Hi,
When using 9.7.0a3 with dnssec-signzone and PKCS#11, one can use the genkey.sh as a tool to generate keys. It is however hardcoded to RSASHA1. (We needed NSECRSASHA1) The below tiny patch addresses this. Related, the dnssec-signzone command created a zone with algo 5 DNSKEY's with NSEC3 records, which is a bogus zone that stupid people like me should not be allowed to create :) Paul --- genkey.sh.org 2009-09-21 19:40:17.000000000 -0400 +++ genkey.sh 2009-09-21 19:40:45.000000000 -0400 @@ -1,8 +1,8 @@ #!/bin/bash -usage="Usage: $0 -z zone -x ext -p pin -b bits -e engine [-f] -k key_path" +usage="Usage: $0 -z zone -x ext -p pin -a algonum -b bits -e engine [-f] -k key_path" tmp_file=/tmp/cur_key.$$ -while getopts ":z:x:p:t:k:b:e:f" opt; do +while getopts ":z:x:p:t:k:b:e:a:f" opt; do case $opt in z ) zone=$OPTARG ;; x ) ext=$OPTARG ;; @@ -12,6 +12,7 @@ while getopts ":z:x:p:t:k:b:e:f" opt; do e ) engine=$OPTARG ;; b ) bits=$OPTARG ;; k ) key_path=$OPTARG ;; + a ) algo=$OPTARG ;; \? ) echo $usage exit 1 ;; esac @@ -42,9 +43,9 @@ if [ $? -ne 0 ] ; then exit 1 ; fi echo "Generating DNSKEY RR" if [ "$flag" ] ; then - keytag=`$mypath/keyconv.pl -a 5 -k -e $engine -l $label -p $key_path -i $tmp_file $zone` + keytag=`$mypath/keyconv.pl -a $algo -k -e $engine -l $label -p $key_path -i $tmp_file $zone` else - keytag=`$mypath/keyconv.pl -a 5 -e $engine -l $label -p $key_path -i $tmp_file $zone` + keytag=`$mypath/keyconv.pl -a $algo -e $engine -l $label -p $key_path -i $tmp_file $zone` fi if [ ! $keytag ] ; then rm $tmp_file; exit 1 ; fi _______________________________________________ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users