Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL Based iKVM #6

Open
syshackmin opened this issue Oct 4, 2018 · 1 comment
Open

SSL Based iKVM #6

syshackmin opened this issue Oct 4, 2018 · 1 comment

Comments

@syshackmin
Copy link

I've been playing with your code and trying to revive this for the SSL forced boards. I've got the SSL auth working, I've got the version 055.008 accepted, but it's getting stuck on authentication.

Quick packet dump shows I send the VNC tunneling capabilities supported message and nothing comes back after that. Port 56356 is novnc, italk is the iKVM. Both 127.0.0.1 as I'm using a stunnel to decrypt SSL.

23 41.919044591 127.0.0.1 -> 127.0.0.1 TCP 66 56356 > italk [ACK] Seq=1 Ack=1 Win=43776 Len=0 TSval=1046347434 TSecr=1046347434
24 41.956127482 127.0.0.1 -> 127.0.0.1 VNC 78 Server protocol version: 055.008
25 41.956142960 127.0.0.1 -> 127.0.0.1 TCP 66 56356 > italk [ACK] Seq=1 Ack=1 Win=342 Len=0 TSval=1046347471 TSecr=1046347471
26 41.981483344 127.0.0.1 -> 127.0.0.1 VNC 78 Client protocol version: 055.008
27 41.981493864 127.0.0.1 -> 127.0.0.1 TCP 66 italk > 56356 [ACK] Seq=1 Ack=13 Win=342 Len=0 TSval=1046347496 TSecr=1046347496
28 41.984064133 127.0.0.1 -> 127.0.0.1 VNC 68 Security types supported
29 42.009929934 127.0.0.1 -> 127.0.0.1 VNC 67 Authentication type selected by client
30 42.013231683 127.0.0.1 -> 127.0.0.1 VNC 90 TightVNC tunneling capabilities supported

Did you ever make any progress on the SSL encrypted boards? Seems these jerks just messed with the VNC version just to screw with us.

@jimdigriz
Copy link

jimdigriz commented Apr 21, 2021

...documenting this as no one seems to have written down this step.

It uses a client certificate and I found details about it at https://www.osso.nl/blog/supermicro-java-console-redirection-kvm/, I should have figured it was packaged up in the IPMIView bundle.

Use socat as a reverse SSL proxy to listen on 127.0.0.1:5901 and connect to your Supermicro system at 192.0.2.1:5900:

socat -d TCP-LISTEN:5901,fork,reuseaddr,bind=127.0.0.1 OPENSSL:192.0.2.1:5900,cert=IPMIView_2.18.0_build.201007_bundleJRE_Linux_x64/BMCSecurity/client.crt,key=IPMIView_2.18.0_build.201007_bundleJRE_Linux_x64/BMCSecurity/client.key,cafile=IPMIView_2.18.0_build.201007_bundleJRE_Linux_x64/BMCSecurity/server.crt,commonname=IPMI

This gets us hooked up, but it disconnects in the VNC protocol (looks like where @syshackmin also got) immediately in response to sending the credentials...at least it is better than during the SSL connection setup.

N.B. over SSL different credentials are used, as details in the linked blog post above you extract them from the launch.jnlp file you can fetch from the management interface when clicking on 'Launch Console'

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants