| DNSSEC-KSR(1) | BIND 9 | DNSSEC-KSR(1) |
dnssec-ksr - create signed key response (SKR) files for offline KSK setups
dnssec-ksr [-E engine] [-e date/offset] [-F] [-f file] [-h] [-i date/offset] [-K directory] [-k policy] [-l file] [-o] [-V] [-v level] {command} {zone}
The dnssec-ksr can be used to issue several commands that are needed to generate presigned RRsets for a zone where the private key file of the Key Signing Key (KSK) is typically offline. This requires Zone Signing Keys (ZSKs) to be pregenerated, and the DNSKEY, CDNSKEY, and CDS RRsets to be already signed in advance.
The latter is done by creating Key Signing Requests (KSRs) that can be imported to the environment where the KSK is available. Once there, this program can create Signed Key Responses (SKRs) that can be loaded by an authoritative DNS server.
When BIND 9 is built with OpenSSL, this needs to be set to the OpenSSL engine identifier that drives the cryptographic accelerator or hardware service module (usually pkcs11).
command
zone
The dnssec-ksr command exits 0 on success, or non-zero if an error occurred.
When you need to generate ZSKs for the zone "example.com" for the next year, given a dnssec-policy named "mypolicy":
dnssec-ksr -i now -e +1y -k mypolicy -l named.conf keygen example.com
Creating a KSR for the same zone and period can be done with:
dnssec-ksr -i now -e +1y -k mypolicy -l named.conf request example.com > ksr.txt
Typically you would now transfer the KSR to the system that has access to the KSK.
Signing the KSR created above can be done with:
dnssec-ksr -i now -e +1y -k kskpolicy -l named.conf -f ksr.txt sign example.com
Make sure that the DNSSEC parameters in kskpolicy match those in mypolicy.
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual.
Internet Systems Consortium
2025, Internet Systems Consortium
| 2025-10-18 | 9.20.15-1~deb13u1-Debian |