On 5/27/2010 at 04:18 AM, Alan Jones <[email protected]> wrote: 
> Is there any interest in checking the on-the-wire version of the corosync 
> protocol? 
> For example, if the format of corosync messages changed in a way that was 
> not backward compatible it might be nice to detect it up front. 

Semi-related: it would be really nice if there were a way to unambiguously
detect corosync packets (like, a signature or something that's visible
even if secauth is on).  ATM, AFAICT, all you can do is:

  1) Assume anything on port 5405 is corosync.
  2) If someone has chosen to run on a different port, look for multicast
     traffic whose source port == destination port + 1, and hope it's not
     some other protocol with the same semantics.

Unfortunately, unless there actually is some sort of signature I'm not
aware of, this presumably requires a change to the on-the-wire protocol,
and I'm guessing nobody will be happy about that idea.

Regards,

Tim


-- 
Tim Serong <[email protected]>
Senior Clustering Engineer, OPS Engineering, Novell Inc.



_______________________________________________
Openais mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/openais

Reply via email to