Next: Configuration directory, Previous: Configuration neighbour options, Up: Configuration file [Index]
Multicast areas areas configuration only used with multicast packets.
areas: {
nodelist: {
id: OU67K7NA3RPOPFKJWNVBYJ5GPLRBDGHH6DZSSJ32JL7Q3Q76E52A
pub: ALCX2NJBANMBNFTQ27C3C6W2WJIXSE74R27TSYZQKMD2UJERCEOQ
prv: VQ3B4TLAZZB2G7RS3OSS5NUVKAS44OGY5YMQPMTAHQMZZLNG25MA
subs: ["alice", "bob", "eve"]
incoming: /home/incoming/areas/nodelist
}
echoarea: {
id: CKKJ3HOAVOP7VPNCEGZRNDO34MUOOJ4AXHDFCSVSOE647KN5CMIA
pub: 5MFPTJI2R322EUCTGCWZXTDBCVEL5NCFDBXI5PHPQOTLUVSQ3ZIQ
prv: LVGIZQRQTDE524KEE5FOWLE2GCQBILY4VSQBDHWJC6YUTOJ54QCQ
subs: ["alice", "bob"]
exec: {sendmail: ["/usr/sbin/sendmail"]}
allow-unknown: true
}
whatever.pvt: {
id: OU67K7NA3RPOPFKJWNVBYJ5GPLRBDGHH6DZSSJ32JL7Q3Q76E52A
subs: ["dave", "eve"]
}
}
Each key is human readable multicast group/area/echo name.
The only required field is the id. You can not process multicast
packets that has unknown area identification.
subs contains a list of recipients you must relay incoming
multicast packet on.
Knowledge of pub and prv keys gives ability to decrypt
multicast packet and process its contents (file or exec transmission).
For accepting file transmissions you must set incoming, similar
to neigh’s node option. For accepting exec
transmissions you must set exec, similar to neigh’s
node option.
You can accept multicast packets from unknown senders, by setting
allow-unknown option.
In the example above:
nodelistThat area is for multicast sending of nodelist files, with
relaying it to alice, bob and eve further.
echoareaThat area is for multicast discussion through sendmail handled
exec packets. Relaying to alice and bob and accepting
messages from unknown participants.
whatever.pvtWe just relay that area packets to dave and eve, but
without ability to see what is inside them. Pay attention that
allow-unknown does not play any role here, because we are not
even trying to decrypt (and authenticate) those multicast packets.