Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
HP Security United States

HP Keeps Installing Secret Backdoors In Enterprise Storage 193

Nerval's Lobster writes "For the second time in a month, Hewlett-Packard has been forced to admit it built secret backdoors into its enterprise storage products. The admission, in a security bulletin posted July 9, confirms reports from the blogger Technion, who flagged the security issue in HP's StoreOnce systems in June, before finding more backdoors in other HP storage and SAN products. The most recent statement from HP, following another warning from Technion, admitted that 'all HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer.' While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rules—not a limitation built in to limit use of backdoors. The entry points consist of a hidden administrator account with root access to StoreVirtual systems and software, and a separate copy of the LeftHand OS, the software that runs HP's StoreVirtual and HP P4000 products. Even with root access, the secret admin account does not give support techs or hackers access to data stored on the HP machines, according to the company. But it does provide enough access and control over the hardware in a storage cluster to reboot specific nodes, which would 'cripple the cluster,' according to information provided to The Register by an unnamed source. The account also provides access to a factory-reset control that would allow intruders to destroy much of the data and configurations of a network of HP storage products. And it's not hard to find: 'Open up your favourite SSH client, key in the IP of an HP D2D unit. Enter in yourself the username HPSupport, and the password which has a SHA1 of 78a7ecf065324604540ad3c41c3bb8fe1d084c50. Say hello to an administrative account you didn't know existed,' according to Technion, who claims to have attempted to notify HP for weeks with no result before deciding to go public."
This discussion has been archived. No new comments can be posted.

HP Keeps Installing Secret Backdoors In Enterprise Storage

Comments Filter:
  • by Anonymous Coward on Thursday July 11, 2013 @10:15PM (#44257659)

    Years ago I worked on HP3000 servers and there was an hpsupport user on those systems as well. But on the 3000 series it was documented and every sysadmin was aware of it and could change the password if desired. Looks like HP still cares about customer service, but no longer cares about ethics. Sad. They were once a really great company.

  • Re:badg3r5 (Score:5, Informative)

    by Anonymous Coward on Thursday July 11, 2013 @10:16PM (#44257665)

    Rainbow Tables: enabling ontopic first posts since 2013.

  • by girlintraining ( 1395911 ) on Thursday July 11, 2013 @10:27PM (#44257741)

    The password you're looking for is badg3r5. So there. Go forth, my minions! In other news, Slashdot's corporate overlords apparently no longer believe in full disclosure, as it had in the past, and now omit critical information probably because their lawyers have more say in the editorial process than the submitter, editors, or anyone with a clue to spare. :(

  • Customers Demand It (Score:5, Informative)

    by Anonymous Coward on Thursday July 11, 2013 @10:27PM (#44257745)

    I work for a large networking appliance company. We know these backdoors are a bad idea from a security standpoint. The problem is, customers demand them. They call up and want something fixed--or a customization or diagnosis or whatever--and many times the only way to resolve the issue is to access the box. Most times it's a configuration problem on their end, but often the quickest way to figure this out is to access the internal databases.

    On our appliances our backdoors are completely optional--if you disable it, support is completely unable to access the box, period (I know because I helped to write it). But you wouldn't believe how irate customers become when you tell them that you can't help them, even though they're the ones who _chose_ to disable the support access, and clicked through all the warnings.

    Could these backdoors be made more secure? Absolutely. But developing, say, a storage appliance and developing a secure remote access protocol (both in terms of software as well as access control) are worlds apart. SSH and SSL are just tiny elements in an overall solution.

    I'm not one to argue that convenience and security are necessarily opposed. But it is incredibly hard to find the small set of solutions that provide both maximum convenience and maximum security. And even if you've found a solution in that set, it's incredibly hard to prevent it from degrading over time as developers come and go, introducing bugs as they add and fix features.

  • Re:Eh? (Score:5, Informative)

    by girlintraining ( 1395911 ) on Thursday July 11, 2013 @10:29PM (#44257753)

    If so, please synopsize in non-sensationalist terms.

    Non-bullshit, redacted by lawyers version:

    Anyone with access to the NAS over the network and an SSH client can enter a username and password, gain elevated privileges to the cluster, and while not allowing access to the data directly from that interface, access can disable the cluster or delete all the data within it, as well as wiping out partition information, etc.

  • by Anonymous Coward on Thursday July 11, 2013 @10:45PM (#44257863)

    The earlier article said they can reset user passwords, if they can do that, they can grant themselves access to the data.

    http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/
    " lost admin passwords are resettable by HP. One, from November 2011, states: “You will need to call support and they can get into the backed and reset it for you. 1-800-633-3600 'Lefthand Solutions'”. The other, posted by a LeftHand product manager in 2009, states: “Call support. They can reset the password remotely.”

