Dobrica Pavlinušić's random unstructured stuff
Dell RAC: Revision 24
Dell's documentationI will try to collect useful protocol information about Dell's (actually ""<>) RAC protocol My main goal is to use Dell RAC from Linux, without all troubles described in my blog post HardwareAccording to Exploring the DRAC5:
Proprietary ports
Supported SSL Cipher SuitesDRAC 5 supports SSL version 3 and TLS version 1.0. The following are ciphers supported on DRAC 5:
IPMI RMCP+ EncryptionDRAC 5 IPMI over LAN and SOL use RMCP+ for Authentication and Key exchange. For details on the RMCP+ protocol, see the IPMI 2.0 specification. DRAC 5 IPMI supports the following encryption algorithms:
Console Redirection SecurityAuthentication and EncryptionDRAC 5 can continuously redirect the managed system's video, keyboard and mouse (KVM) to the management station. It is a very powerful feature, is very easy to use, and does not require any software installation on the managed system. A user can access this feature to remotely manage the system as if they were sitting in front of the system. A security authentication and encryption protocol has been implemented in console redirection to prevent a hostile, rogue client from breaking into the console redirect path without authenticating though the web server. 128-bit SSL encryption secures the keyboard keystrokes during the remote console redirection and therefore does not allow unauthorized "snooping" of the network traffic. The following sequence of security protocol operations is performed during the establishment of a console redirection session:
Video redirectionroot@klin:~# ssldump -r /tmp/rac_t1.pcap New TCP connection #1: klin.local(52028) <-> 10.60.0.102(5900) 1 1 0.0148 (0.0148) C>S Handshake ClientHello Version 3.0 cipher suites SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_DES_CBC_SHA compression methods NULL 1 2 0.0165 (0.0016) S>C Handshake ServerHello Version 3.0 session_id[0]= cipherSuite SSL_RSA_WITH_RC4_128_MD5 compressionMethod NULL SSL man in the middleFirst, we need a really old distribution to support cipher suites. http://www.debian.org/distrib/archive openssl versions:
sudo debootstrap --arch i386 woody woody http://archive.debian.org/debian-archive/debian sudo chroot woody # /etc/apt/sources.list deb http://archive.debian.org/debian-archive/debian potato main non-free contrib deb http://archive.debian.org/debian-non-US/ potato/non-US main contrib non-free apt-get install stunnel openssl req -new -x509 -days 365 -nodes -out cert.pem -keyout cert.pem # https mitm stunnel -p cert.pem -d 443 -r 5443 stunnel -c -d 5443 -r 10.60.0.100:443 # 5900 mitm stunnel -p cert.pem -d 5900 -r 5999 stunnel -c -d 5999 -r 10.60.0.100:5900 Check ssl connection ssldump -i eth0 'port 5900' -A -N Following is bad 2 2 0.0489 (0.0000) S>CV3.0(2) Alert level fatal value handshake_failure Dump unencrypted communication sudo tshark -w /tmp/5900-plain.pcap 'port 5999' 5900 and 5901 traffic with two keystrokes: Dump all traffic:
sudo tshark -w /tmp/590x-3.pcap -i any 'port 5999 or port 5901 or port 5443' # create client certificate openssl req -new -x509 -days 365 -nodes -out ssl.cert -keyout ssl.key root@opr:~/rac-ssl# ./mitm-ssl.pl --lport 5900 --laddr 10.60.0.91 --rport 5900 --raddr 10.60.0.100 --serverkey ssl.key --servercert ssl.cert root@opr:~/rac-ssl# ./mitm-ssl.pl --lport 443 --laddr 10.60.0.91 --rport 443 --raddr 10.60.0.100 --serverkey ssl.key --servercert ssl.cert Keyboard redirection protocol 5900mouse# top-left x y 42454546 02010010 0000 000c 0008 0000 # bottom-right 42454546 02010010 0000 0282 0383 0000 # mouse click in the middle of screen 42454546 02010010 0001 018a 0147 0000 keyboard# a b c d ... down C>S 42454546 02000010 00010004 00000000 C>S 42454546 02000010 00000005 00000000 C>S 42454546 02000010 00010005 00000000 C>S 42454546 02000010 00000006 00000000 C>S 42454546 02000010 00010006 00000000 C>S 42454546 02000010 00000007 00000000 C>S 42454546 02000010 00010007 00000000 Virtual media 3668sudo tshark -w /tmp/drac-vmedia.pcap -i any 'port 5443 or port 3668' |