diff --git a/cmd/sign.go b/cmd/sign.go index a299e36..7f303ff 100644 --- a/cmd/sign.go +++ b/cmd/sign.go @@ -27,7 +27,7 @@ func init() { signCmd.PersistentFlags().BoolP("nsec3", "3", false, "Use NSEC3 instead of NSEC.") signCmd.PersistentFlags().BoolP("opt-out", "x", false, "Use NSEC3 with opt-out.") signCmd.PersistentFlags().BoolP("digest", "d", false, "If it is true, DigestEnabled RR is added to the signed zone") - signCmd.PersistentFlags().IntP("hash-digest", "Q", 0, "Hash algorithm for Digest Verification: 1=sha384, 2=sha256") + signCmd.PersistentFlags().IntP("hash-digest", "Q", 2, "Hash algorithm for Digest Verification: 1=sha384, 2=sha256") signCmd.PersistentFlags().BoolP("info", "i", false, "If it is true, an TXT RR is added with information about the signing process (tool and mode)") signCmd.PersistentFlags().BoolP("lazy", "L", false, "If it is true, the zone will be signed only if it is needed (i.e. it is not signed already, it is signed with different key, the signatures are about to expire or the original zone is newer than the signed zone)") diff --git a/cmd/verify.go b/cmd/verify.go index 22b8acb..71f7a3a 100644 --- a/cmd/verify.go +++ b/cmd/verify.go @@ -16,7 +16,7 @@ func init() { verifyCmd.PersistentFlags().StringP("verify-threshold-duration", "t", "", "Number of days it needs to be before a signature expiration to be considered as valid by the verifier. Default is empty") verifyCmd.PersistentFlags().StringP("verify-threshold-date", "T", "", "Exact date it needs to be before a signature expiration to be considered as expired by the verifier. It is ignored if --verify-threshold-duration is set. Default is tomorrow") - verifyCmd.PersistentFlags().IntP("hash-digest", "d", 0, "Hash algorithm for Digest Verification: 1=sha384, 2=sha256") + verifyCmd.PersistentFlags().IntP("hash-digest", "d", 2, "Hash algorithm for Digest Verification: 1=sha384, 2=sha256") }