From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=jrey@linux.ibm.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=linux.ibm.com Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 47Y7XR1nDKzDqB0 for ; Thu, 12 Dec 2019 07:17:58 +1100 (AEDT) Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xBBKGhTV065682; Wed, 11 Dec 2019 15:17:54 -0500 Received: from ppma01dal.us.ibm.com (83.d6.3fa9.ip4.static.sl-reverse.com [169.63.214.131]) by mx0a-001b2d01.pphosted.com with ESMTP id 2wsm2g06fr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 11 Dec 2019 15:17:54 -0500 Received: from pps.filterd (ppma01dal.us.ibm.com [127.0.0.1]) by ppma01dal.us.ibm.com (8.16.0.27/8.16.0.27) with SMTP id xBBKEsWn020092; Wed, 11 Dec 2019 20:17:53 GMT Received: from b01cxnp22033.gho.pok.ibm.com (b01cxnp22033.gho.pok.ibm.com [9.57.198.23]) by ppma01dal.us.ibm.com with ESMTP id 2wr3q7a0df-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 11 Dec 2019 20:17:53 +0000 Received: from b01ledav003.gho.pok.ibm.com (b01ledav003.gho.pok.ibm.com [9.57.199.108]) by b01cxnp22033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id xBBKHq9o39190840 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 11 Dec 2019 20:17:52 GMT Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BE97CB205F; Wed, 11 Dec 2019 20:17:52 +0000 (GMT) Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 8060EB2064; Wed, 11 Dec 2019 20:17:52 +0000 (GMT) Received: from demeter.rchland.ibm.com (unknown [9.85.184.171]) by b01ledav003.gho.pok.ibm.com (Postfix) with ESMTPS; Wed, 11 Dec 2019 20:17:52 +0000 (GMT) Subject: Re: BMC update via TFTP To: Alexander Tereschenko , openbmc@lists.ozlabs.org References: <5747d991-27b7-4bb1-8a25-f46d1de832e1@linux.vnet.ibm.com> <9e0303e5beb34b9bb50b050cd56e35d8@linux.vnet.ibm.com> <20191204213650.GB9613@mauery.jf.intel.com> <94b297b5-81d1-1e07-498f-155a9160cb1d@linux.intel.com> <20191205223708.GC9613@mauery.jf.intel.com> <1c75671d-904e-8a06-07f5-c93fcf0e5e50@linux.intel.com> <3231c302-27a9-3437-849a-767850d12fd0@linux.ibm.com> <6bce621e-0bd0-9739-dce0-0977b983f513@linux.intel.com> From: Joseph Reynolds Message-ID: Date: Wed, 11 Dec 2019 14:17:51 -0600 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: <6bce621e-0bd0-9739-dce0-0977b983f513@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-12-11_06:2019-12-11,2019-12-11 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 mlxlogscore=999 clxscore=1015 bulkscore=0 mlxscore=0 impostorscore=0 adultscore=0 suspectscore=0 lowpriorityscore=0 priorityscore=1501 spamscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1912110168 X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Dec 2019 20:17:59 -0000 On 12/11/19 5:02 AM, Alexander Tereschenko wrote: >>> Yes, that could be a solution for the problem we discuss, providing >>> both integrity and confidentiality, without any major OpenBMC >>> development necessary - but it would mean more operational burden >>> for BMC admins. The problem with SCP/SFTP in this context is that >>> for this to work in the same manner as TFTP, the BMC must be an SSH >>> client - i.e. have some sort of identity/credentials for the >>> SCP/SFTP server provisioned first. That might not be the easiest >>> solution to setup, but it's of course possible and can be automated >>> if OpenBMC provides respective config knobs. >>> >>> Existing ways we have in code-update.md either don't require >>> credentials (TFTP), so being a client is easy, or are not making a >>> "client" from BMC, it's the admin who uploads stuff (SCP/REST). >> >> Yes, that's what I was thinking.  (And no, I am not going to >> recommend setting up a SCP or SFTP server that allows anonymous access.) >> >> This highlight the need for OpenBMC to put together a guide to >> provisioning your BMC.    Such as guide would give us a place to talk >> about uploading to the BMC SSH client certificates needed to access >> and download the firmware images. >> >> - Joseph > > Agree, the provisioning guide could be a good point to have this > discussion. However I beieve updates in general is a broader and more > "operational" (i.e. "continuous" as opposed to provisioning being > rather "one-time") topic, so the approach in the organization/of a > given BMC admin can change and I believe whatever configuration > mechanism we develop for this (if at all), should be available at any > point during BMC lifetime, not only at provisioning, and be > architected respectively. > That makes sense to me.  Thanks!  I'll plan to add an item to both: https://github.com/openbmc/docs/blob/master/security/network-security-considerations.md and to the threat model considerations (in review): https://gerrit.openbmc-project.xyz/c/openbmc/docs/+/22404 - Joseph > > regards, > Alexander > >