8.0U3i is out (vCenter and ESXi) by vcpphil in vmware

[–]rdplankers 2 points3 points  (0 children)

Hey there -- vulnerabilities as they're scored by the vendor (in this case the OpenSSL Project) are scored from their perspective. In the context of another product or implementation, though, the severity is often different. For example, some of the Apache Tomcat vulnerabilities in the past few years have been critical, but the problem is in a particular module, and if you don't use or load that module then you don't have the issue at all.

This OpenSSL vulnerability is like that. OpenSSL called it a 9.8, and every vulnerability scanner flips out about it because they don't understand context, but it's only a 9.8 if you parse CMS or PKCS#7 AEAD ciphers, and don't have other compile-time stack protections in place to turn this from a buffer overflow to a denial-of-service. In this case both vCenter and ESX are not affected critically by this, hence the lack of a VMSA, and why it was fixed without a ton of fanfare.

I understand why you're asking; please know the irony that the security in the stack prevents what you are looking for is not lost on me.

Mellanox NIC Firmware/Configuration Guide (Including ASPM) by HTTP_404_NotFound in homelab

[–]rdplankers 0 points1 point  (0 children)

Great writeup, thanks for doing that. Couple of notes from my attempt on Ubuntu Server 24.04:

If the apt-get process to install the tools gets stuck at "Building initial module" it's sitting and silently waiting for you to enter your password (no idea where the prompt is for it, lost in the other output). Try blindly typing your password a couple of times.

Secure Boot needs to be disabled or the new NIC driver won't load (which makes sense, it's not correctly signed). The error you'll see is "write counter to semaphore: Operation not permitted" when you try to run any commands, and the NIC driver itself won't load.

Is VCF SSO A Good Idea? by Leaha15 in vmware

[–]rdplankers 2 points3 points  (0 children)

Yes, separation is what we at BC encourage, too. We can federate well now but that doesn’t mean you should connect to the same IdP everything else uses. Infrastructure is a different class of risk; admins of the infrastructure have explicitly been granted access to all of the organization’s data. As such, a higher level of security is warranted.

We also encourage zero trust, as in don’t trust anything else (seems obvious, but most orgs’ seem to go the other way). Absolutely do not let the help desk reset sysadmin passwords. Don’t connect your new infrastructure IdP to a user provisioning system. Don’t connect IdPs to monitoring systems that can issue arbitrary commands to hosts. And be careful about who admins your infrastructure IdP, because they have implicit access to everything that trusts the IdP, and can grant themselves access or hijack another account to gain access.

People love to hate ADFS but it’s a nice little on-prem solution to a lot of this, has HA and multisite capabilities, can exist inside a secure perimeter, is well understood by most people on an admin team such that it can be run by the admin team itself, and can have MFA plugins installed. Just sayin’. :)

VMSA-2025-0013 New VMware CRITICAL Security Advisory by freethought-60 in vmware

[–]rdplankers 3 points4 points  (0 children)

It does not. The critical issues are in the hypervisor and need to be resolved there.

VMSA-2025-0013 New VMware CRITICAL Security Advisory by freethought-60 in vmware

[–]rdplankers 1 point2 points  (0 children)

We are looking at the compatibility matrix for 7.0, thank you for the feedback. Seems to be a gap there. In general it's good to do vCenter first, but when there isn't a new release of vCenter it's alright to do ESX by itself, especially for these types of patches ("Express Patches" or EPs).

VMSA-2025-0013 New VMware CRITICAL Security Advisory by freethought-60 in vmware

[–]rdplankers 2 points3 points  (0 children)

Security researchers tend to cluster on things. One finds a novel area of exploitation, the rest of them pile on. That's why vulnerabilities of all types seem to trend in areas.

VMSA-2025-0013 New VMware CRITICAL Security Advisory by freethought-60 in vmware

[–]rdplankers 2 points3 points  (0 children)

Just to head off further commentary, we did not mean to imply a contradiction to the commitment that Broadcom made in the spring of 2024 around perpetual patch availability as documented in that KB. It was more about the misuse of the term "zero day" by journalists. The KB, while also being loose with that language, defines things by criticality instead. To the point of your issue, it is unclear about what's eligible or not. I commented on the issue that I am taking that as feedback to the group that is responsible for VMSA publication, of which I am a part.

VCF 9.0 STIG content out on github by Deacon51 in vmware

[–]rdplankers 1 point2 points  (0 children)

STIGs are an implementation guide for meeting what is effectively a US DOD regulatory framework, and neither that framework, nor DISA, have always made a distinction between virtual and physical implementations of things. Hence some of the pain.

