If you want to configure corosync to use cryptographic techniques to ensure authenticity

and privacy of the messages, you will need to generate a private key.

corosync-keygen creates this key and writes it to /etc/corosync/authkey.

This private key must be copied to every processor in the cluster. If the

private key isn't the same for every node, those nodes with nonmatching private

keys will not be able to join the same configuration.

Copy the key to some security transportable storage or use ssh to transmit the

key from node to node. Then install the key with the command:

unix#: install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/corosync/authkey

If a message "Invalid digest" appears from the corosync executive, the keys

are not consistent between processors.

Note: corosync-keygen will ask for user input to assist in generating entropy.


Generate the key.

$ corosync-keygen

Corosync Cluster Engine Authentication key generator.

Gathering 1024 bits for key from /dev/random.

Press keys on your keyboard to generate entropy.

RELATED TO corosync-keygen…


Angus Salkeld