Quoting r. Roland Dreier <[EMAIL PROTECTED]>: > Of course for real security some stronger authentication is needed in > any case (even in the iWARP case the source IP can't be trusted; an > attacker could DOS the real owner of the IP, flood the switches MAC > tables so it becomes a hub, and then take over any IP it wants).
I think you could get basically to the same level with IB by performing an additional ARP lookup on the IP address, and comparing the port GIDs. -- MST _______________________________________________ openib-general mailing list [email protected] http://openib.org/mailman/listinfo/openib-general To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general
