OpenSANd Code
Brought to you by:
hoefer
| File | Date | Author | Commit |
|---|---|---|---|
| doc | 2017-04-21 | hoefer | [r24] 1.0.0 |
| journald | 2016-10-21 | hoefer | [r19] |
| lib | 2018-11-14 | hoefer | [r33] |
| nbd | 2016-04-26 | hoefer | [r11] |
| osnbd | 2018-05-20 | hoefer | [r32] |
| scripts | 2016-04-26 | hoefer | [r10] |
| ChangeLog | 2018-11-14 | hoefer | [r33] |
| EXTENDED_NBD_PROTOCOL | 2014-05-21 | hoefer | [r2] |
| HOWTO_INSTALL | 2015-11-13 | hoefer | [r8] |
| Makefile | 2018-11-14 | hoefer | [r33] |
| README | 2014-05-21 | hoefer | [r2] |
| TODO.org | 2018-02-09 | hoefer | [r30] |
| bkppanel | 2016-09-15 | hoefer | [r17] |
| bkpremove | 2016-09-09 | hoefer | [r16] |
| configure | 2015-11-13 | hoefer | [r9] 0.10.0 |
| gpl.txt | 2014-05-21 | hoefer | [r2] |
| lvm.conf | 2014-09-20 | hoefer | [r4] v1.7.1 |
| mdadm.conf | 2014-05-21 | hoefer | [r2] |
| opensand | 2018-11-14 | hoefer | [r33] |
| opensand.conf | 2018-11-14 | hoefer | [r33] |
| opensand.rules | 2014-05-21 | hoefer | [r2] |
| opensand_config.pl | 2015-01-12 | hoefer | [r6] version 0.8.0 |
| osbackup | 2018-11-14 | hoefer | [r33] |
| osbackuppanel | 2016-09-09 | hoefer | [r16] |
| oscheck | 2017-06-22 | hoefer | [r28] 1.2.0 |
| oscontrol | 2016-04-26 | hoefer | [r10] |
| oshousekeeping | 2018-11-14 | hoefer | [r33] |
| ospanel | 2016-09-09 | hoefer | [r16] |
| osscramble | 2014-11-20 | hoefer | [r5] version 0.7.2 |
| ostransfer | 2016-09-09 | hoefer | [r16] |
| sudoers | 2018-11-14 | hoefer | [r33] |
opensand is a SAN (Storage Area Network) daemon. It is released under the GPL v3 When opensand starts up, it first uses wakeonlan to start up a couple of disk stations. Each of the disk stations will then export one or more disks using nbd-server. These NBD exports are combined into one or more RAID 5 arrays. All the arrays are then combined into an LVM2 volume group named vg_opensand. The volume group contains disks and snapshots called lv_disk00000 through lv_disk00499. These disks are again exported using nbd-server (named exports, disk00000 through disk00499). opensand will now try to mount a filesystem labelled ENCRYPTIONKEYS. This filesystem contains a couple of files called 1.key through 499.key. Not all files need to be present, for those files NOT present, a file default.key will be used (giving a default encryption key). The key files contain strings that will be used as encryption keys. The encryption algorithm used for now is a symmetric 256 bit AES cypher. You can even put in random strings. Don't lose your keys though, or you *ARE* screwed! Make sure that the usb-storage system is linked into your kernel as a module so the USB key disk will be scanned LAST. Otherwise the stick might mess up the device names! In order to encrypt disk images, a function encrypt (oscontrol) is used. At this point, a couple of virtualization hosts are started up (using wakeonlan). The virtual systems will run on the disks. Use the program oscontrol in order to manage the SAN daemon.