How can I mitigate IPMI security vulnerabilities without breaking fence_ipmilan fencing in a High Availability cluster?
Issue
- How can I mitigate IPMI security vulnerabilities without breaking
fence_ipmilan
fencing in a High Availability cluster? -
Our security team has discovered vulnerabilities within the IPMI protocol.
-
Can we turn off the IPMI protocol on the iLO, and would that have an effect on the fencing of the cluster?
Environment
- Red Hat Enterprise Linux Server 6 (with the High Availability Add-on)
- Red Hat Enterprise Linux Server 7 (with the High Availability Add-on)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.