Explorar el Código

Add details to creating security key to quickstart guide.

(Logical change 1.52)


git-svn-id: http://svn.fedorahosted.org/svn/corosync/trunk@164 fd59a12c-fef9-0310-b244-a6a79926bd2f
Steven Dake hace 21 años
padre
commit
075a81b820
Se han modificado 1 ficheros con 43 adiciones y 7 borrados
  1. 43 7
      QUICKSTART

+ 43 - 7
QUICKSTART

@@ -1,5 +1,15 @@
 Application Interface Specification Quckstart Guide
 ---------------------------------------------------
+
+***
+All cryptographic software in this package is subject to the following legal
+notice:
+This package includes publicly available encryption source code which,
+together with object code resulting from the compiling of publicly
+available source code, may be exported from the United States under License
+Exception TSU prsuant to 15 C.F.R Section 740.13(e).
+***
+
 This AIS package is broken into four parts.  The exec directory contains
 all of the code responsible for serving the APIs.  The api directory contains
 APIs the user can link to.  The test directory contains some simple test
@@ -42,7 +52,8 @@ These two files should be placed in the /etc/ais directory.
 Building AIS
 ------------
 AIS requires GCC, LD, and a Linux 2.4 kernel.  AIS has been tested on
-Debian Sarge, MontaVista Carrier Grade Edition 3.1, and Redhat 9.
+Debian Sarge, MontaVista Carrier Grade Edition 3.1, and Redhat 9, and Fedora
+Core 2.
 
 Compile AIS by running make in the root directory.  Make can also be run
 in the individual directories.  Nothing is installed by make.  If install
@@ -85,12 +96,37 @@ unix# /sbin/route add default gw 192.168.1.1
 where 192.168.1.1 is the gateway.  It is possible to specify an invalid 
 route which will also make AIS work properly.
 
+Generate a private key
+----------------------
+AIS uses cryptographic techniques to ensure authenticity and privacy of
+messages.  In order for AIS to work, a private key must be generated and
+shared to all processors.
+
+First generate the key on one of the nodes:
+
+unix# exec/keygen
+OpenAIS Authentication key generator.
+Gathering 1024 bits for key from /dev/random.
+Writing openais key to /etc/ais/authkey.
+
+
+After this is complete, a private key will be in the directory /etc/ais/authkey.
+This private key must be copied to every processor that will be a member of
+the cluster.  If the private key isn't the same for every node, those nodes
+with nonmatching private keys will not be able to join the same configuration.
+
+Copy the key to some transportable storage or use ssh to transmit the key
+from node to node.  Then install the key with the command:
+
+unix# install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/ais/authkey
+
+If the message invalid digest appears, the keys are not the same on each node.
+
 Run AIS Executive
 -----------------
 Get one or more nodes and run the AIS executive on each node.  A list of
-node IPs should be displayed on stdout when the nodes join a configuration.
-Run the aisexec program after following the previous directions.
-(after the default route is setup and the config
+node IPs should be displayed when the nodes join a configuration.  Run the
+aisexec program after following the previous directions.
 
 Before running any of the test programs
 ---------------------------------------
@@ -163,9 +199,9 @@ The benchmark configuration (how many threads to run, how many writes
 per benchmark run, and data write size are specified in the ckptbench.c
 and ckptbenchth.c programs.
 
-Two node clusters should approach 10 MB/sec on 100 mbit networks for 
-larger checkpoint sizes.  If you are not seeing these results, please
-report to the mailing list.
+Two node clusters should approach 8.5 MB/sec on 100 mbit networks for 
+larger checkpoint sizes with encryption and authentication.  If you are not
+seeing these results, please report to the mailing list.
 
 Write your own applications
 ---------------------------