[go: up one dir, main page]

Menu

Tree [r33] / trunk /
 History

HTTPS access


File Date Author Commit
 doc 2017-04-21 hoefer [r24] 1.0.0
 journald 2016-10-21 hoefer [r19]
 lib 2018-11-14 hoefer [r33]
 nbd 2016-04-26 hoefer [r11]
 osnbd 2018-05-20 hoefer [r32]
 scripts 2016-04-26 hoefer [r10]
 ChangeLog 2018-11-14 hoefer [r33]
 EXTENDED_NBD_PROTOCOL 2014-05-21 hoefer [r2]
 HOWTO_INSTALL 2015-11-13 hoefer [r8]
 Makefile 2018-11-14 hoefer [r33]
 README 2014-05-21 hoefer [r2]
 TODO.org 2018-02-09 hoefer [r30]
 bkppanel 2016-09-15 hoefer [r17]
 bkpremove 2016-09-09 hoefer [r16]
 configure 2015-11-13 hoefer [r9] 0.10.0
 gpl.txt 2014-05-21 hoefer [r2]
 lvm.conf 2014-09-20 hoefer [r4] v1.7.1
 mdadm.conf 2014-05-21 hoefer [r2]
 opensand 2018-11-14 hoefer [r33]
 opensand.conf 2018-11-14 hoefer [r33]
 opensand.rules 2014-05-21 hoefer [r2]
 opensand_config.pl 2015-01-12 hoefer [r6] version 0.8.0
 osbackup 2018-11-14 hoefer [r33]
 osbackuppanel 2016-09-09 hoefer [r16]
 oscheck 2017-06-22 hoefer [r28] 1.2.0
 oscontrol 2016-04-26 hoefer [r10]
 oshousekeeping 2018-11-14 hoefer [r33]
 ospanel 2016-09-09 hoefer [r16]
 osscramble 2014-11-20 hoefer [r5] version 0.7.2
 ostransfer 2016-09-09 hoefer [r16]
 sudoers 2018-11-14 hoefer [r33]

Read Me

opensand is a SAN (Storage Area Network) daemon. It is released under the GPL v3

When opensand starts up, it first uses wakeonlan to start up a couple of disk stations. Each of the disk stations will then export one or more disks using nbd-server. These NBD exports are combined into one or more RAID 5 arrays. All the arrays are then combined into an LVM2 volume group named vg_opensand.

The volume group contains disks and snapshots called lv_disk00000 through lv_disk00499. These disks are again exported using nbd-server (named exports, disk00000 through disk00499). 

opensand will now try to mount a filesystem labelled ENCRYPTIONKEYS. This filesystem contains a couple of files called 1.key through 499.key. Not all files need to be present, for those files NOT present, a file default.key will be used (giving a default encryption key).

The key files contain strings that will be used as encryption keys. The encryption algorithm used for now is a symmetric 256 bit AES cypher. You can even put in random strings. Don't lose your keys though, or you *ARE* screwed!

Make sure that the usb-storage system is linked into your kernel as a module so the USB key disk will be scanned LAST. Otherwise the stick might mess up the device names!

In order to encrypt disk images, a function encrypt (oscontrol) is used.

At this point, a couple of virtualization hosts are started up (using wakeonlan). The virtual systems will run on the disks.

Use the program oscontrol in order to manage the SAN daemon.