Tag Archive for BMC

Detroit M&A Action

Detroit M&A ActionThe tech world is in a consolidation frenzy – mergers and acquisitions have reached a record level. Two iconic Detroit-based tech firms have been swept up in the M&A action. Dan Gilbert’s Rocket Fiber and Compuware have been involved in M&A.

Rocket Fiber logoRocket Fiber, an internet service provider based in Detroit and owned by Dan Gilbert, has been sold to Everstream. The Cleveland company announced it would be acquiring Rocket Fiber, in an effort to expand its network of over 13,000 route miles into the Detroit market. Everstream already operates in parts of Michigan, including Lansing and Grand Rapids.

The Rocket Fiber acquisition includes:

  • 41 route miles of fiber network in greater downtown Detroit.
  • Two offices in downtown Detroit, including more than 75 team members.
  • All Rocket Fiber clients will continue to receive all services without disruption.
  • Direct connection to Everstream’s existing fiber network infrastructure in Michigan and its other Midwest markets.

Motown M&A ActionWhen Rocket Fiber was founded in 2014 by Marc Hudson, Randy Foster, and Edi Demaj, access to fiber-based infrastructure was extremely limited in Michigan and non-existent in Detroit.

Rocket Fiber’s goal was to offer faster and more reliable internet solutions in the city. In 2015 they secured funding from Dan Gilbert – who shared their goal of providing Detroiters and Detroit businesses with dependable, unrestrained connectivity and helpful, authentic client service for the community – and began to install miles of brand-new fiber-optic cable throughout the city.

Rocket Fiber provides gigabit-speed internet to some of the city’s most highly trafficked spaces including Ford Field – home of the Detroit Lions, Greektown Casino-Hotel, the QLine, and the home of the North American International Auto ShowTCF Center (formerly COBO). Marc Hudson, CEO, and Co-Founder, Rocket Fiber said for the presser:

What began six years ago as a moonshot idea to leapfrog Detroit’s technology infrastructure has come full circle as we’ve matured into a rapidly growing and profitable business. By joining Everstream, our customers have access to the same incredible client service along with the added benefit of Everstream’s much larger Midwest footprint.

Compuware logoCompuware, one of Detroit’s original tech firms which provides mainframe application development, delivery, and support is being acquired. BMC, a KKR portfolio company and a provider of IT solutions for digital enterprises announced its intention to acquire Compuware from Thoma Bravo company.

This is BMC’s third acquisition in less than two years. It is expected to be one of the largest. BMC states it continues to focus on investing in innovative and disruptive technologies. The financial details of the transaction were not disclosed.

Compuware customers include Amtrak, Cigna, and Neiman Marcus. BMC has the third-largest mainframe business behind CA Technologies and IBM. Thoma Bravo acquired Compuware in December 2014 in a $2.4-billion leveraged buyout. Compuware was once the largest tech company in Michigan. The company had as many as 15,000 employees around the globe at its 2000 peak. Between 500 and 1,000 employees are believed to work there now.

BMC and Compuware declined to comment when the Detroit Free Press asked if the company plans any layoffs or relocations of Compuware employees. The representative also didn’t comment on whether the deal will add a significant debt load to Compuware, which often happens to the acquisition targets of private equity deals.

Compuware was founded in 1973 and relocated from Farmington Hills to downtown Detroit in 2003. The firm was the first major business to move from the suburbs to downtown Detroit in the 2000s. Compuware constructed its Detroit headquarters building near Campus Martius at a cost of $350 million, which was far more than what the building sold for a decade later.

mergers and acquisitionsBMC states the combination of BMC and Compuware will build upon the BMC Automated Mainframe Intelligence (AMI) and the Topaz suite, ISPW technology, and product portfolios from Compuware to further modernize the mainframe industry. Compuware CEO Chris O’Malley says,

Without a doubt, a combined BMC and Compuware is the best, brightest, and most collaborative partner for a new generation of mainframe stewards.

rb-

This is the sad part about most successful companies – they grow up and move on. But sometimes leaders stick around. Peter Karmanos is a pioneer in Detroit tech. He founded Compuware in 1975.

Barbara Ann Karmanos Cancer InstituteMr. Karmanos has a new cloud tech venture MadDog Technologies based in metro Detroit. He donated $15 million to the Michigan Cancer Foundation, which was renamed the Barbara Ann Karmanos Cancer Institute in memory of his first wife, Barbara Ann Karmanos which located in Detroit.