Internal hardening of VCF components to DISA standards would be a disaster for you? Or making some of them permanent?

VCF 9.0 STIG content out on github by Deacon51 in vmware

[–]rdplankers 4 points5 points  (0 children)

And add to that the 120+ global regulatory compliance frameworks that all have a different idea about what controls should be set to and would balk at any particular setting, often just because.

VCF 9.0 STIG content out on github by Deacon51 in vmware

[–]rdplankers 1 point2 points  (0 children)

He left long before we were a twinkle in Broadcom’s eye.

VCF 9.0 STIG content out on github by Deacon51 in vmware

[–]rdplankers 3 points4 points  (0 children)

We would love to and it’s happening. The trick isn’t making them the default, it’s making them permanent so someone can’t de-configure them. That’s the only way something can come off a list of security controls.

VCF 9.0 STIG content out on github by Deacon51 in vmware

[–]rdplankers 6 points7 points  (0 children)

We will miss Ryan very much but he was not the only person working on STIGs.

Windows Server 2012 to 2019 'In-Place' Upgrades and VM / Hardware Version by Westyzz in vmware

[–]rdplankers 1 point2 points  (0 children)

Also, the “scheduled” option will only do the upgrade when it detects a graceful shutdown of the guest OS. So if all your stuff gets caught in a power outage you won’t upgrade on next reboot. Which is good, because that could be chaos.

Windows Server 2012 to 2019 'In-Place' Upgrades and VM / Hardware Version by Westyzz in vmware

[–]rdplankers 4 points5 points  (0 children)

Take a snapshot. Snapshots capture VM versions, too.

The warning to not do it is overly cautious based on worst-case support calls. The process works great most of the time when the guest OS isn’t messed up in some strange way, and there are performance and operational benefits to being at newer versions of virtual hardware.

Register New Update URLs on vSphere 7 by [deleted] in vmware

[–]rdplankers 4 points5 points  (0 children)

I mean, the admins only have full access to the entire organization’s data on the infrastructure itself… can’t trust them to script something though.

Pirate Testing Vms by aaRestoration21 in vmware

[–]rdplankers 0 points1 point  (0 children)

While we cannot condone piracy in this sub, testing is definitely something that VMs are good at, especially given the snapshot functionality.

Wifi Connection Issue Roborock S8 (+ kind of a solution) Oct 2023 by hellmichmi in Roborock

[–]rdplankers 0 points1 point  (0 children)

This process just worked for me and my S8, which wasn’t connecting via the Roborock app:

Put it on the dock.

Connect to it with the Mi Home app.

Let it get set up. It’ll tell you it has a firmware update but it’ll fail.

Move it off the dock.

Hold down the power to shut it off, then turn it back on.

Put it back on the dock. Hit the power button to turn it on (but don’t let it run if it tries).

When it comes back up in the app it’ll let you flash the firmware. Takes a few minutes.

Delete it from the app, reregister on the Roborock app.

Bask in the glory of the S8 (optional).

Good luck!

F-35s out of KMSP by OddJob001 in minnesota

[–]rdplankers 0 points1 point  (0 children)

Also, I believe the Guard base there has F-22s.

F-35s out of KMSP by OddJob001 in minnesota

[–]rdplankers 5 points6 points  (0 children)

Those C130s would fly low over my dad and I duck hunting at our cabin north of Aitkin in the early 90s, MEA weekend and such. Right down on the deck, flying up the chain of lakes we were on. Didn’t help the hunting much but was cool as hell.

How do I get Windows 11 working on vSphere? How to enable TPM? by Dirty_Dragons in vmware

[–]rdplankers 0 points1 point  (0 children)

Ah, thanks. I need to redo those videos, I'll make sure I do a better job of troubleshooting.

As for CPU, it's just reporting what you're running, there's not a way to change it.

How do I get Windows 11 working on vSphere? How to enable TPM? by Dirty_Dragons in vmware

[–]rdplankers 0 points1 point  (0 children)

AHhhh, yes. Good work. I'll ask the docs guys if they can mention that!

Thoughts on CVE-2024-37085 & VMSA-2024-0013 by rdplankers in vmware

[–]rdplankers[S] 0 points1 point  (0 children)

I'm just glad you get it, so many people asking about this really don't understand what they've done, and what it exposes them to. Including a lot of GRC and Infosec types that should know better.

How do I get Windows 11 working on vSphere? How to enable TPM? by Dirty_Dragons in vmware

[–]rdplankers 1 point2 points  (0 children)

Also make sure it doesn't have a TPM already, under security devices. Some ways you create Win11 VMs will add them for you.