[ofa-general] Re: [PATCH] saquery: --smkey command line option
Hal Rosenstock
hrosenstock at xsigo.com
Fri May 23 04:07:35 PDT 2008
On Thu, 2008-05-22 at 15:47 -0700, Ira Weiny wrote:
> I guess my question is "does saquery need this to talk to the SA?"
>
> I am assuming the answer is "yes".
It depends on whether trusted operations are needed to be supported or
not. A normal node has no need for trusted operations. There was a
reason why the additional information was hidden with a key. It allows a
malicious user to effect not just his node but the subnet.
As I mentioned, this starts to be a slippery slope with the management
keys. I think a better approach when non default key is in place is to
support this via the OpenSM console as OpenSM knows all the keys it's
supposed to.
> I noticed this in the spec section 14.4.7 page 890:
>
> "The SM Key used for SM authentication is independent of the SM Key in the
> SA header used for SA authentication."
>
> Does this mean there could be 2 SM_Key values in use?
This was a clarification added at IBA 1.2.1. The SA SMKey is really an
SA Key. This lack of separation is a limitation in the current OpenSM
implementation.
-- Hal
> Ira
>
>
> On Thu, 22 May 2008 08:10:29 -0700
> Hal Rosenstock <hrosenstock at xsigo.com> wrote:
>
> > On Thu, 2008-05-22 at 17:56 +0300, Sasha Khapyorsky wrote:
> > > On 07:46 Thu 22 May , Hal Rosenstock wrote:
> > > > Sasha,
> > > >
> > > > On Thu, 2008-05-22 at 16:53 +0300, Sasha Khapyorsky wrote:
> > > > > This adds possibility to specify SM_Key value with saquery. It should
> > > > > work with queries where OSM_DEFAULT_SM_KEY was used.
> > > >
> > > > I think this starts down a slippery slope and perhaps bad precedent for
> > > > MKey as well. I know this is useful as a debug tool but compromises what
> > > > purports as "security" IMO as this means the keys need to be too widely
> > > > known.
> > >
> > > When different than OSM_DEFAULT_SM_KEY value is configured on OpenSM
> > > side an user may know this or not, in later case saquery will not work
> > > (just like now). I don't see a hole.
> >
> > I think it will tend towards proliferation of keys which will defeat any
> > security/trust. The idea of SMKey was to keep it private between SMs.
> > This is now spreading it wider IMO. I'm sure other patches will follow
> > in the same vein once an MKey manager exists.
> >
> > -- Hal
> >
> > > Sasha
> >
More information about the general
mailing list