TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Linux Servers Appear Most Affected by IPMI Enabled JungleSec Ransomware Attacks

42 pointsby avivallssaover 6 years ago

6 comments

sofaofthedamnedover 6 years ago
This is ridiculously stupid.<p>First, your ipmi interface shouldn&#x27;t be on the internet.<p>Second, of course these will identify as Linux - you wouldn&#x27;t run Windows in your ipmi server.<p>Third, encrypt your bootloader with a passphrase?! Good luck with that, and dealing with each software and hardware issue getting you out of bed.<p>Here&#x27;s a better idea - put your ipmi interface behind a hardware VPN on its own blank and sleep soundly.<p>This is awful advice from an awful website.
评论 #18851599 未加载
评论 #18850519 未加载
评论 #18851006 未加载
评论 #18850548 未加载
limaover 6 years ago
Useless article - you could replace &quot;IPMI&quot; by &quot;SSH&quot;.<p>Also, password-protecting GRUB won&#x27;t do much. An attacker can just boot to a small rescue ISO (you can change the boot order via IPMI even if there&#x27;s a BIOS password - if your IPMI is owned, you lost).
ShakataGaNaiover 6 years ago
I am super confused here. Is there a particular vendors brand of IPMI that is compromised or being targeted? What does this have to do with Linux?<p>My SuperMicro server has IPMI. My Linux does not, unless you count SSH, which wouldn&#x27;t make any dang sense.
dammover 6 years ago
Some cloud providers got this right; some didn&#x27;t exactly...<p>Had a few Hetzner baremetal dell servers with iDrac&#x2F;IPMI exposed to the world. It did have a good password.<p>Softlayer&#x2F;IBM makes me login to a VPN to get into IPMI<p>(at least for me)<p>Exposing IPMI on the internet is stupid easy; just as it is stupid. It&#x27;s the lazyness of hey I need to be able to get into the KVM console and i&#x27;m working at home today...<p>For example.
评论 #18852796 未加载
simula67over 6 years ago
IPMI implementations seems to be a mess in general<p>Mathew Garret did an excellent presentation on the security horrors he faced with IPMI : <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=GZeUntdObCA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=GZeUntdObCA</a><p>Does anyone know if RedFish implementations have a better track record ?
nanerover 6 years ago
Can&#x27;t find any details on this, the details provided don&#x27;t paint a clear picture. Best I can guess is they are referring to implementations that support virtual kvm access: Gain control of ipmi user, issue power cycle command, use virtual kvm to take control of system on reboot.