avctpasswd

 code, hack, ipmi, python, security, tech  Comments Off on avctpasswd
Nov 112012
 

Since I didn’t find it anywhere else… Avocent, who makes a heck of a lot of BMCs, and at times (like with Dell’s iDRAC, at least version 6) keeps encrypted passwords in (well, quite possible/probable OEM dependent) “/flash/data0/etc/avctpasswd” (don’t be fooled by the /etc/passwd file) using SHA1 hashed passwords converted into Base64. I surmise this file is used to protect the real passwords that are stored in clear text […]

… passwords in shell scripts….

 code, ipmi, security  Comments Off on … passwords in shell scripts….
Nov 112012
 

Looking at a file (manuf_sign_cert.sh): # This script is run on every iDRAC at manufacturing time. # to create a certificate with a derived CN using the # service tag so it can be authenticated by a provisioning server # for zero touch deployment. # # Files used: # 1) d_h_ssl_manuf.cnf # 2) ROOTCAPK.PEM (loaded by mdiags via dynamic partition) […] ENCRYPTED_CA_PRIV_KEY=”/tmp/MFGDRV/ROOTCAPK.PEM” […] #decrypt the signing key if ! […]

 Posted by at 4:58 pm on November 11, 2012