[ofa-general] Allowing end-users to query for fabric information
Roland Dreier
rdreier at cisco.com
Wed Oct 8 13:07:14 PDT 2008
> It's comparable to saying that a single machine on the company net can
> subvert DNS.
Just think about all the things a malicious host can do on an IB fabric.
For example, a malicious SMA could send an unending stream of traps to
the SM, or consume huge SM resources by faking an ever-changing virtual
topology, or just report a GID that collides with another port on the
fabric. And I'm sure there are other things you can think of if you try
to get really nasty.
- R.
More information about the general
mailing list