I'll have to review the paper.  The other thing I'd add is the cipher suite
0 warning probably cannot be overemphasized.  If you have cipher suite 0
enabled, whether used or not, it is a huge risk.  At least with STRAIGHT
authentication the risk only comes about when some entity knowing the
secret actually uses it, cipher suite 0 is a risk all the time.  Inclusion
as a valid option I think was the biggest mistake that could've been made.
If there is only one thing about IPMI security someone bothers to learn, it
is the cipher suite 0 thing. I know you already understand this, but I'll
take any opportunity to rehash that point.



From:   dan farmer <zenf...@gmail.com>
To:     Jarrod B Johnson/Raleigh/IBM@IBMUS
Cc:     "ipmitool-devel@lists.sourceforge.net"
            <ipmitool-devel@lists.sourceforge.net>
Date:   02/19/2013 10:57 AM
Subject:        Re: [Ipmitool-devel] ipmi configuration security best practices




Thanks for the feedback - a quick reply:

On Feb 18, 2013, at 10:24 AM, Jarrod B Johnson <jbjoh...@us.ibm.com> wrote:


      Seems mostly sensible.

      -Gratuitious arp: agreed, but some BMC implementations cannot manage
      to get ARP requests to the BMCs.  I presume this is why such a
      request is in the spec at all.  I'd avoid such implementations like
      the plague for reasons beyond security though, just be aware that if
      an implementation enables that by default it may not work at all once
      disabled without static arp tables everywhere.


That's a good way of putting it, I'll put something to that effect.


      -Avoid shared network:  That's a pretty costly recommendation in some
      environments.  An adequately secured BMC is relatively low risk to
      exist on the network.

      -Use VLANs.  I'd say that, security wise, this adds very little.  If
      someone has enough access on a host in the network, they can tcpdump
      to discovery your management vlan id and vconfig their way onto it.
      It may make sense for non-security reasons, but I'd rather not people
      get a false sense of security because they enabled tagged vlan id to
      BMC.


I mostly agree about VLANs, although it does stop *some* from doing things.
More complexity than it's worth in my mind, and they're almost always
misconfigured in ways that people don't understand.

The other… well, that's the basic disagreement between us, since I don't
think BMCs may be adequately secured in general (I write at length about
this in my paper, not trying to convince anyone, and there may be
exceptions.)  And the cost of a compromised BMC can at lest potentially
vastly outweigh the cost of a server compromise.  I would say that putting
a server between it and the attacker is at least adding a bit of friction
to the attacker's ride, but certainly not a panacea.

I've compromised BMCs with very little effort by attacking them from the
server side; my sample is very small (I've all of 3 different servers from
as many vendors, and got 2/3), but it is certainly possible.  Strictly
security wise (not ops or cost) it makes sense to minimize exposure.

All that said, you know far more about IPMI+ and how it's deployed than I
do.  I've talked to big vendors who also have different final conclusions
but don't disagree with my basic points; I suppose it's not a black-n-white
thing, but presumably over time we shall learn more.

dan

<<inline: graycol.gif>>

------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_feb
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to