Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
HP Security United States

HP Keeps Installing Secret Backdoors In Enterprise Storage 193

Nerval's Lobster writes "For the second time in a month, Hewlett-Packard has been forced to admit it built secret backdoors into its enterprise storage products. The admission, in a security bulletin posted July 9, confirms reports from the blogger Technion, who flagged the security issue in HP's StoreOnce systems in June, before finding more backdoors in other HP storage and SAN products. The most recent statement from HP, following another warning from Technion, admitted that 'all HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer.' While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rules—not a limitation built in to limit use of backdoors. The entry points consist of a hidden administrator account with root access to StoreVirtual systems and software, and a separate copy of the LeftHand OS, the software that runs HP's StoreVirtual and HP P4000 products. Even with root access, the secret admin account does not give support techs or hackers access to data stored on the HP machines, according to the company. But it does provide enough access and control over the hardware in a storage cluster to reboot specific nodes, which would 'cripple the cluster,' according to information provided to The Register by an unnamed source. The account also provides access to a factory-reset control that would allow intruders to destroy much of the data and configurations of a network of HP storage products. And it's not hard to find: 'Open up your favourite SSH client, key in the IP of an HP D2D unit. Enter in yourself the username HPSupport, and the password which has a SHA1 of 78a7ecf065324604540ad3c41c3bb8fe1d084c50. Say hello to an administrative account you didn't know existed,' according to Technion, who claims to have attempted to notify HP for weeks with no result before deciding to go public."
This discussion has been archived. No new comments can be posted.

HP Keeps Installing Secret Backdoors In Enterprise Storage

Comments Filter:
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Thursday July 11, 2013 @09:10PM (#44257621)
    Comment removed based on user account deletion
    • Re:badg3r5 (Score:5, Informative)

      by Anonymous Coward on Thursday July 11, 2013 @09:16PM (#44257665)

      Rainbow Tables: enabling ontopic first posts since 2013.

      • Re:badg3r5 (Score:5, Funny)

        by shentino ( 1139071 ) <shentino@gmail.com> on Thursday July 11, 2013 @10:31PM (#44258127)

        Would you rather deal with Rainbow Tables or Bobby Tables?

      • by mysidia ( 191772 )

        If HP had decided to store their passwords properly, by using Bcrypt or Scrypt with a decently high work factor, we would not be having this discussion... their password could be badg3r5, and it would take at least 5 or 6 hours to crack using a dicitonary search with l33t-speak substitution, so there probably wouldn't be 50+ people having discovered it within a couple days :)

        • Let's face it, it's far more likely to be "HP1234" than anything as complex as l33t-speak.

          • Oh, wait... the SHA1 of "badg3r5" is actually 78a7ecf065324604540ad3c41c3bb8fe1d084c50.

            (mushroom, mushroom)

            • Re:badg3r5 (Score:5, Insightful)

              by webmistressrachel ( 903577 ) on Friday July 12, 2013 @04:43AM (#44259463) Journal

              Oh wait... I thought you were joking!

              The SHA1 of "badg3r5" really is "78a7ecf065324604540ad3c41c3bb8fe1d084c50".

              http://www.sha1-lookup.com/index.php?q=78a7ecf065324604540ad3c41c3bb8fe1d084c50 [sha1-lookup.com]

              HP used "badgers" in leet-speak for an NSA backdoor? Smells like they wanted people to know, to me. Maybe they didn't like what they were supposed to be doing, and stuck their tongue firmly in cheek at the implementation stage? "Screw the NSA - we'll give them a back door if they want it so much - and we'll make it so that researchers find it easily, so our business isn't damaged in the long term ("If we wanted you data so much, we'd have done a better job of hiding it - blame your government")

          • Comment removed based on user account deletion
      • Just out of curiosity, since it's relevant but perhaps well known to most here but me, are rainbow tables capable of mixed letters and numbers and, say, 8 character pw length already widely available and searchable that fast with ordinary hardware? Are all my passwords (for those places still not accepting passphrases, which is most I deal with) that vulnerable once /etc/shadows is accessed?
        • Re:badg3r5 (Score:5, Interesting)

          by Inda ( 580031 ) <slash.20.inda@spamgourmet.com> on Friday July 12, 2013 @04:26AM (#44259403) Journal
          When I played with MD5 rainbow tables, probably 10-15 years ago, it was an interesting experience.

