From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Authentication-Results: lists.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=linux.intel.com (client-ip=192.55.52.88; helo=mga01.intel.com; envelope-from=vernon.mauery@linux.intel.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=linux.intel.com Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 495TcF2bQ8zDqPf for ; Tue, 21 Apr 2020 00:29:47 +1000 (AEST) IronPort-SDR: 2cZsjfSTer4q2531x+G/wZ4VOsK0BTG9z3G0Gsc6MPWaMCvxL9LHYR7EAZ8M4mrPhh5UU9YnMj 0vEEt4YhPT5g== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Apr 2020 07:29:44 -0700 IronPort-SDR: +r5M25hEy3/qtbRYlMwBl9WuYVRc4YMbzD8HIRc9xGQGIQK/pr1DQZvQcxe4Q0RPmE8acdO20o exMi84YcqgwA== X-IronPort-AV: E=Sophos;i="5.72,406,1580803200"; d="scan'208";a="289958510" Received: from vmauery-desk.jf.intel.com (HELO mauery.jf.intel.com) ([10.7.150.62]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Apr 2020 07:29:43 -0700 Date: Mon, 20 Apr 2020 07:29:42 -0700 From: Vernon Mauery To: Joel Stanley Cc: Joseph Reynolds , OpenBMC Development , Alexander Amelkin Subject: Re: ipmi password storage Message-ID: <20200420142942.GI9295@mauery.jf.intel.com> References: <20200413230015.GB9295@mauery.jf.intel.com> <20200414155019.GB443018@heinlein.lan.stwcx.xyz> <20200414164610.GC9295@mauery.jf.intel.com> <20200414224248.GF9295@mauery.jf.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Apr 2020 14:29:50 -0000 On 16-Apr-2020 06:04 AM, Joel Stanley wrote: >On Tue, 14 Apr 2020 at 22:43, Vernon Mauery > wrote: >> >> On 14-Apr-2020 05:03 PM, Joseph Reynolds wrote: >> > >> > >> >On 4/14/20 11:46 AM, Vernon Mauery wrote: >> >>On 14-Apr-2020 10:50 AM, Patrick Williams wrote: >> >>>On Mon, Apr 13, 2020 at 04:00:15PM -0700, Vernon Mauery wrote: >> >>> >> >>>Vernon, >> >>> >> >>>Is there some background pointers on why IPMI needs to store passwords >> >>>in a reverable way? I never understood that. >> >> >> >>Sure. I think this is most clearly described in section 13.31 "RMCP+ >> >>Authenticated Key-Exchange Protocol (RAKP)" in the IPMI v2 1.1 spec. >> > >> >This may be a bit naive.... Is it possible to expand the RCMP+ spec >> >with a new cipher suite or similar, to use a mechanism more like HTTPS >> >or SSH that does not require the server to be able to produce a clear >> >text password? Given that IPMI will be used for many years, this >> >seems worthwhile, and would solve the current problem. >> >> While IPMI will not likely be abandoned for many years to come, there >> are not any plans to update the specification. Redfish is supposed to be >> the answer, but like IPv4 was supposed to be supplanted by IPv6 long >> ago, full adoption is still dragging its feet. >> >> That being said, I am not opposed to creating a new de-facto standard. >> In the name of security, I would not be opposed to using modern crypto >> protocols to establish secure IPMI sessions. This would likely cause the >> adoption of redfish to be even slower, because the biggest detractor of >> IPMI would be fixed. > >This is a great suggestion. Thanks! Here is a design doc I wrote up. https://gerrit.openbmc-project.xyz/c/openbmc/docs/+/31548 --Vernon >> We have the maintainer of ipmitool as a member of the OpenBMC community, >> (Alexander Amelkin) so we could even implement both ends of this new >> de-facto standard. I would suggest a DTLS connection on UDP 623, fully >> replacing RCMP+.