    So they CAN get access to the data, because they can change the configuration to give themselves access.

  • No not really (Score:5, Informative)

    by Sycraft-fu ( 314770 ) on Thursday July 11, 2013 @11:23PM (#44258085)

    The right answer is a service account they can have activated, if needed. On the EqualLogic (Dell) we have that is how it is done. When they need to work on the system, they have you connect to a WebEx session. They then request control of the PC. They have you log in to the system using your admin account, and they can then set the password on an "fse" account, which they can use to access service functions you aren't supposed to get at. Once they are done, they encourage you to change the fse account to a different password.

    That is how it is properly done: They get in using your system, with you monitoring what they do, and you lock out access after they are done.

    Now maybe they are going to have access all the time for proactive monitoring. Fine, that is a service some like (we may take Dell up on it if they start offering it). Again the right method is an account set up by the customer, not one hardcoded in. Why? Well because of shit like this. If it is hardcoded in, and you can't change it, then if someone discovers the access, it is bad times.

    For that matter I've never seen this on Cisco stuff either. The recovery for that is via serial, I've never seen a remote override from Cisco. Maybe it is there, but I've never seen them use it.

  • Re:Eh? (Score:5, Informative)

    by Charliemopps ( 1157495 ) on Thursday July 11, 2013 @11:27PM (#44258107)

    I doubt it. We've got some software like this, and while we were having trouble one day and I was on the phone with their support (who was about as skilled as your local broadband support tech) proceeded to log into our equipment, duplicated my administrator account, log in as me, and start making changes. The log even reported the changes as being done by me. When I realized what was going on I started yelling into the phone "What the fuck do you think you're doing? Holy fucking shit?!?!" The tech on the other end was rather surprised I was upset "Excuse me?" he asked... "How did you just do all that?!?! This is on OUR servers, behind OUR firewall!!! You're under contract with us, none of this should be possible! physically, or legally!" all he said was "Well they don't let me see the contracts. I just click this "Clone account" button and there we go..."

    I reported the whole thing to our security director. It ended up in the lawyers lap. Their software basically just tunneled its way out of our network. There were other reasons their software needed to connect to them so they just used the same port to allow their support techs to have basically more access than I, the senior administrator had. Now, instead of having a secure product, we have an unsecured product and the only thing protecting us from them is a "more specific" contract that, again, their techs have no access to read. Also, given the regulations we're under, that tech was violating federal law without even knowing it.

    Don't trust your vendors. My management has, after this and several other incidents, come to the conclusion that these sorts of products are more trouble than they're worth. In the near future we'll be building it all in-house and dropping vendors like this. Some stuff, like oracle and microsoft, will be hard to dump. But I bet that given enough time even they will be gone and we'll be on something open source.

  • by macbeth66 ( 204889 ) on Thursday July 11, 2013 @11:36PM (#44258165)

    Actually, through to the early 80's. Hewlitt and Packard, the men, had a true sense of worth of their employees and treated them with respect. That was pretty much gone as the 80's rolled on. Packard was a changed man from his stint(s) in Washington. Then, of course, by the time Patricia Dunn was in charge, the company was a toilet. Pretexting, anyone? Yeah, sad.

  • Re:Eh? (Score:5, Informative)

    by AdamWill ( 604569 ) on Thursday July 11, 2013 @11:55PM (#44258249) Homepage

    The thing you're missing is this part:

    "While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rules - not a limitation built in to limit use of backdoors."

    i.e. there is not actually any kind of technical restriction on the use of the backdoor, there is no actual customer control over it. When they say 'we can only use it with the customer's permission' what they mean is 'we told our reps only to use it with the customer's permission and we hope they do what we say, and no-one else finds it, so now...oops'.

  • Re:Eh? (Score:4, Informative)

    by mysidia ( 191772 ) on Friday July 12, 2013 @12:00AM (#44258271)

    I grok this to mean that a backdoor exists for customer service, which can be activated by a customer (by two factors: permission and network access), and that without action on the part of the customer, said backdoor is closed.

    The requirement for permission is sociological and based on adherence to company procedures and policies of HP.

    If HP had chosen to require physical manipulation of the storage device, collecting a serial number or code printed ONLY on the device, or another method of OPT-IN selection by the storage admin, then I am sure there would be no complaint.

    The problem is some HP support employees have access to a God code that grants administrative access to any piece of gear, and it's the same for all customer units, AND probably the code continues to work, even if some customer service employees are terminated, that might know the code.

