فهرست منبع

Environment variable cleanup, documentation of environment variables in
man pages, and rename of one of the environment variables used to specify
the main openais configuration file.


git-svn-id: http://svn.fedorahosted.org/svn/corosync/trunk@1024 fd59a12c-fef9-0310-b244-a6a79926bd2f

Steven Dake 20 سال پیش
والد
کامیت
734dce9972
4فایلهای تغییر یافته به همراه60 افزوده شده و 10 حذف شده
  1. 2 2
      exec/aisparser.c
  2. 1 1
      exec/amfconfig.c
  3. 1 1
      exec/totemconfig.c
  4. 56 6
      man/openais_overview.8

+ 2 - 2
exec/aisparser.c

@@ -187,9 +187,9 @@ static int read_config_file_into_objdb(
 	char *error_reason = error_string_response;
 	char *error_reason = error_string_response;
 	int res;
 	int res;
 
 
-	filename = getenv("OPENAIS_AISPARSER_FILE");
+	filename = getenv("OPENAIS_MAIN_CONFIG_FILE");
 	if (!filename)
 	if (!filename)
-		filename = "etc/ais/openais.conf";
+		filename = "/etc/ais/openais.conf";
 
 
 	fp = fopen (filename, "r");
 	fp = fopen (filename, "r");
 	if (fp == 0) {
 	if (fp == 0) {

+ 1 - 1
exec/amfconfig.c

@@ -261,7 +261,7 @@ extern int openais_amf_config_read (char **error_string)
 
 
 	filename = getenv("OPENAIS_AMF_CONFIG_FILE");
 	filename = getenv("OPENAIS_AMF_CONFIG_FILE");
 	if (!filename)
 	if (!filename)
-		filename = "etc/ais/groups.conf";
+		filename = "/etc/ais/groups.conf";
 
 
 	fp = fopen (filename, "r");
 	fp = fopen (filename, "r");
 
 

+ 1 - 1
exec/totemconfig.c

@@ -556,7 +556,7 @@ int totem_config_keyread (
 	if (!got_key) {
 	if (!got_key) {
 		char *filename = getenv("OPENAIS_TOTEM_AUTHKEY_FILE");
 		char *filename = getenv("OPENAIS_TOTEM_AUTHKEY_FILE");
 		if (!filename)
 		if (!filename)
-			filename = "etc/ais/authkey";
+			filename = "/etc/ais/authkey";
 		res = read_keyfile(filename, totem_config, error_string);
 		res = read_keyfile(filename, totem_config, error_string);
 		if (res)
 		if (res)
 			goto key_error;
 			goto key_error;

+ 56 - 6
man/openais_overview.8

@@ -1,5 +1,6 @@
 .\"/*
 .\"/*
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
+.\" * Copyright (c) 2006 Red Hat, Inc.
 .\" *
 .\" *
 .\" * All rights reserved.
 .\" * All rights reserved.
 .\" *
 .\" *
@@ -31,7 +32,7 @@
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" */
 .\" */
-.TH OPENAIS_OVERVIEW 8 2005-06-08 "openais Man Page" "Openais Programmer's Manual"
+.TH OPENAIS_OVERVIEW 8 2006-05-10 "openais Man Page" "Openais Programmer's Manual"
 .SH OVERVIEW
 .SH OVERVIEW
 The openais project is a project to implement a production quality "Revised BSD"
 The openais project is a project to implement a production quality "Revised BSD"
 licensed implementation of the most recent SA Forum's Application Interface
 licensed implementation of the most recent SA Forum's Application Interface
@@ -192,19 +193,66 @@ IPv6 traffic.
 .SH ARCHITECTURE
 .SH ARCHITECTURE
 The AIS libraries are a thin IPC interface to the openais executive.  The
 The AIS libraries are a thin IPC interface to the openais executive.  The
 openais executive provides services for the SA Forum AIS libraries as well
 openais executive provides services for the SA Forum AIS libraries as well
-as the EVS library.
+as the EVS and CPG libraries.
 
 
 The openais executive uses the Totem extended virtual synchrony protocol.  The
 The openais executive uses the Totem extended virtual synchrony protocol.  The
 advantage to the end user is excellent performance characteristics and a proven
 advantage to the end user is excellent performance characteristics and a proven
 protocol with excellent reliability.  This protocol connects the processors
 protocol with excellent reliability.  This protocol connects the processors
 in a configuration together so they may communicate.
 in a configuration together so they may communicate.
 
 
+.SH ENVIRONMENT VARIABLES
+The openais executive process uses four environment variables during startup.
+If these environment variables are not set, defaults will be used.
+
+.TP
+OPENAIS_MAIN_CONFIG_FILE
+This specifies the fully qualified path to the openais configuration file.
+
+The default is /etc/ais/openais.conf.
+
+.TP
+OPENAIS_AMF_CONFIG_FILE
+This specifies the fully qualified path to the openais Availability Management
+Framework configuration file.
+
+The default is /etc/ais/groups.conf.
+
+.TP
+OPENAIS_DEFAULT_CONFIG_IFACE
+This specifies the LCRSO that is used to parse the configuration file.  This
+allows other configuration file parsers to be implemented within the system.
+
+The default is to use the default openais configuration file parser which
+parses the format specified in openais.conf (5).
+
+.TP
+OPENAIS_TOTEM_AUTHKEY_FILE
+This specifies the fully qualified path to the shared key used to
+authenticate and encrypt data used within the Totem protocol.
+
+The default is /etc/ais/authkey.
+
 .SH SECURITY
 .SH SECURITY
-The openais executive encrypts all messages sent over the network using the
-SOBER-128 stream cipher.  The openais executive uses HMAC and SHA1 to
+The openais executive optionally encrypts all messages sent over the network
+using the SOBER-128 stream cipher.  The openais executive uses HMAC and SHA1 to
 authenticate all messages.  The openais executive library uses SOBER-128
 authenticate all messages.  The openais executive library uses SOBER-128
 as a pseudo random number generator.  The EVS library feeds the PRNG using
 as a pseudo random number generator.  The EVS library feeds the PRNG using
 the /dev/random Linux device.
 the /dev/random Linux device.
+
+If membership messages can be captured by intruders, it is possible to execute
+a denial of service attack on the cluster.  In this scenario, the cluster is
+likely already compromised and a DOS attack is the least of the administration's
+worries.
+
+The security in openais does not offer perfect forward secrecy because the keys
+are reused.  It may be possible for an intruder by capturing packets in an
+automated fashion to determine the shared key.  No such automated attack has
+been published as of yet.  In this scenario, the cluster is likely already
+compromised to allow the long-term capture of transmitted data.
+
+For security reasons, the openais executive binary aisexec should NEVER
+be setuid or setgid in the filesystem.
+
 .PP
 .PP
 .SH SAFTEST COMPLIANCE
 .SH SAFTEST COMPLIANCE
 The openais libraries are now nearly compliant with every aspect of the SA
 The openais libraries are now nearly compliant with every aspect of the SA
@@ -213,8 +261,10 @@ B.01.01 specification.  The remaining services pass most of the tests of the
 saftest suite against the B.01.01 specification.
 saftest suite against the B.01.01 specification.
 
 
 .SH BUGS
 .SH BUGS
-The openais project does not currently implement the messaging service.
-The distributed locking service is buggy and incomplete.
+The messaging service is partially implemented and not suitable for deployment.
+The distributed locking service is buggy and not suitable for deployment.
+The Availability Management Framework is under development and not suitable for
+deployment..
 
 
 .SH "SEE ALSO"
 .SH "SEE ALSO"
 .BR openais.conf (5),
 .BR openais.conf (5),