Dan Gilbert, who was born in Detroit and still lives in the area founded Rock Financial in 1985. Rock Financial grew into one of the largest independent mortgage lenders in the U.S. In the late 1990s, the firm pivoted to a web-first firm and became Quicken Loans. By 2018, Quicken Loans had become the largest retail mortgage lender by volume in the U.S. while staying in Detroit.

Quicken Loans moved its headquarters and 1,700 staff to downtown Detroit in August 2010, where Mr. Gilbert’s firms leading a revitalization of Detroit’s urban core. Gilbert-owned businesses employ more than 17,000 people in the city. Since 2011, Mr. Gilbert’s Bedrock Detroit has purchased 100 properties totaling over 18 million square feet in Detroit.

Detroit Center for InnovationMr. Gilbert is partnering with the University of Michigan to build a high-tech research campus at the eastern edge of downtown Detroit. The anchor building will the $300-million, 190,000-square-foot – Detroit Center for Innovation on Gratiot Avenue.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

More Server Admin Passwords Exposed

More Server Admin Passwords ExposedI just wrote about the hole in IPMI and now researchers are reporting more problems. Help Net Security writes that over 30,000 servers with the Super Micro WPCM450 line of chips on their motherboards have baseboard management controllers (BMCs) that offer up administrator passwords to anyone who knows where to look. Zachary Wikholm, a senior security engineer with the Security Incident Response Team of hosting provider CARI.net warns that BMC’s which collect information on the health of the hardware and software data do not protect this critical information, Mr. Wikholm wrote;

critical files can be accessedYou can quite literally download the BMC password file from any UPnP-enabled Super Micro motherboard running IPMI on a public interface

The article explains this confidential information is available because Super Micro created the password file in plain text. The file can be downloaded by simply connecting to port 49152. The researcher added that many more critical files can be accessed by the public;

All the contents of the /nv/ directory are accessible via browser including the server.pem file, the wsman admin password and the netconfig files

Help Net Security confirms that Super Micro no longer uses the WPCM450 chips. But a scan of the Internet using Shodan, a specialized search engine for finding embedded systems, indicated 31,964 affected systems were online. The company has also offered up a fix, to this vulnerability which requires administrators to re-flash their systems with the new IPMI BIOS. This workaround is not available to all servers, especially in 24×7 shops.

Patch your systemsMr. Wikholm has stepped in and has devised a temporary fix for those who don’t want to risk re-flashing the server IPMI BIOS. The fix centers around killing UPnP processes on the BMC. The drawback of the fix is that it lasts only as long as the system isn’t disconnected or rebooted.

The existence and the exploitation potential of the flaw was confirmed by SANS ISC handler Tony Carothers: “One of our team has tested this vulnerability, and it works like a champ, so let’s add another log to the fire and spread the good word.”

rb-

Fortunately Super Micro no longer sells this chipset, but there are still over 30K of these time-bombs out there waiting to explode on some poor sysadmin. Hopefully checking out the IPMI BMC is now part of a standard device hardening policy. if not, it should be.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Server Management Security Hole

Server Management Security HoleDan Farmer, security researcher and creator of the SATAN vulnerability scanner, teamed up with HD Moore, chief research officer at Rapid7 and lead architect of the Metasploit penetration testing framework found 230,000 publicly accessible Out-Of-Band management interfaces on the Internet. Many of these systems were running software that dates back to 2001.

Out-Of-Band server management

Out-Of-Band (OOB) managementAccording to PCWorld, the Out-Of-Band (OOB) management interfaces expose servers to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration functions. These microcontrollers are called Baseboard Management Controllers (BMCs). BMC’s are part of the Intelligent Platform Management Interface (IPMI), a standardized interface made up of a variety of sensors and controllers that allow administrators to manage servers remotely when they’re shut down or unresponsive, but are still connected to the power supply.

BMCs are embedded systems that have their own firmware—usually based on Linux. It’s an OS-agnostic and pervasive protocol. Initially developed by Intel (INTC), Dell (DELL), HP (HPQ), and other large equipment manufacturers. It was designed to help manage OOB or Lights-Out communication.

Rebranded by OEM manufacturers

Lights-Out communicationPure IPMI is usually implemented as a network service that runs on UDP port 623. It can either piggyback on the server’s network port or may use a dedicated Ethernet port. Vendors take IPMI as a base and add on a variety of services like mail, SNMP, and Web GUIs, and then rebrand the new package:

  • Dell has iDRAC,
  • Hewlett Packard iLO,
  • IBM (IBM) IMM2

It’s also used as the engine for higher-level protocols. Some of the protocols are put out by the DMTF (WBEM, CIM, etc.) the OpenStack Foundation, and others. IPMI is particularly popular for large-scale provisioning, roll-outs, remote troubleshooting, and console access according to the research paper.

