Secure inter-node communication is disclosed. The hardware of the first
node sends a key, identification of the first node, and identification of
a second node to hardware of the second node. The hardware of the second
node receives the key and the identifications. The hardware of the second
node verifies the identifications of the first and the second nodes, and
stores the key. The key stored in the hardware of the first and the
second nodes allows for a secure transmission channel from the software
of the first node to software of the second node.