lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAH8yC8keOa72YMdFmW1f-xVVFXKJ0t2btN4HGrbWe5cHso4Aew@mail.gmail.com> Date: Thu, 7 Jul 2011 21:59:32 -0400 From: Jeffrey Walton <noloader@...il.com> To: phil <jabea@...ea.net> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Dell iDRAC6 On Thu, Jul 7, 2011 at 9:27 PM, phil <jabea@...ea.net> wrote: > Is it only me, but the iDRAC6 from Dell is kinda insecure. The default > username and password is always root / calvin. (I configured a lot of Dell > server from like R610 to NX3000 and they all share that default password) I have found Dell to be very insecure - from their BIOS to their applications. I've tried to report a number of issues over the years and all have been ignored. For example, emails to {secure|security}@...l.com are received but ignored; and calls to their tech support (overseas call centers) to report a vulnerability get you transferred into the bit bucket. I no longer purchase anything Dell. It does not matter if its personal computers to business servers. Jeff _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists