2014-06-08

msm1267 (2804139) writes
"If enterprises are indeed moving services off premises and into the cloud, there are four letters those companies' IT organizations should be aware of: IPMI. Short for Intelligent Platform Management Interface, these tiny computers live as an embedded Linux system attached to the motherboards of big servers from vendors such as IBM, Dell and HP. IPMI is used by a Baseboard Management Controller (BMC) to manage Out-of-Band communication, essentially giving admins remote control over servers and devices, including memory, networking capabilities and storage. This is particularly useful for hosting providers and cloud services providers who must manage gear and data in varied locations.

Noted researchers Dan Farmer, creator of the SATAN vulnerability scanner, and HD Moore, creator of Metasploit, have been collaborating on research into the vulnerabilities present in IPMI and BMCs and the picture keeps getting uglier. Last July, Farmer and Moore published some research on the issue based upon work Farmer was doing under a DARPA Cyber Fast Track Grant that uncovered a host of vulnerabilities, and Internet-wide scans for the IPMI protocol conducted by Moore. Farmer released a paper called 'Sold Down the River,' in which he chastises big hardware vendors for ignoring security vulnerabilities and poor configurations that are trivial to find and exploit."

That's why IPMI should only live on intranets.

By mmell



2014-Jun-8 12:10

• Score: 4, Interesting
• Thread

Every enterprise I've worked for that uses IPMI (BMC, ALOM/ILOM, etc.) has put it on their
intranet, not the
internet - and as often as not, an especially inaccessible corner of the intranet.

Y'know, TCP/IP is inherently insecure. In fact, there's no effective built-in security there. IPMI itself is not secure because the security should not be implemented there; any more than network security should not be implemented in TCP/IP. Since this is a server related issue, IPMI implementers and users are presumed to understand this. Workstation users need not concern themselves with this. What sane workstation user will pay the extra money to get hardware with RAC technology?

You're doing it wrong.

By SuperTechnoNerd



2014-Jun-8 12:17

• Score: 3
• Thread

It confounds me that still, in today's world, new technologies are designed as such:

Design core features.

Write and test/debug core features.

Then, if there is time, do a security audit and glue some security on top otherwise just release what you got.

Security must be built in from step one, step two, etc. and must be and integral part of the design.

Have we not learned our lesson yet?

Competent people do IPMI over jumphosts

By gweihir



2014-Jun-8 12:22

• Score: 5, Informative
• Thread

Even firewalling it is not enough, unless you only let authenticated traffic from very few sources in. In any case, IPMI needs to have its own network segment, anybody putting it into the same segment as other traffic is grossly negligent and utterly incompetent.

And people putting IPMI where it is reachable from the Internet? I think that is grounds for immediate termination with a performance report that makes sure these people never do anything security-related ever again. That level of stupidity is hard to top.

Re:IPMI vulnz

By gweihir



2014-Jun-8 12:26

• Score: 5, Insightful
• Thread

That may be a bit over-the top. IPMI is vulnerable, but it is also useful. Giving IPMI its own physical network with access only after authentication is usually enough. A secure jump-host or firewall that requires authentication to pass traffic does serve well to secure IPMI.

Warned about this years ago.

By Animats



2014-Jun-8 15:00

• Score: 3
• Thread

I posted about the IPMI threat on Slashdot years ago, after reading the IPMI docs. Now, it's not only a real threat, it's one that's probably being widely exploited.

Even if IPMI packets aren't being accepted from the outside Internet, an IPMI vulnerability means that any break-in to any server allows an easy attack on all servers inside the firewall.

Anyway, for now, if you have a server, do
ipmitool -A NONE -H 1.2.3.4 bmc guid
(replacing 1.2.3.4 with the IP address) and see if it answers. If it responds to that from the outside world, you have a big problem.

Show more