[HN Gopher] Reverse Engineering Supermicro IPMI (2018)
       ___________________________________________________________________
        
       Reverse Engineering Supermicro IPMI (2018)
        
       Author : geocar
       Score  : 60 points
       Date   : 2021-06-16 15:20 UTC (7 hours ago)
        
 (HTM) web link (peterkleissner.com)
 (TXT) w3m dump (peterkleissner.com)
        
       | tinus_hn wrote:
       | Alternatively you can probably download a free copy of FreeDOS
       | and use that to install the update.
        
         | mrkstu wrote:
         | Does FreeDOS boot off a flash drive?
        
           | citrin_ru wrote:
           | It is possible to boot DOS from USB flash using systlinux.
        
           | 1MachineElf wrote:
           | Yes, it does. Booting a FreeDOS flash drive is how I update
           | Supermicro BIOS and flash HBAs with IT mode firmware.
        
       | j16sdiz wrote:
       | Why is the private key saved on the rom?
        
         | duskwuff wrote:
         | Because that's the only key. HMAC isn't a private-key
         | algorithm.
        
           | marshray wrote:
           | I think you meant to say HMAC isn't a public key algorithm.
        
             | richardwhiuk wrote:
             | It's a symmetric key algorithm not a public/private key
             | algorithm.
        
       | [deleted]
        
       | crispyambulance wrote:
       | The Supermicro Redfish API is unlocked with the same key, at
       | least that was the case the last time I experimented with it back
       | in 2019.
       | 
       | You can use Redfish, in theory, for bare-metal management of
       | servers. I never went all the way with it, so I don't know how
       | solid the implementation is.
        
       ___________________________________________________________________
       (page generated 2021-06-16 23:01 UTC)