Просмотр исходного кода

man: Fix crypto_hash and crypto_cipher defaults

Signed-off-by: Jan Friesse <jfriesse@redhat.com>
Reviewed-by: Christine Caulfield <ccaulfie@redhat.com>
Jan Friesse 7 лет назад
Родитель
Сommit
ed388b9438
2 измененных файлов с 17 добавлено и 17 удалено
  1. 4 4
      man/corosync.conf.5
  2. 13 13
      man/corosync_overview.7

+ 4 - 4
man/corosync.conf.5

@@ -1,6 +1,6 @@
 .\"/*
 .\"/*
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
-.\" * Copyright (c) 2006-2012 Red Hat, Inc.
+.\" * Copyright (c) 2006-2018 Red Hat, Inc.
 .\" *
 .\" *
 .\" * All rights reserved.
 .\" * All rights reserved.
 .\" *
 .\" *
@@ -32,7 +32,7 @@
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" */
 .\" */
-.TH COROSYNC_CONF 5 2012-10-10 "corosync Man Page" "Corosync Cluster Engine Programmer's Manual"
+.TH COROSYNC_CONF 5 2018-09-12 "corosync Man Page" "Corosync Cluster Engine Programmer's Manual"
 .SH NAME
 .SH NAME
 corosync.conf - corosync executive configuration file
 corosync.conf - corosync executive configuration file
 
 
@@ -213,7 +213,7 @@ messages. Valid values are none (no authentication), md5, sha1, sha256,
 sha384 and sha512. Encrypted transmission is only supported for
 sha384 and sha512. Encrypted transmission is only supported for
 the knet transport.
 the knet transport.
 
 
-The default is sha1.
+The default is none.
 
 
 .TP
 .TP
 crypto_cipher
 crypto_cipher
@@ -222,7 +222,7 @@ Valid values are none (no encryption), aes256, aes192, aes128 and 3des.
 Enabling crypto_cipher, requires also enabling of crypto_hash. Encrypted
 Enabling crypto_cipher, requires also enabling of crypto_hash. Encrypted
 transmission is only supported for the knet transport.
 transmission is only supported for the knet transport.
 
 
-The default is aes256.
+The default is none.
 
 
 .TP
 .TP
 link_mode
 link_mode

+ 13 - 13
man/corosync_overview.7

@@ -1,6 +1,6 @@
 .\"/*
 .\"/*
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
 .\" * Copyright (c) 2005 MontaVista Software, Inc.
-.\" * Copyright (c) 2006-2009 Red Hat, Inc.
+.\" * Copyright (c) 2006-2018 Red Hat, Inc.
 .\" *
 .\" *
 .\" * All rights reserved.
 .\" * All rights reserved.
 .\" *
 .\" *
@@ -32,7 +32,7 @@
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" * THE POSSIBILITY OF SUCH DAMAGE.
 .\" */
 .\" */
-.TH COROSYNC_OVERVIEW 7 2012-02-13 "corosync Man Page" "Corosync Cluster Engine Programmer's Manual"
+.TH COROSYNC_OVERVIEW 7 2018-09-12 "corosync Man Page" "Corosync Cluster Engine Programmer's Manual"
 .SH NAME
 .SH NAME
 corosync_overview \- Corosync overview
 corosync_overview \- Corosync overview
 .SH OVERVIEW
 .SH OVERVIEW
@@ -81,16 +81,12 @@ a private key must be generated and shared to all processors.
 
 
 First generate the key on one of the nodes:
 First generate the key on one of the nodes:
 
 
+.nf
 unix# corosync-keygen
 unix# corosync-keygen
-.br
 Corosync Cluster Engine Authentication key generator.
 Corosync Cluster Engine Authentication key generator.
-.br
-Gathering 1024 bits for key from /dev/random.
-.br
-Press keys on your keyboard to generate entropy.
-.br
+Gathering 2048 bits for key from /dev/urandom.
 Writing corosync key to /etc/corosync/authkey.
 Writing corosync key to /etc/corosync/authkey.
-.PP
+.fi
 
 
 After this operation, a private key will be in the file /etc/corosync/authkey.
 After this operation, a private key will be in the file /etc/corosync/authkey.
 This private key must be copied to every processor in the cluster.  If the
 This private key must be copied to every processor in the cluster.  If the
@@ -165,10 +161,14 @@ authenticate and encrypt data used within the Totem protocol.
 The default is /etc/corosync/authkey.
 The default is /etc/corosync/authkey.
 
 
 .SH SECURITY
 .SH SECURITY
-The corosync executive optionally encrypts all messages sent over the network
-using the AES-128 cipher.  The corosync executive uses HMAC and SHA1 to
-authenticate all messages.  The corosync executive library uses NSS
-as a pseudo random number generator.
+The corosync executive optionally encrypts and signs all messages sent
+over the network. For more details see
+.B crypto_model,
+.B crypto_hash
+and
+.B crypto_cipher
+options in the
+.BR corosync.conf (5).
 
 
 If membership messages can be captured by intruders, it is possible to execute
 If membership messages can be captured by intruders, it is possible to execute
 a denial of service attack on the cluster.  In this scenario, the cluster is
 a denial of service attack on the cluster.  In this scenario, the cluster is