1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208
|
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"
"http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd">
<refentry id='dane'>
<refentryinfo><date>April 12, 2011</date></refentryinfo>
<refmeta>
<refentrytitle>dane</refentrytitle>
<manvolnum>1</manvolnum>
<refmiscinfo class='date'>April 12, 2011</refmiscinfo>
<refmiscinfo class='source'>Paul Wouters</refmiscinfo>
<refmiscinfo class='manual'>Internet / DNS</refmiscinfo>
</refmeta>
<refnamediv id='name'>
<refname>dane</refname>
<refpurpose>Generate TLSA/HASTLS DNS records by scanning SSL/TLS sites</refpurpose>
</refnamediv>
<!-- body begins here -->
<refsect1 id='syntax'><title>SYNTAX</title>
<para>dane [<option>-v</option>] [<option>-q</option>] [<option>-h</option>] [<option>-v</option>]
[<option>--draft</option>|<option>--rfc</option>] [<option>--sha256</option>] [<option>--sha512</option>]
[<option>--full</option>] [<option>--insecure</option>] [<option>--pubkey</option>] [<option>--txt</option>]
[<option>--eecert</option>] [<option>--cacert</option>] [<option>-4</option>] [<option>-6</option>]
[<option>--axfr</option>] [<option>-n</option> <<emphasis remap='I'>nameserver</emphasis>>]
<emphasis remap='I'>host1</emphasis> [<emphasis remap='I'>host2 ...]</emphasis>]
[<emphasis remap='I'>@nameserver]</emphasis>]
<!-- .br -->
</para>
</refsect1>
<refsect1 id='description'><title>DESCRIPTION</title>
<para>dane generates TLSA/HASTLS records based on the IETF DANE working group proposal.
These are currently in draft, so private RRTYPE assignments are used. Records are generated
by connecting to the website using SSL and grabbing its (EE) certificate.
If the nameserver of the domain allows zone tranfers (AXFR), an entire domain can be processed for all its A/AAAA records.</para>
</refsect1>
<refsect1 id='options'><title>OPTIONS</title>
<variablelist remap='TP'>
<varlistentry>
<term><option>-n / --nameserver</option> <<emphasis remap='I'>hostname1</emphasis>></term>
<listitem>
<para>Use specified nameserver for AXFR query</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>-q / --quiet</option></term>
<listitem>
<para>Supress all warnings - useful when scanning lots of host where some do not run SSL</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--axfr</option></term>
<listitem>
<para>Use AXFR. Implies -n nameserver (or @nameserver). Hosts are treated as zones to AXFR.</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--tlsa</option></term>
<listitem>
<para>Output TLSA record from SSL server scan results (default)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--eecert</option></term>
<listitem>
<para>Output TLSA record format EE certificates (type 1) (default)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--pubkey</option></term>
<listitem>
<para>Output TLSA record for just the public key (type unassined) (not implemented yet)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--txt</option></term>
<listitem>
<para>Output Kaminsky style TXT record for (not implemented yet)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--cacert</option></term>
<listitem>
<para>Output TLSA record for the entire CA chain and EE-cert (not yet implemented)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--sha256</option></term>
<listitem>
<para>Output TLSA record reference type 1 (SHA256) records (default)</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--sha512</option></term>
<listitem>
<para>Output TLSA record reference type 2 (SHA512) records</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--full</option></term>
<listitem>
<para>Output TLSA record reference type 0 (full cert) records</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--draft</option></term>
<listitem>
<para>Output Unknown Resource Record format with private RRTYPE assignment. This is used while the standard is
still in draft form, and for when your nameserver does not (yet) support the new RRTYPE names. This option
is the default (if --rfc is not specified) as long as dane is has not be released as RFC.</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--rfc</option></term>
<listitem>
<para>Specify records using the RRTYPE's TLSA (and HASTLA) </para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>--insecure</option></term>
<listitem>
<para>Continue scanning even if the A/AAAA records could not be validated using DNSSEC</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>-4</option></term>
<listitem>
<para>Only use ipv4 networking - do not attempt to connect to AAAA SSL sites</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>-6</option></term>
<listitem>
<para>Only use ipv6 networking - do not attempt to connect to A SSL sites</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>-h / --help</option></term>
<listitem>
<para>Output help information and exit.</para>
</listitem>
</varlistentry>
<varlistentry>
<term><option>-v / --version</option></term>
<listitem>
<para>Output version information and exit.</para>
</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='files'><title>FILES</title>
<para><filename>~/.ssh/known_hosts</filename></para>
</refsect1>
<refsect1 id='requirements'><title>REQUIREMENTS</title>
<para>dane requires python-dns and python-argparse(<ulink url='http://www.pythondns.org'>http://www.pythondns.org</ulink>)</para>
<para>Fedora: yum install python-dns python-argparse</para>
<para>Debian: apt-get install python-dnspython python-argparse</para>
</refsect1>
<refsect1 id='bugs'><title>BUGS</title>
<para>I'm sure there are</para>
</refsect1>
<refsect1 id='examples'><title>EXAMPLES</title>
<para>typical usage:</para>
<para>dane www.xelerance.com</para>
<para>dane --rfc --sha512 www.xelerance.com </para>
<para>dane --insecure --draft xelerance.com @ns0.xelerance.net</para>
</refsect1>
<refsect1 id='see_also'><title>SEE ALSO</title>
<para><citerefentry><refentrytitle>sshfp</refentrytitle><manvolnum>1</manvolnum></citerefentry> <citerefentry><refentrytitle>ssh</refentrytitle><manvolnum>1</manvolnum></citerefentry> and RFC-XXXX</para>
<para><ulink url='http://www.xelerance.com/software/sshfp/'>http://www.xelerance.com/software/sshfp/</ulink></para>
<para><ulink url='http://lists.xelerance.com/mailman/listinfo/sshfp/'>http://lists.xelerance.com/mailman/listinfo/sshfp/</ulink></para>
</refsect1>
<refsect1 id='authors'><title>AUTHORS</title>
<para>Paul Wouters <paul@xelerance.com></para>
</refsect1>
<refsect1 id='copyright'><title>COPYRIGHT</title>
<para>Copyright 2011 Xelerance Corporation</para>
<para>This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your
option) any later version. See <<ulink url='http://www.fsf.org/copyleft/gpl.txt'>http://www.fsf.org/copyleft/gpl.txt</ulink>>.</para>
<para>This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
Public License (file COPYING in the distribution) for more details.</para>
</refsect1>
</refentry>
|