博客

Join Raritan at DCD Seattle

Posted on August 27, 2013 by Gento  |  Comment (0)

Join Chris Trovato and Kimble Jarrold of Raritan at Data Center Dynamics 2013 at the Hilton Bellevue in Seattle. It’s the world’s largest peer-led data center conference & expo and Raritan will be there.

DCD-Seattle-Raritan

Show Details:
Thursday, September 12th, 2013
Hilton Bellevue, 300 – 112th Avenue SE, Bellevue, WA 98004
Check back here soon for our booth number.

Click here for full the official Data Center Dynamics show website.

Exhibit Hours:
Friday, July 12th

  • 7:45 a.m. – 9:15 a.m., Breakfast
  • 9:15 a.m. – 5:30 p.m., Sessions/Exhibit
  • 5:30 p.m. – 7:00 p.m., Cocktail Reception

Be sure to stop by our booth to pick up our famous LED pens and durable Solo coffee cups.

For more information, please email Dorothy Ochs or call at 1.732.764.8886 ext.1220


US-CERT Warning on BMC & IPMI Security Risks

Posted on August 12, 2013 by Gento  |  Comment (0)

Security ShieldThe US Computer Emergency Readiness Team (US-CERT) issued an alert (TA13-207A) on IPMI usage on July 26th, with recommendations for IT departments.  This is based on the work of Dan Farmer and HD Moore that I summarized in my previous blog on this topic.

The US-CERT alert summarizes many of the risks and issues, and provides recommended solutions for administrators.  Solutions include:  restrict IPMI to internal networks, utilize strong passwords, require authentication, sanitize flash memory at and of life, and identify affected products.  A list of BMC’s are provided, although this is not a complete list of these devices and the servers utilizing them.

While these solutions are a step in the right direction, they are not sufficient to address all of the security issues listed by Farmer and Moore.  For example, using IPMI on internal networks allows it to be attacked by viruses or worms that may exist on these networks.   And if strong passwords are not enforced by systems, then some passwords may not be strong.  Furthermore, authentication should be sufficiently strong, and for government and military organizations, FIPS 140-2 encryption is required along with two-factor authentication (e.g. CAC).

These solutions do not address many of the structural issues with BMC’s and IPMI including direct access to the server’s motherboard, storage of clear text passwords, virtually unlimited server control,  and access to the BMC from a compromised server.

IT administrators and security officers should directly consult Farmer’s and Moore’s work to understand the specific dangers to their environment and take the appropriate actions.  Administrators should follow the security best practices as defined by the server manufacturer and ensure that their servers have the latest BMC firmware, such that the latest security patches are applied.   Its a good idea to make sure your security scanner audits these devices for vulnerabilities.


The Dangers of BMC’s and IPMI Highlighted by Security Researchers

Posted on July 26, 2013 by Gento  |  Comment (0)

SecurityRecent articles in Network World, Dark Reading, Wired and Security Week have highlighted the shocking and widespread security vulnerabilities of Baseboard Management Controllers (BMC) (and the associated Intelligent Platform Management Interface (IPMI) protocol), used for remote server management by corporations, service providers and hosting companies.

BMC’s, available from all leading server manufacturers, have direct access to the server’s motherboard. This provides the ability to monitor, boot, and even reinstall the server. Many systems provide KVM-over-IP access and the connection of remote media. Access to the BMC provides virtually unlimited remote control of the server.

Two security researchers have identified these vulnerabilities: Dan Farmer, who originally discovered and documented the vulnerabilities, and HD Moore, who describes how to identify and test for these issues, using readily available security tools. Moore discovered over 300,000 IPMI-enabled vulnerable servers connected to the Internet, as well as additional vulnerabilities.

BMC/IPMI vulnerabilities include: Cyper 0 authentication allowing access with any password, BMC-provided password hashes which can be broken via brute force methods, BMC’s shipping with enabled “anonymous” access, a UPnP vulnerability that provides root access to the BMC, and storage of clear text passwords. Once the BMC is broken into there are multiple ways to infect, control and takeover the server. Conversely, for a compromised server, the BMC can be used to establish a backdoor user account.

