update the install file
Index: INSTALL
===================================================================
--- INSTALL	(revision 2345)
+++ INSTALL	(working copy)
@@ -10,6 +10,22 @@
 available source code, may be exported from the United States under License
 Exception TSU prsuant to 15 C.F.R Section 740.13(e).
 
+---------------------------------
+* Platforms Built and Tested On *
+---------------------------------
+Corosync has been tested on:
+Linux: Fedora 11, Debian Lenny, Red Hat Enterprise Linux 5
+Solaris: version 10 CSW
+BSD: FreeBSD and OpenBSD
+MacOSX: Darwin latest update
+
+It should build and run properly on the tested platforms as well as possibly
+others with minimal effort.  Corosync requires a coherent mmap() system call
+and will not operate on platforms which don't support coherent mmap().
+
+Corosync has been tested with recent gcc compilers and Intel's C compiler.
+SunStudio compilers fail to build with various internal compiler errors.
+
 ----------------------------
 * Building from subversion *
 ----------------------------
@@ -46,6 +62,29 @@
 balance:~/corosync/trunk% su
 balance:~/corosync/trunk# make install
 
+-------------------------------
+* A notice about dependencies *
+-------------------------------
+We have strived very hard to avoid dependencies as much as possible, and in
+fact corosync can be compiled without any dependencies.  The one optional
+dependency corosync has today is the nss package when built with support for
+nss encryption.  NSS encryption performs more poorly then the default
+encryption, but may be a good choice if your organization has policies
+regarding encryption technology requiring the use of a common cryptographic
+library such as Netscape Security Services.
+
+To enable nss during building:
+balance:~/corosync/trunk% ./configure --enable-nss
+
+To disable nss during buildling:
+balance:~/corosync/trunk% ./configure --disable-nss
+
+The nss packages required to build corosync with nss support can usually be
+found by installing the "nss-devel" and "nspr-devel" packages for your
+distribution.  Note nss is enabled by default, so if you don't want nss support
+or don't want to install nss devel packages, make sure to set the appropriate
+configure option as described above.
+
 ------------------------
 * Configuring Corosync *
 ------------------------
@@ -100,22 +139,6 @@
 
 Do not use DOS style termination.  This breaks the parser.
 
-Configure Host
---------------
-For security reasons, corosync only allows a process that had the EGID/GID
-of "ais" to connect to it.  To make development easier, it is recommended to
-create an "ais" user with the "ais" group.
-
-[r...@balance root]# adduser ais -g ais
-
-Set the ais user's password:
-
-[r...@balance root]# passwd ais
-Changing password for user ais.
-New password:
-Retype new password:
-passwd: all authentication tokens updated successfully.
-
 Generate a private key
 ----------------------
 corosync uses cryptographic techniques to ensure authenticity and privacy of
@@ -124,7 +147,7 @@
 
 First generate the key on one of the nodes:
 
-unix# exec/keygen
+balance# corosync-keygen
 Corosync Authentication key generator.
 Gathering 1024 bits for key from /dev/random.
 Writing corosync key to /etc/ais/authkey.
@@ -137,14 +160,13 @@
 Copy the key to some transportable storage or use ssh to transmit the key
 from node to node.  Then install the key with the command:
 
-unix# install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/ais/authkey
+balance# install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/ais/authkey
 
 If the message invalid digest appears, the keys are not the same on each node.
 
 Run the corosync executive
 -------------------------
-Get one or more nodes and run the corosync executive on each node.  A list of
-node IPs should be logged when the nodes join a configuration.  Run the
+Get one or more nodes and run the corosync executive on each node.  Run the
 corosync daemon after following the previous directions.  The daemon must be
 run as UID 0(root).
 
@@ -153,21 +175,27 @@
 
 Before running any of the test programs
 ---------------------------------------
-The corosync executive will ensure security by only allowing the ais group (or
-uid root) to connect to the service.  Switch to the ais group before
-running any applications linked to the ais apis, or the applications will
-not be authenticated and won't be able to access services.
+The corosync executive will ensure security by only allowing the UID 0(root) or
+GID 0(root) to connect to it.  To allow other users to access the corosync
+executive, create a directory called /etc/corosync/uidgid.d and place a file in
+it named in some way that is identifiable to you.  All files in this directory
+will be scanned and their contents added to the allowed uid gid database.  The
+contents of this file should be
+uidgid {
+	uid: username
+	gid: groupname
+}
 
-[sd...@balance sdake]$ su ais
-Password:
-[...@balance sdake]$ id
-uid=501(ais) gid=502(ais) groups=502(ais)
+Please note that these users then have full ability to transmit and receive
+messages in the cluster and are not bound by the threat model described in
+SECURITY.
 
 Try out the corosync cpg functionality
 --------------------------------------
 After corosync is running
 
-su to ais user
-
 Run test/testcpg on multiple nodes or on the same node.  Messages can be typed
 which will then be sent to other testcpg applications in the cluster.
+
+To see a hashed verified output of data on all nodes, test/cpgverify can be
+run.
_______________________________________________
Openais mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/openais

Reply via email to