Zero-Copy Networking with Replay Attack Prevention
Revolutionary RDMA implementation using pure InfiniBand verbs for complete PSN control, preventing replay attacks while maintaining ultra-low latency and high throughput.
Traditional RDMA implementations using Connection Manager (rdma_cm) automatically transition Queue Pairs to RTS state, preventing custom PSN control.
This creates a critical security vulnerability: replay attacks.
We implement pure InfiniBand verbs, bypassing rdma_cm entirely for complete control over QP state transitions and PSN values.
Cryptographically secure PSN exchange via TLS before RDMA connection.
Cryptographically secure PSN generation and exchange over TLS before RDMA connection establishment.
Thread-safe server handling 10+ concurrent clients with dedicated Queue Pairs and Memory Regions.
Direct hardware control bypassing RDMA CM limitations for complete PSN customization.
90% resource reduction through intelligent sharing of device context across all clients.
Optimized for AWS EC2 with Soft-RoCE, complete with Terraform deployment scripts.
Direct memory access with microsecond latency and line-rate throughput.
Three-way handshake protocol ensures clean disconnection with 100% resource cleanup.
45x faster vector search for AI applications. Revolutionary approach to RAG systems.
â Try Live Demo
# Launch Ubuntu 20.04 t3.large instance on AWS # SSH into instance and run: wget https://raw.githubusercontent.com/linjiw/rdma-multi-client/main/scripts/aws_quick_setup.sh chmod +x aws_quick_setup.sh ./aws_quick_setup.sh # Run the demo cd ~/rdma-multi-client ./run_demo_auto.sh
# Clone repository git clone https://github.com/linjiw/rdma-multi-client.git cd rdma-multi-client # Install dependencies sudo apt-get install -y libibverbs-dev librdmacm-dev libssl-dev # Configure Soft-RoCE sudo modprobe rdma_rxe sudo rdma link add rxe0 type rxe netdev eth0 # Build and run make clean && make all make generate-cert ./build/secure_server
# Deploy with Terraform cd terraform terraform init # Deploy infrastructure terraform apply -var="key_name=your-key-name" # SSH to server ssh -i your-key.pem ubuntu@$(terraform output -raw server_public_ip)