          I signed up to a website and was given a large block of passwords to crunch. I can't remember my block, but it was full of 7 character alpha-numeric passwords. There were some 6 character password blocks left to crunch, but 99% of them were complete.

          My P3 450 crunched them all weekend and beyond. In return, I was given complete access to the MD5 rainbow tables, through some forms on a website.

          It was a near-instant search.

          Assume that your 8 character passwords are fully hashed. All alpha-numeric passwords 7 characters and under were complete back then.

          Asking Google to search for hashes is also fun.
      • by gl4ss ( 559668 )

        Rainbow Tables: enabling ontopic first posts since 2013.

        if it's that then it's the same as the previous.. unless the badgers post was joke then and now.

    • That looks suspiciously like the sort of simple password my ex-boss used to insist we use for things like Domain administrator accounts on Windows. He was an HP-UX admin at one point - does HP offer a free "find a crappy password" tool?

    • Woo, go badgers! By the way, I'm fairly certain they have little to no presence in Wisconsin. I'm an IT manager in WI and the closest HP support and sales agent is in Illinois or something like that. The password was either randomly generated, related to the meme video, or some other strange source.
    • by Mal-2 ( 675116 )

      They need to get a snake grip on this before it mushrooms.

  • Besides Apple, Intel, and every social networking site and cloud service provider.
    • Nah. It's not worth it. All of these big companies come up with something nasty every now and then. The best option is just to not buy the particular equipment which has the backdoor account.
  • by Anonymous Coward on Thursday July 11, 2013 @09:15PM (#44257659)

    Years ago I worked on HP3000 servers and there was an hpsupport user on those systems as well. But on the 3000 series it was documented and every sysadmin was aware of it and could change the password if desired. Looks like HP still cares about customer service, but no longer cares about ethics. Sad. They were once a really great company.

  • Eh? (Score:4, Insightful)

    by adolf ( 21054 ) <flodadolf@gmail.com> on Thursday July 11, 2013 @09:25PM (#44257729) Journal

    The most recent statement from HP, following another warning from Technion, admitted that 'all HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer.' While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rulesâ"not a limitation built in to limit use of backdoors.

    Without reading TFA, which I expect to be even more sensationalist crap:

    I grok this to mean that a backdoor exists for customer service, which can be activated by a customer (by two factors: permission and network access), and that without action on the part of the customer, said backdoor is closed.

    Did I miss something?

    If so, please synopsize in non-sensationalist terms.

    Indeed, whatever the case: Please post a not-purposefully-scary summary of the actual problem below, because right now it sounds a whole lot like the not-backdoor that Remote Assistance is under Windows.

    • Re:Eh? (Score:5, Informative)

      by girlintraining ( 1395911 ) on Thursday July 11, 2013 @09:29PM (#44257753)

      If so, please synopsize in non-sensationalist terms.

      Non-bullshit, redacted by lawyers version:

      Anyone with access to the NAS over the network and an SSH client can enter a username and password, gain elevated privileges to the cluster, and while not allowing access to the data directly from that interface, access can disable the cluster or delete all the data within it, as well as wiping out partition information, etc.

      • by adolf ( 21054 )

        Sweet! Thanks.

        I'll keep that in mind as I continue to not buy or specify HP products for a myriad of other reasons.

        (That they killed Alpha and whatever was decent about Compaq was already sufficient. Nevermind the fact that their laptops are the least-service-friendly machines I've ever laid a screwdriver on. Or the crazy bullshit computers that I've wasted countless man-days troubleshooting unique problems on in the late 90s. Or the home-oriented desktops they once built which were impossible to open t

        • nice rant... didn't *the market* actually kill Alpha. And PA-Risc. And Itanium. And (mostly) POWER ?
        • Re:Eh? (Score:4, Funny)

          by khallow ( 566160 ) on Thursday July 11, 2013 @09:45PM (#44257867)

          Nevermind the fact that their laptops are the least-service-friendly machines I've ever laid a screwdriver on.

          You sound like a crazy person. I bet you want to clean the fans or some such nonsense.

          • by adolf ( 21054 )

            Yes, that.

            Interestingly, I just acquired a Dell laptop from the same lineage as the "clean the fans" song.

            There is a cover on the bottom, removable with one screw. Beneath is the heatsink. Just beyond is the fan.

            The heatsink itself is copper, and can be easily removed, cleaned/rinsed/whatever, and reinstalled.

            Yay.

          • by dbIII ( 701233 )

            I bet you want to clean the fans or some such nonsense.

