Thomas> If I can snoop or guess rkeys (not a huge challenge with
Thomas> 32 bits), and if I can use them on an arbitrary queuepair,
Thomas> then I can handily peek and poke at memory that does not
Thomas> belong to me.
Thomas> For this reason, iWARP requires its steering tags to be
Thomas> scoped to a single connection. This leverages the IP
Thomas> security model and provides correctness.
Thomas> It is true that IB implementations generally don't do
Thomas> this. They should.
Isn't this what IB protection domains solve?
- R.
_______________________________________________
openib-general mailing list
[email protected]
http://openib.org/mailman/listinfo/openib-general
To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general