dnssec-signkey - DNSSEC key set signing tool
dnssec-signkey [ -a ] [ -c class ] [ -s start-time ] [ -e end-time ]
[ -h ] [ -p ] [ -r randomdev ] [ -v level ] keyset key...
dnssec-signkey signs a keyset. Typically the keyset will be for a child
zone, and will have been generated by dnssec-makekeyset. The child
zone's keyset is signed with the zone keys for its parent zone. The
output file is of the form signedkey-nnnn., where nnnn is the zone
-a Verify all generated signatures.
Specifies the DNS class of the key sets.
Specify the date and time when the generated SIG records become
valid. This can be either an absolute or relative time. An abso-
lute start time is indicated by a number in YYYYMMDDHHMMSS nota-
tion; 20000530144500 denotes 14:45:00 UTC on May 30th, 2000. A
relative start time is indicated by +N, which is N seconds from
the current time. If no start-time is specified, the current
time is used.
Specify the date and time when the generated SIG records expire.
As with start-time, an absolute time is indicated in YYYYMMDDHH-
MMSS notation. A time relative to the start time is indicated
with +N, which is N seconds from the start time. A time realtive
to the current time is indicated with now+N. If no end-time is
specified, 30 days from the start time is used as a default.
-h Prints a short summary of the options and arguments to dnssec-
-p Use pseudo-random data when signing the zone. This is faster,
but less secure, than using real random data. This option may be
useful when signing large zones or when the entropy source is
Specifies the source of randomness. If the operating system does
not provide a /dev/random or equivalent device, the default
source of randomness is keyboard input. randomdev specifies the
name of a character device or file containing random data to be
used instead of the default. The special value keyboard indi-
cates that keyboard input should be used.
Sets the debugging level.
keyset The file containing the child's keyset.
key The keys used to sign the child's keyset.
The DNS administrator for a DNSSEC-aware .com zone would use the fol-
lowing command to sign the keyset file for example.com created by
dnssec-makekeyset with a key generated by dnssec-keygen:
dnssec-signkey keyset-example.com. Kcom.+003+51944
In this example, dnssec-signkey creates the file signedkey-exam-
ple.com., which contains the example.com keys and the signatures by the
dnssec-keygen(8), dnssec-makekeyset(8), dnssec-signzone(8).
Internet Software Consortium
BIND9 June 30, 2000 DNSSEC-SIGNKEY(8)