            Only Mac fans. There's no cute women that are fans of HP or MS Windows laptops.

        • by Anonymous Coward

          I read comments like this a lot, and they don't entirely gel with my experience of HP stuff.

          Their "consumer" products are truly horrible, and whether it's a laptop, desktop, printer or MFP, you're best advised to just keep walking; but their business-class hardware still seems pretty decent.

          For instance, the nx6320 laptop I used to use made it pretty easy to swap drives, RAM, clean fans, anything you might want to perform at home as a modestly skilled and equipped self-tech; but the 4710s I bought to replac

          • I have the HP 3070A multi-purpose print/scan/copy thingy and I've been very happy with it. Easy to use, reliable, works flawlessly over WiFi (both print and scan), stable drivers and good print quality. Then I also have the cheapo HP 635 laptop, fully plastic (as expected for the price point) but has served very well, nice display too.

            Basically my recent experiences of their consumer stuff have nothing to complain about.

        • by swalve ( 1980968 )
          There is still 32 bit only hardware.
      • by mysidia ( 191772 )

        So "no direct access to data" probably isn't saying much --- just about the limitations of what capabilities the admin UI has.

        Posturing by HP to attempt to reduce the perceived severity of the issue?

        While not allowing access to the data directly from that interface,

        There are probably commands they would be able to type that might enable an additional iSCSI, FC, or NFS initiator to connect; possibly an initiator running on an IP address controlled by the person using the backdoor.

        People can do o

      • Anyone with access to the NAS over the network and an SSH client can enter a username and password, gain elevated privileges to the cluster, and while not allowing access to the data directly from that interface, access can disable the cluster or delete all the data within it, as well as wiping out partition information, etc.

        So anyone including unhappy ex-employees who still have access to the network or physical access to a machine, and who might be interested in holding their former employer to ransom? Including current employees eager to become ex-employees and interested in changing this password in case their reference letter isn't what they wanted? Including anyone who can get the IP address and is interested in shit-disturbing? It sounds like a race to change this password is on as every single unit probably is a targ

        • by h4rr4r ( 612664 )

          Why would just anyone have access to this machine via SSH?

          Have you not heard of firewalls? Whatever connects to this NAS just needs CFS/NFS access on the regular network. SAN type protocols would be VLANed off and SSH would be limited to the administrative machines at the very least. This all assumes people did their jobs correctly.

        • by Alsee ( 515537 )

          Right. ANYONE who can access the local network, or if the device is internet accessible ANYONE on the internet, can enter the username HPSupport and the password badg3r5.

          This is a wide open highly dangerous back door, which was (formerly) protected by nothing more than the hope that (1) no one bothered to notice that HP publicly offered this sort of remote support and (2) the hope that no one who did notice it bothered spending 20 seconds on Google to find a website [md5decrypter.co.uk] that could instantly decode the SHA-1 "78

    • by endus ( 698588 )

      Right, so when someone writes a worm that exploits this, NBD!

    • Re:Eh? (Score:5, Informative)

      by Charliemopps ( 1157495 ) on Thursday July 11, 2013 @10:27PM (#44258107)

      I doubt it. We've got some software like this, and while we were having trouble one day and I was on the phone with their support (who was about as skilled as your local broadband support tech) proceeded to log into our equipment, duplicated my administrator account, log in as me, and start making changes. The log even reported the changes as being done by me. When I realized what was going on I started yelling into the phone "What the fuck do you think you're doing? Holy fucking shit?!?!" The tech on the other end was rather surprised I was upset "Excuse me?" he asked... "How did you just do all that?!?! This is on OUR servers, behind OUR firewall!!! You're under contract with us, none of this should be possible! physically, or legally!" all he said was "Well they don't let me see the contracts. I just click this "Clone account" button and there we go..."

      I reported the whole thing to our security director. It ended up in the lawyers lap. Their software basically just tunneled its way out of our network. There were other reasons their software needed to connect to them so they just used the same port to allow their support techs to have basically more access than I, the senior administrator had. Now, instead of having a secure product, we have an unsecured product and the only thing protecting us from them is a "more specific" contract that, again, their techs have no access to read. Also, given the regulations we're under, that tech was violating federal law without even knowing it.

      Don't trust your vendors. My management has, after this and several other incidents, come to the conclusion that these sorts of products are more trouble than they're worth. In the near future we'll be building it all in-house and dropping vendors like this. Some stuff, like oracle and microsoft, will be hard to dump. But I bet that given enough time even they will be gone and we'll be on something open source.

