30<h2>Synopsis</h2> 31<div class="cmdsynopsis"><p><code class="command">dnssec-verify</code> [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-E <em class="replaceable"><code>engine</code></em></code>] [<code class="option">-I <em class="replaceable"><code>input-format</code></em></code>] [<code class="option">-o <em class="replaceable"><code>origin</code></em></code>] [<code class="option">-v <em class="replaceable"><code>level</code></em></code>] [<code class="option">-V</code>] [<code class="option">-x</code>] [<code class="option">-z</code>] {zonefile}</p></div> 32</div> 33<div class="refsect1" lang="en"> 34<a name="id2543405"></a><h2>DESCRIPTION</h2> 35<p><span><strong class="command">dnssec-verify</strong></span> 36 verifies that a zone is fully signed for each algorithm found 37 in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 38 chains are complete. 39 </p> 40</div> 41<div class="refsect1" lang="en"> 42<a name="id2543417"></a><h2>OPTIONS</h2> 43<div class="variablelist"><dl> 44<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt> 45<dd><p> 46 Specifies the DNS class of the zone. 47 </p></dd> 48<dt><span class="term">-E <em class="replaceable"><code>engine</code></em></span></dt> 49<dd> 50<p> 51 Specifies the cryptographic hardware to use, when applicable. 52 </p> 53<p> 54 When BIND is built with OpenSSL PKCS#11 support, this defaults 55 to the string "pkcs11", which identifies an OpenSSL engine 56 that can drive a cryptographic accelerator or hardware service 57 module. When BIND is built with native PKCS#11 cryptography 58 (--enable-native-pkcs11), it defaults to the path of the PKCS#11 59 provider library specified via "--with-pkcs11". 60 </p> 61</dd> 62<dt><span class="term">-I <em class="replaceable"><code>input-format</code></em></span></dt> 63<dd><p> 64 The format of the input zone file. 65 Possible formats are <span><strong class="command">"text"</strong></span> (default) 66 and <span><strong class="command">"raw"</strong></span>. 67 This option is primarily intended to be used for dynamic 68 signed zones so that the dumped zone file in a non-text 69 format containing updates can be verified independently. 70 The use of this option does not make much sense for 71 non-dynamic zones. 72 </p></dd> 73<dt><span class="term">-o <em class="replaceable"><code>origin</code></em></span></dt> 74<dd><p> 75 The zone origin. If not specified, the name of the zone file 76 is assumed to be the origin. 77 </p></dd> 78<dt><span class="term">-v <em class="replaceable"><code>level</code></em></span></dt> 79<dd><p> 80 Sets the debugging level. 81 </p></dd> 82<dt><span class="term">-V</span></dt> 83<dd><p> 84 Prints version information. 85 </p></dd> 86<dt><span class="term">-x</span></dt> 87<dd><p> 88 Only verify that the DNSKEY RRset is signed with key-signing 89 keys. Without this flag, it is assumed that the DNSKEY RRset 90 will be signed by all active keys. When this flag is set, 91 it will not be an error if the DNSKEY RRset is not signed 92 by zone-signing keys. This corresponds to the <code class="option">-x</code> 93 option in <span><strong class="command">dnssec-signzone</strong></span>. 94 </p></dd> 95<dt><span class="term">-z</span></dt> 96<dd> 97<p> 98 Ignore the KSK flag on the keys when determining whether 99 the zone if correctly signed. Without this flag it is 100 assumed that there will be a non-revoked, self-signed 101 DNSKEY with the KSK flag set for each algorithm and 102 that RRsets other than DNSKEY RRset will be signed with 103 a different DNSKEY without the KSK flag set. 104 </p> 105<p> 106 With this flag set, we only require that for each algorithm, 107 there will be at least one non-revoked, self-signed DNSKEY, 108 regardless of the KSK flag state, and that other RRsets 109 will be signed by a non-revoked key for the same algorithm 110 that includes the self-signed key; the same key may be used 111 for both purposes. This corresponds to the <code class="option">-z</code> 112 option in <span><strong class="command">dnssec-signzone</strong></span>. 113 </p> 114</dd> 115<dt><span class="term">zonefile</span></dt> 116<dd><p> 117 The file containing the zone to be signed. 118 </p></dd> 119</dl></div> 120</div> 121<div class="refsect1" lang="en"> 122<a name="id2543660"></a><h2>SEE ALSO</h2> 123<p> 124 <span class="citerefentry"><span class="refentrytitle">dnssec-signzone</span>(8)</span>, 125 <em class="citetitle">BIND 9 Administrator Reference Manual</em>, 126 <em class="citetitle">RFC 4033</em>. 127 </p> 128</div> 129<div class="refsect1" lang="en"> 130<a name="id2543686"></a><h2>AUTHOR</h2> 131<p><span class="corpauthor">Internet Systems Consortium</span> 132 </p> 133</div> 134</div></body> 135</html> 136