HP Integrated Lights-Out security
technology brief, 6
th
edition
Abstract.............................................................................................................................................. 3
Introduction......................................................................................................................................... 3
Security assumptions about iLO and its environment................................................................................. 4
Comparing the iLO processor to other service processors ......................................................................... 4
Phlashing ........................................................................................................................................ 4
iLO strengths against common attacks ................................................................................................ 4
Security of the hardware design ............................................................................................................ 5
Management ROM .......................................................................................................................... 6
Firewall logic................................................................................................................................... 7
Memory .......................................................................................................................................... 7
NVRAM—non-volatile data storage.................................................................................................... 7
Network and management ports........................................................................................................ 7
SNP for select ProLiant servers ....................................................................................................... 8
Shared network port with Virtual LAN ............................................................................................. 8
Security techniques used by iLO ............................................................................................................ 9
Authentication and authorization processes for browser access ............................................................. 9
Login process using a local account.............................................................................................. 10
Login process using directory services with HP schema extensions .................................................... 13
Login process using directory services with HP default schema......................................................... 14
Calculating current privileges....................................................................................................... 15
Login process using two-factor authentication................................................................................. 16
Login process for remote console and virtual serial port .................................................................. 18
Single Sign-On (SSO) ................................................................................................................. 20
Authentication and authorization processes for CLI access .................................................................. 23
Encryption..................................................................................................................................... 23
Secure Sockets Layer (SSL)........................................................................................................... 24
AES encryption .......................................................................................................................... 24
Remote console and virtual serial port data encryption.................................................................... 24
Secure Shell encryption ............................................................................................................... 25
Disabling and changing ports.......................................................................................................... 25
Connectivity among iLO, the host server, and the network ...................................................................... 27
Access to iLO by means of the network............................................................................................. 27
Web browser ............................................................................................................................ 27
Telnet, remote console, and virtual serial port ................................................................................ 28
Multi-user Integrated Remote Console (IRC).................................................................................... 28
SSH for the command-line interface .............................................................................................. 28
CPQLOCFG utility ...................................................................................................................... 28
Directory services ....................................................................................................................... 29