      • by DarkOx ( 621550 )

        Sounds like you need a better security director, a better firewall/network infra admin, and some junior guy to read logs and watch the seim. The better question here is how/why was this device able to tunnel in/out of your network without someone explicitly allowing it? What you allow unfiltered egress from your data center? If you do your vendors are the least of your problems.

    • Re:Eh? (Score:5, Informative)

      by AdamWill ( 604569 ) on Thursday July 11, 2013 @10:55PM (#44258249) Homepage

      The thing you're missing is this part:

      "While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rules - not a limitation built in to limit use of backdoors."

      i.e. there is not actually any kind of technical restriction on the use of the backdoor, there is no actual customer control over it. When they say 'we can only use it with the customer's permission' what they mean is 'we told our reps only to use it with the customer's permission and we hope they do what we say, and no-one else finds it, so now...oops'.

    • Re:Eh? (Score:4, Informative)

      by mysidia ( 191772 ) on Thursday July 11, 2013 @11:00PM (#44258271)

      I grok this to mean that a backdoor exists for customer service, which can be activated by a customer (by two factors: permission and network access), and that without action on the part of the customer, said backdoor is closed.

      The requirement for permission is sociological and based on adherence to company procedures and policies of HP.

      If HP had chosen to require physical manipulation of the storage device, collecting a serial number or code printed ONLY on the device, or another method of OPT-IN selection by the storage admin, then I am sure there would be no complaint.

      The problem is some HP support employees have access to a God code that grants administrative access to any piece of gear, and it's the same for all customer units, AND probably the code continues to work, even if some customer service employees are terminated, that might know the code.

      It's poor security against insider abuse, regardless.

    • That is the HP version yes.

      The reality version is similar, but get rid of the bit about a customer needing to enable it and replace HP Support with anyone.

    • by thsths ( 31372 )

      Unfortunately, that is exactly where the problem starts, but not ends.

      The backdoor is available without customer interaction! HP is lying in its statement - it is not technically wrong, but intentionally misleading. So they know they are lying, too. And it seems they are also refusing to fix it.

    • I grok this to mean that a backdoor exists for customer service, which can be activated by a customer (by two factors: permission and network access), and that without action on the part of the customer, said backdoor is closed.

      "Permission" isn't much of a safeguard against criminals. They tend to do stuff without it.

      (Isn't that the very definition of "criminal", i.e. doing stuff they don't have permission to do?)

    • The point is not that such access exists, the point is that it is NOT DOCUMENTED.

  • by msobkow ( 48369 ) on Thursday July 11, 2013 @09:27PM (#44257739) Homepage Journal

    Pretty every much hardware/software stack combination that I ever encountered over 30+ years of programming had a "back door" admin account to allow the vendor to get into the systems to repair damage. This is nothing new.

    Yes, it's a security hole.

    But it's also standard practice and should come as no surprise to anyone.

    • by Anonymous Coward on Thursday July 11, 2013 @10:17PM (#44258055)

      Pretty every much hardware/software stack combination that I ever encountered over 30+ years of programming had a "back door" admin account to allow the vendor to get into the systems to repair damage. This is nothing new.

      So trusting any vendor about any security is out of the question. Rolling your own stack is the only way to actually retain any control over your mission critical data.

      But it's also standard practice and should come as no surprise to anyone

      Or perhaps it is one of the "Seventeen Techniques for Truth Suppression" - 8. Dismiss the charges as "old news."

      http://cryptome.org/2012/07/gent-forum-spies.htm [cryptome.org]

      • by AHuxley ( 892839 )
        Even the low end, small brand prosumer/business grade ethernet, quality firewall with wireless and 3G dongle units seem to send something back.
        Forums usually have the question why is my new, quality firewall phoning home?
        Its only an anonymous diagnostic tool that cant be turned off and users are to be thankful for the low cost of the unit, low power usage, cool running and great support... cpu and memory is great too...
      • They don't even have the common decency to at least choose a password that isn't already in every rainbow table on the planet.

