Thomas> If I can snoop or guess rkeys (not a huge challenge with
    Thomas> 32 bits), and if I can use them on an arbitrary queuepair,
    Thomas> then I can handily peek and poke at memory that does not
    Thomas> belong to me.

    Thomas> For this reason, iWARP requires its steering tags to be
    Thomas> scoped to a single connection. This leverages the IP
    Thomas> security model and provides correctness.

    Thomas> It is true that IB implementations generally don't do
    Thomas> this. They should.

Isn't this what IB protection domains solve?

 - R.
_______________________________________________
openib-general mailing list
[email protected]
http://openib.org/mailman/listinfo/openib-general

To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general

Reply via email to