    It's poor security against insider abuse, regardless.

  • The LeftHand Path (Score:5, Informative)

    by gishzida ( 591028 ) <gishzida@gELIOTmail.com minus poet> on Friday July 12, 2013 @05:06AM (#44259355) Journal

    Actually for those that administer these systems this is old news...

    I worked for a financial institution that had two four node clusters of storage products [one was SATA based and the other SAS based] which were developed by LeftHand Networks which ran on HP storage servers [DL320s] and Dell hardware as well. Shortly after we installed the clusters, HP bought LeftHand... and the LeftHand OS [then called SAN i/Q] became an HP only product [they dropped support for other hardware]. at that time (2008) this support back door already existed... I had occasion to allow a LeftHand support engineer access to a node which had taken itself off line... and the only way to bring it back was the command line backdoor -- It was part of the LeftHand OS / Cluster Administration software... LeftHand OS is a actually Linux with some custom cluster control / management software.

    The real issue of this account is that it allows a third party access to an interface that the owner of the hardware cannot access-- yep, that is right LeftHand did not trust its clients with access to the command line on their storage server products... you were buying a very complex "Storage Appliance" which *required* a support contract... they were designed as a RAID 5 Cluster. Each Node was set up as a RAID 50 array and then the nodes were then clustered as Raid 5... you could lose a lot of drives and still have a cluster which at the time was something unique on the market

    On the other had (the left one?) the Support Engineers at LeftHand were extremely knowledgeable of their products [It was then a start up and at least in part employee owned] and they were actually concerned and responsive to the needs of their customers... I was sad that the senior Support folks cashed out and moved on when HP bought them...

    When HP took over that all went out the window... by 2009 the front end of the support operation went to Mexico and if you really did need a support engineer they would have the engineer call you [previously the Support number was a direct line to the support engineers]

    Now my recollection was the reason that HP bought them was that LeftHand had a product that was better than HP's offerings at the time... so it should not be surprising that the LeftHand code base evolved / moved into other products...

    The bottom line is that the only way to get access to the command line of a LeftHand node required either SSH access or a modem connection. As an administrator, giving network access to black hats by failing to block access SSH access to sensitive systems from unknown IP space just shows you are an idiot. While I understood the reason for the back door my only real fear of it was that some HP trainee engineer would wipe a cluster and take down the vSphere cluster that the storage cluster supported. The fact that my boss did not know the password made the system safe... since my boss knew nothing about server systems or networks...

  • Re:Consequences? (Score:5, Informative)

    by greg1104 ( 461138 ) <gsmith@gregsmith.com> on Friday July 12, 2013 @05:59AM (#44259511) Homepage

    You've got it backwards. The computer abuse laws are for jailing the evil hackers who published the information.

  • Re:The LeftHand Path (Score:5, Informative)

    by MrNemesis ( 587188 ) on Friday July 12, 2013 @07:26AM (#44259753) Homepage Journal

    Was about to say the same thing here as well; we had some of the G1 LeftHand units foisted upon us as a "cheap" SAN solution about three years ago, very soon after the HP buyout you mentioned.

      It was probably more likely due to the fact that the salesman over-promised, the company under-spent (seriously, they expected 1Gb NICs to be fast enough to feed over 300 VMs) and the HP techs set them up wrongly (the same RAID50 setup you describe), but we had endless problems with them - performance was predictably rubbish but a single disc failure kept causing the node to reboot. Anyway, because of the continual problems with the LH, we basically had an HP tech dialling into the nodes at least once a week to firefight the issue du jour, simply because certain node failures could only be remedied this way for some inexplicable reason. HP refused to let us know the backdoor, so one of the network team installed a keylogger on the box they dialled into via WebEx to activate the backdoor which captured teh badgers as it went in. So eventually we were able to fix our nodes much quicker, but it was annoying as hell and a cynical person might say the "backdoor admin" mode was only there to justify support contracts. If I was the kind of person to work in LH's marketing department I would have spun this backdoor as a "Cloud-based administrative control and recovery system" because it was slow, overpriced and unreliable.

    Eventually we got a new head of ops who wasn't as much of a yes-man to the director (who by this point was being hauled over the coals for the shitty performance and reliability of his much-vaunted SAN solution) and HP recanted and bought back the LH and sold us a 3par instead (of which performance, support and reliability have been exemplary), and the fact that HP had basically bullied us into a position of "we're going to backdoor you literally and figuratively" was a big factor in negotiating ourselves a good price.

    Based on my experience, I'd avoid anything to do with the LeftHand forever more, the whole support infrastructure was just the putrid icing on top of a very shitty cake.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...