home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
SGI Freeware 1998 June
/
SGI Freeware 1998 June.iso
/
dist
/
fw_bind.idb
/
usr
/
freeware
/
catman
/
u_man
/
cat1
/
dnskeygen.1.z
/
dnskeygen.1
Wrap
Text File
|
1998-05-26
|
6KB
|
106 lines
DNSKEYGEN(1) BSD Reference Manual DNSKEYGEN(1)
NNAAMMEE
ddnnsskkeeyyggeenn - generate and display public and private RSA keys for
SSYYNNOOPPSSIISS
ddnnsskkeeyyggeenn [--gg[_s_i_z_e][--ff]] [--zz| --ee | --uu] [--ii] [--mm] [--pp_#] [--ss_#] [--xx] _n_a_m_e
DDEESSCCRRIIPPTTIIOONN
DDnnsskkeeyyggeenn (DNS Key Generator) is a tool to generate and maintain RSA keys
for DNS (Domain Name System).
--gg[_s_i_z_e] DDnnsskkeeyyggeenn will generate a new key when the ``--gg'' flag is
specified. If the ``--gg'' flag is not specified, then it will
attempt to display an existing key that is stored in the cur-
rent directory. If no _s_i_z_e is specified after the ``--gg''
flag, a key of 512 bits will be generated; otherwise, _s_i_z_e is
the size of the modulus in the newly-generated key.
--ff flag can only be specified with the ``--gg'' flag; this changes
the exponent used on the key. If ``--ff'' is specified, the
exponent is 65537, which is suitable for encryption keys. If
``--ff'' is not specified, the exponent is 3, which is suitable
for signatures and verification of public data such as DNS
records. Signing and verifying with exponent of 65537 takes
significantly more CPU time than with exponent of 3.
--zz --ee --uu These flags define the type of key being generated: Zone (DNS
validation) key, End Entity (host or service) key or User
(e.g. email) key, respectively. Each key is only allowed to
be one of these. When keys are displayed, the type of key
can be changed.
--ii Indicates that the key can be used for IPSEC (Internet Proto-
col Security services).
--mm Indicates that the key can be used for secure email.
--pp_# Indicates that the key can be used for protocol number _#. A
value of _0 denies the use of the key for _a_n_y protocol (other
than those specified by other option flags like --mm). A value
of _2_5_5 allows it to be used with _a_l_l protocols. These proto-
col numbers will be assigned in the latest Assigned Numbers
RFC from the Internet Assigned Numbers Authority (IANA).
--ss_# Strength value; this value is only used when key is signing.
Interpretation of this field is to be specified later. De-
fault value is 7.
--xx Experimental key. This indicates that software should not
assume that it should use secure protocols when talking to
this zone, host, or user. Instead, the key is being pub-
lished experimentally, to debug the software to be used to
run the secure protocols, for example. Data signed by Exper-
imental keys will not be treated as trusted by DNS servers.
_n_a_m_e The DNS name the key is for. This can be any valid DNS name.
DDEETTAAIILLSS
DDnnsskkeeyyggeenn uses two files for each key: _<_n_a_m_e_>_._p_r_i_v and _<_n_a_m_e_>_._p_u_b_l_i_c.
File _<_n_a_m_e_>_._p_u_b_l_i_c contains the public key in the pubkey format:
_<_f_l_a_g_s_> _<_a_l_g_o_r_i_t_h_m_> _<_p_r_o_t_o_c_o_l_> _<_e_x_p_o_n_e_n_t_|_m_o_d_u_l_u_s_>
DDnnsskkeeyyggeenn _n_a_m_e displays the public key in both DNS RR format and pubkey
format. DDnnsskkeeyyggeenn can display the key with different flags on subsequent
runs. The contents of the public key file will not be changed.
_<_n_a_m_e_>_._p_r_i_v stores the private key, in either a password-protected format
file or in a open file. The advantage of a password-protected file is
that it is harder to use the key if the file is stolen. The disadvantage
is that the password has to be given each time the key is read. If the
key is to be stored in a safe off-line place, and only used for signing
zones, then local policy may allow storing the key in an unencrypted for-
mat.
EENNVVIIRROONNMMEENNTT
No environmental variables are used.
SSEEEE AALLSSOO
RSAREF documentation, _R_F_C _2_0_6_5 on secure DNS.
AAUUTTHHOORR
Olafur Gudmundsson (ogud@tis.com).
AACCKKNNOOWWLLEEDDGGMMEENNTTSS
The underlying cryptographic math is done by the RSAREF or BSAFE li-
braries.
BBUUGGSS
DDnnsskkeeyyggeenn renames old keys in such a way that only one ``previous'' key
for a given name is kept; older keys are overwritten. (For example, the
third time a key is generated for a given name, the second key is kept as
the ``previous'' key, while the first key is lost. If a key is generated
_a_g_a_i_n for this name--i.e., if the fourth key is generated--then the third
key will become the ``previous'' key and the second key will be lost.)
DDnnsskkeeyyggeenn will not overwrite existing keys. Only one key for each name
can be stored in the current directory. If you want to keep your old
keys, rename the files before running ddnnsskkeeyyggeenn. Otherwise you must
delete them before running ddnnsskkeeyyggeenn.
Portability of Private key file must be better tested between different
implementations of RSA.
4th Berkeley Distribution October 25, 1996 2