Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reconfigure BMC to authenticate against a RADIUS Server #57

Open
majst01 opened this issue Nov 20, 2023 · 0 comments
Open

Reconfigure BMC to authenticate against a RADIUS Server #57

majst01 opened this issue Nov 20, 2023 · 0 comments
Labels
enhancement New feature or request

Comments

@majst01
Copy link
Contributor

majst01 commented Nov 20, 2023

Currently a malicious user could remove one of our crucial BMC users with inband IPMI access. This would lead to a machine which will not be manageable by metal-bmc anymore.

We could prevent this if we authenticate the BMC against a RADIUS Server, at least for a user which is used by metal-bmc to manage the server.

All Supermicro BMCs can authenticate against RADIUS, and this configuration can be set via Redfish. We should do this for every BMC in a reconcilation loop. The go-hal library should get the required Interface to Get/Set the Radius authentication.

The RADIUS Server must be reachable in the VLAN 4000, alongside metal-bmc, this could either achieved by deploying a freeradius container on the management server, or metal-bmc acts as radius server as well. This is quite easy see here: https://github.com/layeh/radius#server-example.

The Radius Server endpoint should be presented from both management servers on the same IP address and some sort of loadbalancing, either with ECMP or a haproxy deployment, because the BMC can only have one Radius server defined.

@Gerrit91 Gerrit91 added the enhancement New feature or request label Dec 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants