[164244] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IPMI vulnerabilities

daemon@ATHENA.MIT.EDU (Jeroen Massar)
Tue Jul 2 11:33:09 2013

Date: Tue, 02 Jul 2013 17:32:34 +0200
From: Jeroen Massar <jeroen@massar.ch>
To: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <E11301F4-C7C2-4A37-9475-39AC9145728A@cs.columbia.edu>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 2013-07-02 16:51 , Steven Bellovin wrote:
> http://www.wired.com/threatlevel/2013/07/ipmi/
> 
> Capsule summary: watch out!

Indeed! But it is should be logical, as IPMI is supposed to be for OOB
access right? :)

Anybody not putting them behind a properly restricted firewall and/or
VLAN is asking for issues... typical IPMI boxes run outdated linux
kernels, with nice olddated userspace and a whole lot of tools that one
can not really restrict access to, thus it is quite silly to have that
access open to the public.

Greets,
 Jeroen



home help back first fref pref prev next nref lref last post