ソースを参照

Environment variable cleanup, documentation of environment variables in
man pages, and rename of one of the environment variables used to specify
the main openais configuration file.


git-svn-id: http://svn.fedorahosted.org/svn/corosync/trunk@1024 fd59a12c-fef9-0310-b244-a6a79926bd2f

Steven Dake 20 年 前
コミット
734dce9972
4 ファイル変更60 行追加10 行削除
  1. 2 2
      exec/aisparser.c
  2. 1 1
      exec/amfconfig.c
  3. 1 1
      exec/totemconfig.c
  4. 56 6
      man/openais_overview.8

+ 2 - 2
exec/aisparser.c

@@ -187,9 +187,9 @@ static int read_config_file_into_objdb(
 	char *error_reason = error_string_response;
 	int res;
 
-	filename = getenv("OPENAIS_AISPARSER_FILE");
+	filename = getenv("OPENAIS_MAIN_CONFIG_FILE");
 	if (!filename)
-		filename = "etc/ais/openais.conf";
+		filename = "/etc/ais/openais.conf";
 
 	fp = fopen (filename, "r");
 	if (fp == 0) {

+ 1 - 1
exec/amfconfig.c

@@ -261,7 +261,7 @@ extern int openais_amf_config_read (char **error_string)
 
 	filename = getenv("OPENAIS_AMF_CONFIG_FILE");
 	if (!filename)
-		filename = "etc/ais/groups.conf";
+		filename = "/etc/ais/groups.conf";
 
 	fp = fopen (filename, "r");
 

+ 1 - 1
exec/totemconfig.c

@@ -556,7 +556,7 @@ int totem_config_keyread (
 	if (!got_key) {
 		char *filename = getenv("OPENAIS_TOTEM_AUTHKEY_FILE");
 		if (!filename)
-			filename = "etc/ais/authkey";
+			filename = "/etc/ais/authkey";
 		res = read_keyfile(filename, totem_config, error_string);
 		if (res)
 			goto key_error;

+ 56 - 6
man/openais_overview.8

@@ -1,5 +1,6 @@
 .\"/*
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
+.\" * Copyright (c) 2006 Red Hat, Inc.
 .\" *
 .\" * All rights reserved.
 .\" *
@@ -31,7 +32,7 @@
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" */
-.TH OPENAIS_OVERVIEW 8 2005-06-08 "openais Man Page" "Openais Programmer's Manual"
+.TH OPENAIS_OVERVIEW 8 2006-05-10 "openais Man Page" "Openais Programmer's Manual"
 .SH OVERVIEW
 The openais project is a project to implement a production quality "Revised BSD"
 licensed implementation of the most recent SA Forum's Application Interface
@@ -192,19 +193,66 @@ IPv6 traffic.
 .SH ARCHITECTURE
 The AIS libraries are a thin IPC interface to the openais executive.  The
 openais executive provides services for the SA Forum AIS libraries as well
-as the EVS library.
+as the EVS and CPG libraries.
 
 The openais executive uses the Totem extended virtual synchrony protocol.  The
 advantage to the end user is excellent performance characteristics and a proven
 protocol with excellent reliability.  This protocol connects the processors
 in a configuration together so they may communicate.
 
+.SH ENVIRONMENT VARIABLES
+The openais executive process uses four environment variables during startup.
+If these environment variables are not set, defaults will be used.
+
+.TP
+OPENAIS_MAIN_CONFIG_FILE
+This specifies the fully qualified path to the openais configuration file.
+
+The default is /etc/ais/openais.conf.
+
+.TP
+OPENAIS_AMF_CONFIG_FILE
+This specifies the fully qualified path to the openais Availability Management
+Framework configuration file.
+
+The default is /etc/ais/groups.conf.
+
+.TP
+OPENAIS_DEFAULT_CONFIG_IFACE
+This specifies the LCRSO that is used to parse the configuration file.  This
+allows other configuration file parsers to be implemented within the system.
+
+The default is to use the default openais configuration file parser which
+parses the format specified in openais.conf (5).
+
+.TP
+OPENAIS_TOTEM_AUTHKEY_FILE
+This specifies the fully qualified path to the shared key used to
+authenticate and encrypt data used within the Totem protocol.
+
+The default is /etc/ais/authkey.
+
 .SH SECURITY
-The openais executive encrypts all messages sent over the network using the
-SOBER-128 stream cipher.  The openais executive uses HMAC and SHA1 to
+The openais executive optionally encrypts all messages sent over the network
+using the SOBER-128 stream cipher.  The openais executive uses HMAC and SHA1 to
 authenticate all messages.  The openais executive library uses SOBER-128
 as a pseudo random number generator.  The EVS library feeds the PRNG using
 the /dev/random Linux device.
+
+If membership messages can be captured by intruders, it is possible to execute
+a denial of service attack on the cluster.  In this scenario, the cluster is
+likely already compromised and a DOS attack is the least of the administration's
+worries.
+
+The security in openais does not offer perfect forward secrecy because the keys
+are reused.  It may be possible for an intruder by capturing packets in an
+automated fashion to determine the shared key.  No such automated attack has
+been published as of yet.  In this scenario, the cluster is likely already
+compromised to allow the long-term capture of transmitted data.
+
+For security reasons, the openais executive binary aisexec should NEVER
+be setuid or setgid in the filesystem.
+
 .PP
 .SH SAFTEST COMPLIANCE
 The openais libraries are now nearly compliant with every aspect of the SA
@@ -213,8 +261,10 @@ B.01.01 specification.  The remaining services pass most of the tests of the
 saftest suite against the B.01.01 specification.
 
 .SH BUGS
-The openais project does not currently implement the messaging service.
-The distributed locking service is buggy and incomplete.
+The messaging service is partially implemented and not suitable for deployment.
+The distributed locking service is buggy and not suitable for deployment.
+The Availability Management Framework is under development and not suitable for
+deployment..
 
 .SH "SEE ALSO"
 .BR openais.conf (5),