[164244] in North American Network Operators' Group
Re: IPMI vulnerabilities
daemon@ATHENA.MIT.EDU (Jeroen Massar)
Tue Jul 2 11:33:09 2013
Date: Tue, 02 Jul 2013 17:32:34 +0200
From: Jeroen Massar <jeroen@massar.ch>
To: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <E11301F4-C7C2-4A37-9475-39AC9145728A@cs.columbia.edu>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 2013-07-02 16:51 , Steven Bellovin wrote:
> http://www.wired.com/threatlevel/2013/07/ipmi/
>
> Capsule summary: watch out!
Indeed! But it is should be logical, as IPMI is supposed to be for OOB
access right? :)
Anybody not putting them behind a properly restricted firewall and/or
VLAN is asking for issues... typical IPMI boxes run outdated linux
kernels, with nice olddated userspace and a whole lot of tools that one
can not really restrict access to, thus it is quite silly to have that
access open to the public.
Greets,
Jeroen