All server administrators and security officers need to be aware of Farmer’s and Moore’s work and understand how it affects their servers. As IPMI and BMC implementations vary, consult your server manufacturer(s). Farmer provides IPMI security best practices and Moore provides a useful FAQ.

While this research is rather new and there is much to digest, Raritan’s experts do agree that there are indeed vulnerabilities that customers should take seriously. Given the power and opacity of the BMC, this is doubly true.

Moore: “In addition to vulnerabilities in the IPMI protocol itself, most BMCs seem to suffer from issues common across all embedded devices, namely default passwords, outdated open source software, and, in some cases, backdoor accounts and static encryption keys.”

Moore: “The world of BMCs is a mess that is not likely to get better anytime soon, and we need to be crystal clear about the risk these devices pose to our networks.”

Farmer: “Imagine trying to secure a computer with a small but powerful parasitic server on its motherboard; a bloodsucker that can’t be turned off and has no documentation; you can’t login, patch, or fix problems on it; server-based defensive, audit, or anti-malware software can’t be used. Its design is secret and implementation old.”

Farmer: “It’s also the perfect spy platform: nearly invisible to its host, it can fully control the computer’s hardware and software, and it was designed for remote control and monitoring.”


Data Center Efficiency Innovation Seminar

Posted on July 2, 2013 by Gento  |  Comment (0)

Meet the creators and builders of innovative, efficient data center infrastructure solutions and learn how they can provide smart solutions to your growing data center challenges.

This event is perfect for engineers and end users looking to improve productivity and efficiency in data center power, cooling, network management, and environmental monitoring.

Please join us at IO New Jersey on Wednesday July 24th – the largest modular data center in the New York area – for an info-packed day, complete with a keynote presentation from Syska Hennessy, networking opportunities, efficiency innovation presentations and a tour of IO.

Keynote Speaker:
Ed Lao, P.E. - Syska Hennessy Ed is a registered professional engineer licensed in various US states and has 25+ years of specialized experience focused on electrical engineering. From electrical design, testing/commissioning, project management, to training for data center operations and maintenance, he’s been actively involved in the design of mission critical facilities worldwide.

CLICK HERE TO REGISTER


Just in from Cisco Live!

Posted on June 28, 2013 by Gento  |  Comment (0)

From Cisco Live! today,  Eli the Computer Guy explains what’s so cool about our intelligent power distribution units.

It’s “BEYOND pretty cool” that our iPDUs connect into active directory so you can assign users permissions into individual ports so only they can power cycle those ports.


Page 36 of 44 pages ‹ First  < 34 35 36 37 38 >  Last ›

力登官方微信公众号

力登官方微信公众号
cn-blogfollow

近期活动

Cisco Live 2018
March 6-9, 2018  •  Melbourne, Australia
DataCloud Asia 2018
March 22, 2018  •  Singapore
DCD Indonesia
Apr 5, 2018  •  Jakarta
Data Centre World Hong Kong
May 16 – 17, 2018  •  Hong Kong
CDCC China
May, June, July, Nov 2018  •  Wuhan, Hangzhou, Chengdu, Beijing

View all Events

力登最新新闻

力登公司智能机架管理产品系列又添新成员——新机柜门禁电子锁系统
Posted on July 29, 2018
Legrand Makes 451 Research’s List of Largest Data Center Technology Suppliers
Posted on May 4, 2018
Finding Weak Links in Your Security Policy and How to Safeguard Data Centers Will Be Addressed by Raritan Speaker at AFCOM Conference
Posted on March 8, 2018
Raritan Introduces Secure Switch for KVM Access to Government and Military Computers
Posted on March 6, 2018
Ashley Fox of Raritan Inc. Recognized as 2018 CRN Channel Chief
Posted on February 27, 2018

View all news