[ofa-general] Re: [PATCH] saquery: --smkey command line option

Sasha Khapyorsky sashak at voltaire.com
Fri May 23 05:34:14 PDT 2008


On 04:15 Fri 23 May     , Hal Rosenstock wrote:
> 
> > but now in IBA spec knowing a valid
> > SM_Key is mandatory for privileged SA clients (which need to get whole
> > list of MCMemberRecord, ServiceInfo, etc.).
> 
> It's a grey area.

I don't see this as "grey" - spec is very clear about this sort of SA
restrictions.

> The issue is what the privileged SA clients should be
> used for.

It can be used for monitoring, SA DB sync/dump, debugging, etc..

> I think this use case allows much more common knowledge of the
> management keys (in this case the SA key) as it will not just be the
> network administrator using it and even if it were, the user would be
> looking over his shoulder.

A network administrator is not a little kid :) and this option is
optional. Following your logic we will need to disable root passwords
typing too.

> That more common knowledge allows for a
> malicious user to more easily compromise the subnet.

There is nothing which could prevent from a malicious user to put things
in the code.

> A better approach to all these trust issues IMO is to use the OpenSM
> console to support these types of operations.

OpenSM console is not protected even by SM_Key. And what about
diagnostics when other SMs are used?

Sasha



More information about the general mailing list