Quoting r. Roland Dreier <[EMAIL PROTECTED]>:
> Of course for real security some stronger authentication is needed in
> any case (even in the iWARP case the source IP can't be trusted; an
> attacker could DOS the real owner of the IP, flood the switches MAC
> tables so it becomes a hub, and then take over any IP it wants).

I think you could get basically to the same level with IB by performing
an additional ARP lookup on the IP address, and comparing the port GIDs.

-- 
MST
_______________________________________________
openib-general mailing list
[email protected]
http://openib.org/mailman/listinfo/openib-general

To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general

Reply via email to