        If I were to make a back door system, I'd make sure customers knew about it. I'd make it so that a physical switch had to be activated on the device itself in order for the back door to be used. Activating the switch would be plainly obvious, with both physical indicators on the device and in management software, with auditing and warnings that the back door has been activated - an

    • No not really (Score:5, Informative)

      by Sycraft-fu ( 314770 ) on Thursday July 11, 2013 @10:23PM (#44258085)

      The right answer is a service account they can have activated, if needed. On the EqualLogic (Dell) we have that is how it is done. When they need to work on the system, they have you connect to a WebEx session. They then request control of the PC. They have you log in to the system using your admin account, and they can then set the password on an "fse" account, which they can use to access service functions you aren't supposed to get at. Once they are done, they encourage you to change the fse account to a different password.

      That is how it is properly done: They get in using your system, with you monitoring what they do, and you lock out access after they are done.

      Now maybe they are going to have access all the time for proactive monitoring. Fine, that is a service some like (we may take Dell up on it if they start offering it). Again the right method is an account set up by the customer, not one hardcoded in. Why? Well because of shit like this. If it is hardcoded in, and you can't change it, then if someone discovers the access, it is bad times.

      For that matter I've never seen this on Cisco stuff either. The recovery for that is via serial, I've never seen a remote override from Cisco. Maybe it is there, but I've never seen them use it.

    • by vux984 ( 928602 )

      Pretty every much hardware/software stack combination that I ever encountered over 30+ years of programming had a "back door" admin account to allow the vendor to get into the systems to repair damage. This is nothing new.

      Those other ones tended to be acknowledged and documented.

      There is a big difference between a hole in the wall you know about, and one you don't.

      But it's also standard practice and should come as no surprise to anyone.

      You can't plug or safeguard against security holes that are kept secret.

    • Correct: It should come as no surprise to anyone. Which is why it shouldn't be hidden.

    • Yes, it's a security hole.

      If you know about it, you're in the firing line when shit hits the fan. If you work in a sector with specific regulations on data handling, eg PCI, HIPAA, Sarbanes Oxley, they're pretty much excluded from that sector. It is a due diligence failure on your part as the person recommending / implementing the system.

  • by girlintraining ( 1395911 ) on Thursday July 11, 2013 @09:27PM (#44257741)

    The password you're looking for is badg3r5. So there. Go forth, my minions! In other news, Slashdot's corporate overlords apparently no longer believe in full disclosure, as it had in the past, and now omit critical information probably because their lawyers have more say in the editorial process than the submitter, editors, or anyone with a clue to spare. :(

    • by Anonymous Coward on Thursday July 11, 2013 @09:45PM (#44257863)

      The earlier article said they can reset user passwords, if they can do that, they can grant themselves access to the data.

      http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/
      " lost admin passwords are resettable by HP. One, from November 2011, states: “You will need to call support and they can get into the backed and reset it for you. 1-800-633-3600 'Lefthand Solutions'”. The other, posted by a LeftHand product manager in 2009, states: “Call support. They can reset the password remotely.”

      So they CAN get access to the data, because they can change the configuration to give themselves access.

    • In this litigious dog eat dog sue at the drop of a hat world, it's entirely possible that ignoring your lawyers will get you obliterated rather than simply censored.

      If someone has a gun to your head, do you keep your mouth shut and live, or do you mouth off, get your brains blown out, and wind up never able to talk about *anything* again?

      • by Mal-2 ( 675116 )

        If someone has a gun to your head, do you keep your mouth shut and live, or do you mouth off, get your brains blown out, and wind up never able to talk about *anything* again?

        Say "what" again! Say! "what"! again! I dare you! I double-dare you, motherfucker! Say "what" one more goddamn time!

        It depends a whole lot on how calm you can stay under the pressure.

  • Customers Demand It (Score:5, Informative)

    by Anonymous Coward on Thursday July 11, 2013 @09:27PM (#44257745)

    I work for a large networking appliance company. We know these backdoors are a bad idea from a security standpoint. The problem is, customers demand them. They call up and want something fixed--or a customization or diagnosis or whatever--and many times the only way to resolve the issue is to access the box. Most times it's a configuration problem on their end, but often the quickest way to figure this out is to access the internal databases.

    On our appliances our backdoors are completely optional--if you disable it, support is completely unable to access the box, period (I know because I helped to write it). But you wouldn't believe how irate customers become when you tell them that you can't help them, even though they're the ones who _chose_ to disable the support access, and clicked through all the warnings.

    Could these backdoors be made more secure? Absolutely. But developing, say, a storage appliance and developing a secure remote access protocol (both in terms of software as well as access control) are worlds apart. SSH and SSL are just tiny elements in an overall solution.

