[Info-vax] RX2800 i4 iLO 3 firmware

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Wed Jun 23 12:58:40 EDT 2021


On 2021-06-22 23:27:16 +0000, <kemain.nospam at gmail.com> said:

> Out of band server management like ILO's, DRAC including remote power 
> mgmt. strategies has been around for decades (early 1980's).

Outboard console was more of a necessity back then, as the earliest VAX 
itself was comparatively, well, stupid.

The VAX-11/780 operated as a peripheral of an LSI-11, in a manner of 
consideration. Boot the LSI, which then loads and boots Star and 
Starlet.

Later VAX systems got somewhat smarter.

Remote management was something comparatively new for OpenVMS folks, 
first arriving with Itanium for many of the OpenVMS sites around.

> VAX Nautilus and Polarstar systems used external PRO-350/380 PC systems 
> to manage (including Poff/Pon, searchable soft log files) VAX systems.

The Nautilus family used Pro 350 and Pro 380 hardware, with those boxes 
renamed as VAX console. The Polarstar family used a MicroVAX II as the 
console. The MicroVAX was one of the distinguishing features of 
Polarstar. VAX-11/780 used an LSI-11, as mentioned above. The VAX 9000 
service processor unit comprised of 4 MicroVAX II processors. Alpha 
eventually added RCM and RMC hardware outboard, all the way up to the 
entirely gonzo server management network present within the 
Marvel-class AlphaServer boxes; AlphaServer GS1280, etc.

IBM used last year's mainframe model as this year's channel controller 
as that old joke went, and analogous jokes about VAX consoles.

None of these VAX and Alpha consoles was supported for remote Ethernet 
network access, with the gear supporting remote serial access at best. 
Early on, this serial access was intended for DEC Field Service to dial 
in (modems, remember those?) and diagnose the server.

Yes, some older sites did routinely use terminal servers as a 
workaround for remote console access, or used a console app such as 
VAXcluster Console System (VCS) or Minicom and serial cabling, or 
screen/tmux, etc. And I've remotely tapped into the Marvel internal 
network, as have others. These were wildly insecure, by present-day 
standards.

HP and HPE iLO, Dell iDRAC, the SuperMicro BMC, and various other 
available gear all substantially improve on what the older server 
consoles could do, though. Particularly around remote management and 
monitoring and automation, and with far better support for server 
installation. And with better connection security. (Usually. Somewhat. 
See below.)

For lower-end boxes, Intel vPro and AMD Pro management access is 
available from various vendors.

iLO 2 and iLO 2 are hardware limited and which reportedly constrains 
what is possible with the hardware, and are nowadays best kept 
isolated. There are exploits against these, including the CVE-2013-4786 
vulnerability.

"There is no resolution to this issue. The authentication process for 
the IPMI 2.0 specification mandates that the server send a salted SHA1 
or MD5 hash of the requested user's password to the client, prior to 
the client authenticating. The BMC returns the password hash for any 
valid user account requested. This password hash can be broken using an 
offline brute force or dictionary attack. Because this functionality is 
a key part of the IPMI 2.0 specification, there is no way to fix the 
problem without deviating from the IPMI 2.0 specification."

Meaning you will want to disable IPMI ( MP:CM> sa -lanipmi d ) if 
you're not using it, and not on a constrained-access management network.

And another reason for isolation: iLO 2 and iLO 3 ssh security is badly 
down-revision, which means connecting using something similar to this: 
ssh -o HostKeyAlgorithms=ssh-rsa,ssh-dss -o 
KexAlgorithms=diffie-hellman-group1-sha1 -o Ciphers=aes128-cbc,3des-cbc 
-o MACs=hmac-md5,hmac-sha1 User at Server.Example.Com




-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list