Category: embedded
-
Get Device ID (moar IPMI… yawn….)
I’d had this sitting around for awhile and thought I’d take another look at it; in this I simply toss out an IPMI Get Device ID command and see what happens. This is an interesting one; the GUID is a Vendor Specific ID – the specification says that it’s “a unique number per device”, and that…
-
mega mega mega… chan chan chan….
Or… Notes on the IPMI Protocol Security Model. I wrote in Sold Down the River about the curious aspects of channels and authentication and users and all that stuff. Here’s a slimmed down model… and as a bonus a program that iterates through all the channels, users types, and authentication for a host, which is…
-
Even more IPMI, woohoo!
I wrote a small paper surveying the scene of IPMI in the wild – Sold Down the River – the title of which might give you some clue as to make on the situation. Used to be folks used guns to rob us… computers make everything so much easier!
-
more IPMI than you can shake a stick at….
I’ve long wanted a Get Channel Cipher Suite command w/o authentication, so I wrote a script to do so; those interested can get it here: https://github.com/zenfish/ipmi/blob/master/ipmi-get-ciphers.py Actually none of the various ipmi tools seem to have this option; I’ve found it useful to use when looking at systems; it emits output similar (if not identical)…
-
Booting a dell server from a remote ISO image
This is in various scripts and snippets, but I didn’t see it simply by itself…. People sometimes ask me how to reboot a server and boot it off a remote image via the BMC. Dell’s BMC (that little chip that runs IPMI and other things) can speak DMTF/WSMAN/etc/etc, like just about all the servers in…
-
dump supermicro stuff
A trivial utility to dump password/account information from a special file found on a SM BMC (see this R7 post about the PSBlock file.) (Later edit – put a new version on github that fixes a bug) #!/usr/bin/env python # usage: $0 file # # (try to) Dump out passwords/accounts from a SM binary file;…