[ofa-general] Allowing end-users to query for fabric information

Roland Dreier rdreier at cisco.com
Wed Oct 8 13:07:14 PDT 2008


 > It's comparable to saying that a single machine on the company net can
 > subvert DNS.

Just think about all the things a malicious host can do on an IB fabric.
For example, a malicious SMA could send an unending stream of traps to
the SM, or consume huge SM resources by faking an ever-changing virtual
topology, or just report a GID that collides with another port on the
fabric.  And I'm sure there are other things you can think of if you try
to get really nasty.

 - R.



More information about the general mailing list