- Default: ecdsa256
.. versionchanged:: 4.1.0
- Renamed from ``default-ksk-algorithms``. Does no longer support multiple algorithm names.
+ Renamed from ``default-ksk-algorithms``. No longer supports multiple algorithm names.
The algorithm that should be used for the KSK when running
-:doc:`pdnsutil secure-zone <manpages/pdnsutil.1>`. Must be one
-of:
-
-* rsamd5
-* dh
-* dsa
-* ecc
-* rsasha1
-* rsasha256
+:doc:`pdnsutil secure-zone <manpages/pdnsutil.1>` or using the :doc:`Zone API endpoint <http-api/endpoint-zones>`
+to enable DNSSEC. Must be one of:
+
+* rsamd5
+* dh
+* dsa
+* ecc
+* rsasha1
+* rsasha256
* rsasha512
-* ecc-gost
-* ecdsa256 (ECDSA P-256 with SHA256)
-* ecdsa384 (ECDSA P-384 with SHA384)
+* ecc-gost
+* ecdsa256 (ECDSA P-256 with SHA256)
+* ecdsa384 (ECDSA P-384 with SHA384)
* ed25519
+.. note::
+ Actual supported algorithms depend on the crypto-libraries
+ PowerDNS was compiled against. To check the supported DNSSEC algoritms
+ in your build of PowerDNS, run ``pdnsutil list-algorithms``.
+
.. _setting-default-ksk-size:
``default-ksk-size``
- Default: whichever is default for `default-ksk-algorithm`_
The default keysize for the KSK generated with :doc:`pdnsutil secure-zone <dnssec/pdnsutil>`.
-Only relevant for algorithms with non-fixed keysizes (like RSA)
+Only relevant for algorithms with non-fixed keysizes (like RSA).
.. _setting-default-soa-name:
Renamed from ``default-zsk-algorithms``. Does no longer support multiple algorithm names.
The algorithm that should be used for the ZSK when running
-:doc:`pdnsutil secure-zone <manpages/pdnsutil.1>`. Must be one
-of:
-
-* rsamd5
-* dh
-* dsa
-* ecc
-* rsasha1
-* rsasha256
+:doc:`pdnsutil secure-zone <manpages/pdnsutil.1>` or using the :doc:`Zone API endpoint <http-api/endpoint-zones>`
+to enable DNSSEC. Must be one of:
+
+* rsamd5
+* dh
+* dsa
+* ecc
+* rsasha1
+* rsasha256
* rsasha512
-* ecc-gost
-* ecdsa256 (ECDSA P-256 with SHA256)
-* ecdsa384 (ECDSA P-384 with SHA384)
+* ecc-gost
+* ecdsa256 (ECDSA P-256 with SHA256)
+* ecdsa384 (ECDSA P-384 with SHA384)
* ed25519
+.. note::
+ Actual supported algorithms depend on the crypto-libraries
+ PowerDNS was compiled against. To check the supported DNSSEC algoritms
+ in your build of PowerDNS, run ``pdnsutil list-algorithms``.
+
.. _setting-default-zsk-size:
``default-zsk-size``
- Default: 0 (automatic default for `default-zsk-algorithm`_)
The default keysize for the ZSK generated with :doc:`pdnsutil secure-zone <dnssec/pdnsutil>`.
-Only relevant for algorithms with non-fixed keysizes (like RSA)
+Only relevant for algorithms with non-fixed keysizes (like RSA).
.. _setting-direct-dnskey:
::arg().setSwitch("traceback-handler","Enable the traceback handler (Linux only)")="yes";
::arg().setSwitch("direct-dnskey","Fetch DNSKEY RRs from backend during DNSKEY synthesis")="no";
- ::arg().set("default-ksk-algorithm","Default KSK algorithms")="ecdsa256";
+ ::arg().set("default-ksk-algorithm","Default KSK algorithm")="ecdsa256";
::arg().set("default-ksk-size","Default KSK size (0 means default)")="0";
- ::arg().set("default-zsk-algorithm","Default ZSK algorithms")="";
+ ::arg().set("default-zsk-algorithm","Default ZSK algorithm")="";
::arg().set("default-zsk-size","Default ZSK size (0 means default)")="0";
::arg().set("max-nsec3-iterations","Limit the number of NSEC3 hash iterations")="500"; // RFC5155 10.3
if (algo == -1)
L<<Logger::Warning<<"Warning: default-"<<algotype<<"-algorithm set to unknown algorithm: "<<::arg()["default-"+algotype+"-algorithm"]<<endl;
else if (algo <= 10 && size == 0)
- L<<Logger::Warning<<"Warning: default-"<<algotype<<"-algorithm is set to an algorithm("<<::arg()["default-"+algotype+"-algorithm"]<<") that requires a non-zero default-"<<algotype<<"-size!"<<endl;
+ L<<Logger::Warning<<"Warning: default-"<<algotype<<"-algorithm is set to an algorithm ("<<::arg()["default-"+algotype+"-algorithm"]<<") that requires a non-zero default-"<<algotype<<"-size!"<<endl;
}
// NOW SAFE TO CREATE THREADS!
string configname=::arg()["config-dir"]+"/"+s_programname+".conf";
cleanSlashes(configname);
- ::arg().set("default-ksk-algorithm","Default KSK algorithms")="ecdsa256";
+ ::arg().set("default-ksk-algorithm","Default KSK algorithm")="ecdsa256";
::arg().set("default-ksk-size","Default KSK size (0 means default)")="0";
- ::arg().set("default-zsk-algorithm","Default ZSK algorithms")="";
+ ::arg().set("default-zsk-algorithm","Default ZSK algorithm")="";
::arg().set("default-zsk-size","Default ZSK size (0 means default)")="0";
::arg().set("default-soa-edit","Default SOA-EDIT value")="";
::arg().set("default-soa-edit-signed","Default SOA-EDIT value for signed zones")="";