Feeds

Hey, big spender. Are you as secure as a whitebox vendor?

The Internet of Stuff is a HUGE LIABILITY

Security for virtualized datacentres

Sysadmin blog Security flaws are a great source of inter-company marketing FUD, but it is how a company responds to them that determines how trustworthy they are. Can you bet your business – or your personal data – on a company that simply brushes flaws under a rug? Where does the vendor's responsibility end and that of the customer begin?

As the "internet of things" becomes the new reality there are an increasing number of "unmanaged" computers connected to the internet. These range from home automation, to Google's Nest, to a diverse array of industrial sensors – and even the baseband management controllers that provide lights out management for our servers.

This last is an important canary for the problems the Internet of Things will present. A BMC is a computer in its own right. These small embedded computers allow administrators to remotely access the larger, more powerful servers they serve at a level "below" the operating system. This allows administrators to remotely update the larger server's BIOS, change firmware settings or install operating systems.

BMCs typically adhere to the IPMI standard, often with unique twists, features or functionality depending on the manufacturer. They go by different names, depending on the manufacturer: HP calls their implementation ILIO; Dell has DRAC; Supermicro simply uses IPMI.

BMCs blur the lines between managed and unmanaged computers. The servers that the BMCs are designed to augment are typically actively maintained. Unfortunately, while the server operating systems and applications often receive regular patching, security scans and so forth, the BMCs are all too often neglected.

Vulnerabilities and how you handle them

The most basic response that any company provide is to issue patches for known issues. A security researcher detects and issue, raises it with the company in question and – in a perfect world – that company creates a patch and releases it for customers to install.

This doesn't always happen. There are innumerable vulnerable home routers still in service that will never see patches. These serve as examples of just how lax many companies are about these sorts of issues.

Supermicro has recently been in the news regarding security vulnerabilities in their BMC implementations. They are by no means the only company to have BMCs with security vulnerabilities, but their response to the issue is worthy of deeper consideration.

Fortunately, unlike many of the companies cranking out home routers, Supermicro do issue patches. What makes them worthy of interest is that instead of holding to this basic reactionary stance, Supermicro chooses to go that little bit beyond.

According to Zachary Wikholm, senior security engineer for Cari.net, the Security Incident Response Team (CARISIRT) has been cooperative. When asked about specific BMC security issues, they don't simply provide some pre-canned marketing statements, but help researchers dig into other issues, even when they know that information about those security problems will be published.

I had a chance to talk to Arun Kalluri, senior product manager for Supermicro's Software Solutions division, and asked some hard questions in the hopes of getting a better idea of Supermicro's approach to security. Considering that Supermicro is often portrayed as "nothing more than a whitebox vendor", I wanted to dig into what Supermicro could – and is – doing that goes beyond simply reacting. How companies choose to respond to these issues is always of great interest to me.

Supermicro competitors HP, Dell, IBM and so forth all have massive R&D departments. Their resources vastly outstrip anything Supermicro can bring to bear. Acknowledging this, it appears that Supermicro's approach is to forgo the typical vendor secrecy and reach out to both the security community and the academic research community.

Internet Security Threat Report 2014

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Desktop Linux users beware: the boss thinks you need to be managed
VMware reveals VDI for Linux desktops plan, plus China lab to do the development
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.