[ofa-general] Allowing end-users to query for fabric information
    Roland Dreier 
    rdreier at cisco.com
       
    Wed Oct  8 13:07:14 PDT 2008
    
    
  
 > It's comparable to saying that a single machine on the company net can
 > subvert DNS.
Just think about all the things a malicious host can do on an IB fabric.
For example, a malicious SMA could send an unending stream of traps to
the SM, or consume huge SM resources by faking an ever-changing virtual
topology, or just report a GID that collides with another port on the
fabric.  And I'm sure there are other things you can think of if you try
to get really nasty.
 - R.
    
    
More information about the general
mailing list