    I'm not one to argue that convenience and security are necessarily opposed. But it is incredibly hard to find the small set of solutions that provide both maximum convenience and maximum security. And even if you've found a solution in that set, it's incredibly hard to prevent it from degrading over time as developers come and go, introducing bugs as they add and fix features.

    • I work for a large networking appliance company. We know these backdoors are a bad idea from a security standpoint. The problem is, customers demand them. They call up and want something fixed--or a customization or diagnosis or whatever--and many times the only way to resolve the issue is to access the box. Most times it's a configuration problem on their end, but often the quickest way to figure this out is to access the internal databases. On our appliances our backdoors are completely optional--if you disable it, support is completely unable to access the box, period (I know because I helped to write it). But you wouldn't believe how irate customers become when you tell them that you can't help them, even though they're the ones who _chose_ to disable the support access, and clicked through all the warnings.

      This was my exact experience when working on telco infrastructure equipment years ago. We knew it was bad security but customers wanted it.

      If working on such equipment today I would expect that we would incorporate a time-based one-time password that the customer would have to provide to our support person. Hardly perfect but a bit better than what seems to be common place today.

    • by gmuslera ( 3436 )
      With a fixed, weak master password that is not adviced in the documentation nor requested to changed to a safe one on install/configuration? That is a plain backdoor. That they managed to built security on it to enable you to control what authenticated users can see or do only make it worse, is not that they don't know how to authenticate users or have secure passwords. Not only they sold you a backdoor, but also show how idiot they think you are.
  • Freedom (Score:3, Funny)

    by Taantric ( 2587965 ) on Thursday July 11, 2013 @09:31PM (#44257777)

    When you buy an 'Merican product you are buying Freedom!

  • by WOOFYGOOFY ( 1334993 ) on Thursday July 11, 2013 @09:57PM (#44257929)

    They're going bankrupt anyway so this issue will take care of itself.

    NEXT!

    • by dbIII ( 701233 )
      They have too many people mixed in with politics to go bankrupt. The taxpayer will fund purchases of their stuff whether it is shit or not.
  • by spire3661 ( 1038968 ) on Thursday July 11, 2013 @10:06PM (#44257983) Journal
    My worst fears of how deep spying has gone keep getting confirmed. Pretty much every single major vendor is backdoored by the NSA one way or another.
    • by dbIII ( 701233 )
      While you could be correct I'd blame this especially stupid backdoor on HP instead. They need to be badgered about it and stop treating people like mushrooms.
  • No one listens to the security group no matter how badly they get hammered. This is just dumb shit. If I ran the world everyone who was involved with implementing this would be fired immediately.

    Remote access for customer support is a great thing...just build it right. It's really not that hard at all to build it right...probably even easier than building it this stupid ass way.

  • Your SSH ports should never be exposed to the public internet directly. Generally you want a "jump" box that is a very tight and tied down system (selinux/freebsd) with RSA keys to get in. Just Saying
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Public Internet? Really? That's all your concerned about? How about any business that requires auditable data access/manipulation and or is concerned in the least about insider threat? How about the ability of the mail clerk to nuke your entire storage array if he gets hacked off and decides to quit and leave a going away present. Outsider threats are the least of your concerns with a hole like this. But thanks for your brilliant security advice.

  • Uh-oh! (Score:5, Funny)

    by Chmarr ( 18662 ) on Thursday July 11, 2013 @11:55PM (#44258531)

    78a7ecf065324604540ad3c41c3bb8fe1d084c50 ? Really ? Crap... that's the combination to my luggage.

  • Standard Practice (Score:5, Interesting)

    by HockeyPuck ( 141947 ) on Friday July 12, 2013 @01:24AM (#44258825)

    You people do realize that for *years* high end disk arrays shipped with *gasp* modems.

    So if a problem occurred the array could 'phone home', open a case, upload logs and tell the vendor a problem took place. Then the vendor could dial in, diagnose the problem and dispatch a CE with the replacement part.

    The techs accessing the arrays over the modems couldn't 'download' the customer data. Yes there were some companies that wouldn't allow the modem to be installed and would often have to sign very long legal documents basically saying that if a hardware failure happened and the vendor wasn't notified, the customer assumed responsibility.

  • The LeftHand Path (Score:5, Informative)

    by gishzida ( 591028 ) <gishzida&gmail,com> on Friday July 12, 2013 @04:06AM (#44259355) Journal

    Actually for those that administer these systems this is old news...