Parasitic oversight

complete control and oversight on of the serverThe parasitic BMC has near-complete control and oversight of the server it rides upon. It can control the server’s including its memory, networking, and storage media. It can not be truly turned off. Instead, it runs continuously unless the power cord is completely pulled. An owner may only temporarily disable outside interaction unless you take a hammer to the motherboard.

Security researchers have warned in the past that most IPMI implementations suffer from architectural insecurities and other vulnerabilities/ These can be exploited to gain administrative access to BMCs. If attackers control the BMC they can mount attacks against the server’s OS as well as other servers from the same management group.

Dan Farmer stated in his recent paper Sold Down the River (PDF).

For over a decade major server manufacturers have harmed their customers by shipping servers that are vulnerable by default, with a management protocol that is insecure by design, and with little to no documentation about how to make things better … These vendors have not only gone out of their way to make their offerings difficult to understand or audit but also neglected to supply any substantial defense tools or helpful security controls.

Old BMC software

Remote managementMr. Farmer and Mr. Moore ran scans on the Internet in May 2014 and identified 230,000 publicly accessible BMCs. A deeper analysis of the at-risk systems revealed:

  • 46.8% of them were running IPMI version 1.5, which dates back to 2001,
  • 53.2% were running IPMI version 2.0, which was released in 2004.

The researchers reported that nearly all the systems running IPMI v1.5 were configured so that all accounts could be logged into without authentication. … you can login to pretty much any older IPMI system without an account or a password.” Mr. Farmer explains this set-up can grant an attacker privileged access, “… in most cases, they grant administrative access, and even when they don’t the mere ability to execute any kind of commands without authentication is a bad thing.

architectural insecurities that can be exploitedThe team found that IPMI v.2.0, which includes cryptographic protection has its own security issues. For example, the first cipher option, known as cipher zero, provides no authentication, integrity, or confidentiality protection, Farmer said. A valid user name is required for logging in, without a password. The researcher found that around 60% of the publicly accessible BMCs running IPMI version 2 had this vulnerability.

Server management issues in IPMI 2.0

Another serious issue introduced by IPMI 2.0 stems from its RAKP key-exchange protocol that’s used when negotiating secure connections. The protocol allows an anonymous user to obtain password hashes associated with any accounts on the BMC, as long as the account names are known.

“This is an astonishingly bad design, because it allows an attacker to grab your password’s hash and do offline password cracking with as many resources as desired to throw at the problem,” Farmer said.

The analysis showed that 83% of the identified BMCs were vulnerable to this issue. A test with brute-force password guessing application John the Ripper, using a modest 4.7 million-word dictionary successfully cracked 30% of the BMC passwords. Farmer calculated that between 72.8 and 92.5% depending on password cracking success rate, of BMCs running IPMI 2.0 had authentication issues and were vulnerable to unauthorized access.

Canary in the coal mine

While a quarter of a million BMCs is only a tiny sliver of the total computing power in the world, it’s still an important indicator as a kind of canary in the coal mine,” Mr. Farmer warns. He predicts that BMCs behind corporate firewalls share the same issues. He said. “While management systems are often not directly assailable from the outside they’re often left open once the outer thin hard candy shell of an organization is breached.

The research paper includes recommendations for server administrators on how to mitigate some of the identified issues and better secure their BMCs. But the researcher concludes that ultimately the problem of insecure IPMI implementations will linger on for a long time. Mr. Farmer concludes with a rant:

Many of these problems would have been easy to fix if the IPMI protocol had undergone a serious security review or if the developers of modern BMCs had spent a little more effort in hardening their products and giving their customers the tools to secure their servers … At this point, it is far too late to effect meaningful change. The sheer number of servers that include a vulnerable BMC will guarantee that IPMI vulnerabilities and insecure configurations will continue to be a problem for years to come.

rb-
They told us so, about a year ago.

Defense-in-depth, block UDP port 623 at the perimeter – yes all of them, on the end-points, you are using personal firewalls?

Disable or remove the default vendor user names and pick a strong UID and PWD

Least privilege, the researchers warn that anyone who has administrative privileges on a BMC’s server has administrative control over it and may disable or enable IPMI, add or remove accounts, change the IP address, etc., etc.–all without any authentication to the BMC.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.