zlacker

[parent] [thread] 3 comments
1. temp08+(OP)[view] [source] 2025-09-28 17:47:30
My favorite supermicro facepalm will always be when you could set the IPMI encryption cipher to "none" (ipmitool -C0) and bypass actually needing any password at all. (Though I don't think this was unique to supermicro actually?)
replies(3): >>transp+b4 >>nyrikk+A7 >>kj4ips+uj
2. transp+b4[view] [source] 2025-09-28 18:19:34
>>temp08+(OP)
With some server vendors, if you don't connect an ethernet cable to the BMC, it can intercept BMC-targeted traffic from the OS-connected ethernet port.
3. nyrikk+A7[view] [source] 2025-09-28 18:44:10
>>temp08+(OP)
Dell also had this problem, you still needed to provide a password, it simply didn’t check the password.
4. kj4ips+uj[view] [source] 2025-09-28 20:09:11
>>temp08+(OP)
Pretty much all of them allow unrestricted access from KMS from factory, tough all of them have a way to disable it once configured, and HPE even throws shade until it's limited. KMS only works from the host itself.
[go to top]