[HN Gopher] Reverse Engineering Supermicro IPMI (2018)
___________________________________________________________________
Reverse Engineering Supermicro IPMI (2018)
Author : geocar
Score : 60 points
Date : 2021-06-16 15:20 UTC (7 hours ago)
(HTM) web link (peterkleissner.com)
(TXT) w3m dump (peterkleissner.com)
| tinus_hn wrote:
| Alternatively you can probably download a free copy of FreeDOS
| and use that to install the update.
| mrkstu wrote:
| Does FreeDOS boot off a flash drive?
| citrin_ru wrote:
| It is possible to boot DOS from USB flash using systlinux.
| 1MachineElf wrote:
| Yes, it does. Booting a FreeDOS flash drive is how I update
| Supermicro BIOS and flash HBAs with IT mode firmware.
| j16sdiz wrote:
| Why is the private key saved on the rom?
| duskwuff wrote:
| Because that's the only key. HMAC isn't a private-key
| algorithm.
| marshray wrote:
| I think you meant to say HMAC isn't a public key algorithm.
| richardwhiuk wrote:
| It's a symmetric key algorithm not a public/private key
| algorithm.
| [deleted]
| crispyambulance wrote:
| The Supermicro Redfish API is unlocked with the same key, at
| least that was the case the last time I experimented with it back
| in 2019.
|
| You can use Redfish, in theory, for bare-metal management of
| servers. I never went all the way with it, so I don't know how
| solid the implementation is.
___________________________________________________________________
(page generated 2021-06-16 23:01 UTC)