ldns-dane (1) - Linux Manuals
ldns-dane: verify or create TLS authentication with DANE (RFC6698)
NAME
ldns-dane - verify or create TLS authentication with DANE (RFC6698)SYNOPSIS
ldns-dane [OPTIONS] verify name portldns-dane [OPTIONS] -t tlsafile verify
ldns-dane [OPTIONS] name port create
ldns-dane
-h
ldns-dane
-v
In the first form:
A TLS connection to name:port is established.
The TLSA resource record(s) for name are used to authenticate
the connection.
In the second form:
The TLSA record(s) are read from tlsafile and used to authenticate
the TLS service they reference.
In the third form:
A TLS connection to name:port is established and used to
create the TLSA resource record(s) that would authenticate the connection.
The parameters for TLSA rr creation are:
Certificate-usage:
Selector:
Matching-type:
In stead of numbers the first few letters of the value may be used.
Except for the hash algorithm name, where the full name must be specified.
This option may be given more than once.
This option may be given more than once.
Alternatively, if -k is not specified, and a default trust anchor
(/var/lib/unbound/root.key) exists and contains a valid DNSKEY or DS record,
it will be used as the trust anchor.
When offset is -1 (the default), the last certificate
is used (like with 0) that MUST be self-signed. This can help to make
sure that the intended (self signed) trust anchor is actually present
in the server certificate chain (which is a DANE requirement).
For "CA Constraint" this means that verification should end with a
self-signed certificate.
Without this option, the local network is trusted to provide
a DNSSEC resolver (i.e. AD bit is checked).
DESCRIPTION
OPTIONS
FILES
AUTHOR
Written by the ldns team as an example for ldns usage.
REPORTING BUGS
Report bugs to ldns-team [at] nlnetlabs.nl.
COPYRIGHT
Copyright (C) 2012 NLnet Labs. This is free software. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE.