In Which I Savagely Impugn the Honor and Monoculture of IPMI & its Friends

IPMI+ Security Paper

June 4th, 2014 - new paper

A paper (11 pages) surveying IPMI and BMC security on the Internet; version 1.00 (June 4th, 2013):

Sold Down the River

A modestly lengthy paper (31 pages) on IPMI and BMC security; version 2.01 (August 12th, 2013):

IPMI: Freight Train to Hell, bloated director's cut.

- or -

IPMI: Express Train to Hell (one page, G-rated version; HTML/PDF;)

The one-page version is the express/single page/reader's digest one; it has various generalities I try to fully explain in the paper or supporting documents.

(Older material and first version of paper may be found here.)

Note #2. HD Moore put together a really fine set of methods to exploit various issues with IPMI. Required reading for some of the dangers. Dark times ahead (not because of his work ;))

New serious problem

Note #3. Zach Wikholm reported a nigh critical vulnerability (also reported last year, and I found about 30K then in a spot scan as well, but it's high time people started actually listening) in about a zillion and one (est :)) SuperMicro BMCs, as few as some interesting other problems. If you have a SM you really need to check this out. Spot checks reveal a LOT of vulnerable BMCs because of recovered passwords - for more see: Big Trouble in little BMC land

Kudos to Zach for finding these things, and for supporting him.

  1. Feedback
    1. Agree or no, feel free to drop me a line: zen @ either or
    2. If you've done development/guts work with IPMI/BMCs and would care to chat, let me know!
  2. Q's, FAQs, WTFs
    1. IPMI Security Best Practices (Needs update with new version!)
    2. IPMI IFAQ (Infrequently (or never)) Asked Questions
  3. Tech Notes/Addendums
    1. A few methods to extract or capture an IPMI password
    2. Notes on breaking into/after IPMI stuff (work in progress)
  4. Misc paper additions
    1. Bibliography
    2. Test lab
  5. Very small bits of ipmi related software by me
    1. Tools and tidbits

Server Vendors

A very small assortment of server vendors, at least to provide some context; if you haven't heard of their version of IPMI, you've at least heard of them, assuming you're reading this on a computer. Most seem to simply give out the images, which contain the BMC's operating system and basic boot environment, but a few require a service contract or relationship with the vendor (which I didn't have.) I had access to the first 3 here, and some sketchy notes to the first 4; clicking the vendor icon to see more.

Vendor IPMI Flavor Latest Version BMC Flash Images
DelliDRAC (Integrated Dell Remote Access Card) iDRAC 7Anyone may download
Hewlett Packard iLO (Integrated Lights Out) iLO 4Anyone
Supermicro Supermicro Intelligent Management ? (IPMI 2.0) Anyone
LenovoIMM? IMM (legacy IBM?)Anyone
IBM IMM (Integrated Management Module) IMM2Requires service contract
Fujitsu iRMC (Integrated Remote Management Controller) iRMC S3Anyone
Oracle/Sun ILOM (Integrated Lights Out Manager) ILOM 3Requires service contract

Source for the S5520 Server Platforms - a dozen BMCs on various Intel boards - kudos to Intel! (Presumably they have others out there, I was sent this link.)

Firmware Vendors

Firmware Vendors - under the hood more vendors lurk; there are only a few places that make BMCs, or Baseboard Mgmt Controllers, the little computers that implement IPMI; it's often created by 3 or more different vendors - the chipmakers, the firmware software adder-onners, and a big vendor like IBM, Dell, HP, etc., which all have their own names for their flavor of IPMI. I've put up some notes on some of my findings when or if applicable. It's interesting to note the ubiquity of China in all of these.

Vendor Manufactured in...
Nuvoton Hong Kong and Shenzhen
Emulex ... at least some presence in Beijing and Shanghai
ATEN HQ in Taiwan, factories in Shenzhen.
Winbond Housed in Taiwan, also in Kunshan city, China.
Avocent Beijing and Guangzhou
ASPEED HQ'd in Taiwan, factories/subsidiary in China
Renesas Mainland China and Hong Kong