    I worked for a financial institution that had two four node clusters of storage products [one was SATA based and the other SAS based] which were developed by LeftHand Networks which ran on HP storage servers [DL320s] and Dell hardware as well. Shortly after we installed the clusters, HP bought LeftHand... and the LeftHand OS [then called SAN i/Q] became an HP only product [they dropped support for other hardware]. at that time (2008) this support back door already existed... I had occasion to allow a LeftHand support engineer access to a node which had taken itself off line... and the only way to bring it back was the command line backdoor -- It was part of the LeftHand OS / Cluster Administration software... LeftHand OS is a actually Linux with some custom cluster control / management software.

    The real issue of this account is that it allows a third party access to an interface that the owner of the hardware cannot access-- yep, that is right LeftHand did not trust its clients with access to the command line on their storage server products... you were buying a very complex "Storage Appliance" which *required* a support contract... they were designed as a RAID 5 Cluster. Each Node was set up as a RAID 50 array and then the nodes were then clustered as Raid 5... you could lose a lot of drives and still have a cluster which at the time was something unique on the market

    On the other had (the left one?) the Support Engineers at LeftHand were extremely knowledgeable of their products [It was then a start up and at least in part employee owned] and they were actually concerned and responsive to the needs of their customers... I was sad that the senior Support folks cashed out and moved on when HP bought them...

    When HP took over that all went out the window... by 2009 the front end of the support operation went to Mexico and if you really did need a support engineer they would have the engineer call you [previously the Support number was a direct line to the support engineers]

    Now my recollection was the reason that HP bought them was that LeftHand had a product that was better than HP's offerings at the time... so it should not be surprising that the LeftHand code base evolved / moved into other products...

    The bottom line is that the only way to get access to the command line of a LeftHand node required either SSH access or a modem connection. As an administrator, giving network access to black hats by failing to block access SSH access to sensitive systems from unknown IP space just shows you are an idiot. While I understood the reason for the back door my only real fear of it was that some HP trainee engineer would wipe a cluster and take down the vSphere cluster that the storage cluster supported. The fact that my boss did not know the password made the system safe... since my boss knew nothing about server systems or networks...

    • Re:The LeftHand Path (Score:5, Informative)

      by MrNemesis ( 587188 ) on Friday July 12, 2013 @06:26AM (#44259753) Homepage Journal

      Was about to say the same thing here as well; we had some of the G1 LeftHand units foisted upon us as a "cheap" SAN solution about three years ago, very soon after the HP buyout you mentioned.

        It was probably more likely due to the fact that the salesman over-promised, the company under-spent (seriously, they expected 1Gb NICs to be fast enough to feed over 300 VMs) and the HP techs set them up wrongly (the same RAID50 setup you describe), but we had endless problems with them - performance was predictably rubbish but a single disc failure kept causing the node to reboot. Anyway, because of the continual problems with the LH, we basically had an HP tech dialling into the nodes at least once a week to firefight the issue du jour, simply because certain node failures could only be remedied this way for some inexplicable reason. HP refused to let us know the backdoor, so one of the network team installed a keylogger on the box they dialled into via WebEx to activate the backdoor which captured teh badgers as it went in. So eventually we were able to fix our nodes much quicker, but it was annoying as hell and a cynical person might say the "backdoor admin" mode was only there to justify support contracts. If I was the kind of person to work in LH's marketing department I would have spun this backdoor as a "Cloud-based administrative control and recovery system" because it was slow, overpriced and unreliable.

      Eventually we got a new head of ops who wasn't as much of a yes-man to the director (who by this point was being hauled over the coals for the shitty performance and reliability of his much-vaunted SAN solution) and HP recanted and bought back the LH and sold us a 3par instead (of which performance, support and reliability have been exemplary), and the fact that HP had basically bullied us into a position of "we're going to backdoor you literally and figuratively" was a big factor in negotiating ourselves a good price.

      Based on my experience, I'd avoid anything to do with the LeftHand forever more, the whole support infrastructure was just the putrid icing on top of a very shitty cake.

  • by wisnoskij ( 1206448 ) on Friday July 12, 2013 @07:10AM (#44259895) Homepage

    Would this fact not have been obvious the first time someone called support?

  • "Mister potato head . . . MISTER POTATO HEAD . . . back doors are not secrets!"

Avoid strange women and temporary variables.

Working...