<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ILO3 TLS 1.2 capabilities in ProLiant Servers (ML,DL,SL)</title>
    <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7158273#M176766</link>
    <description>&lt;P&gt;This was the reason that Richard Stallman started the open-source movement, a vendor stopped supporting one of his devices.&lt;/P&gt;&lt;P&gt;If HP is going to abandon hardware and not provide basic security updates,&amp;nbsp; they need to provide access for the community to be able to maintain the hardware that we have purchased.&amp;nbsp;&lt;/P&gt;&lt;P&gt;HP had to see that anything other than TLS 1.2 would be required before ILO3 was abandoned,&amp;nbsp; yet they didn't provide a way for their customers to fix the security of the devices.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have servers with ILO3's and advanced packs that one has to find an old insecure browser to manage.&amp;nbsp; This is getting harder and harder.&lt;/P&gt;&lt;P&gt;HP please step up or release the software code for devices to where the community can keep them running.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Jan 2022 13:35:15 GMT</pubDate>
    <dc:creator>kayak1</dc:creator>
    <dc:date>2022-01-14T13:35:15Z</dc:date>
    <item>
      <title>ILO3 TLS 1.2 capabilities</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7001005#M161906</link>
      <description>&lt;P&gt;We have an HP Proliant DL360 G7 . we are looking to disable TLS 1.0 and 1.1&amp;nbsp; only leaving TLs 1.2 enabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Upgraded to the latest firmware and placed ILO in FIPS mode,&amp;nbsp; but this did not enable TLS 1.2 , it only enabled TLS 1.1 exclusively.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggesstions or input on how to configure the DL360 G7 to only use TLS 1.2 will be appreciated. Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 13:53:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7001005#M161906</guid>
      <dc:creator>cmbailey87</dc:creator>
      <dc:date>2018-03-28T13:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: ILO3 TLS 1.2 capabilities</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7001402#M161954</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Here is the TLS support for ilo.&lt;BR /&gt;&lt;A href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00020426en_us" target="_blank"&gt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00020426en_us&lt;/A&gt;&lt;/P&gt;&lt;P&gt;G7 server has iLO 3, which supports only&amp;nbsp;&lt;SPAN&gt;TLS 1.0 and 1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank You!&lt;BR /&gt;&lt;BR /&gt;I am a HPE employee&lt;BR /&gt;_________________________________________&lt;BR /&gt;Was the post useful? Click on the white &lt;STRONG&gt;KUDOS! Thumb&lt;/STRONG&gt; below.&amp;nbsp; Kudos is a way of saying thank you to a post.&lt;BR /&gt;//&amp;nbsp;&lt;A href="https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0120728" target="_blank"&gt;Useful Links for ProLiant Servers&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/Community-FAQ/bd-p/faq" target="_blank"&gt;Community FAQ&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/custom/page/page-id/hp.rulespage" target="_blank"&gt;Rules of Participation&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/Servers-The-Right-Compute/bg-p/ServersRightCompute" target="_blank"&gt;Servers Blog&lt;/A&gt;&amp;nbsp;//&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 09:32:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7001402#M161954</guid>
      <dc:creator>Suman_1978</dc:creator>
      <dc:date>2018-04-03T09:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: ILO3 TLS 1.2 capabilities</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7012456#M163275</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/560055"&gt;@Suman_1978&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Here is the TLS support for ilo.&lt;BR /&gt;&lt;A href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00020426en_us" target="_blank"&gt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00020426en_us&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;G7 server has iLO 3, which supports only&amp;nbsp;&lt;SPAN&gt;TLS 1.0 and 1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank You!&lt;BR /&gt;&lt;BR /&gt;I am a HPE employee&lt;BR /&gt;_________________________________________&lt;BR /&gt;Was the post useful? Click on the white &lt;STRONG&gt;KUDOS! Thumb&lt;/STRONG&gt; below.&amp;nbsp; Kudos is a way of saying thank you to a post.&lt;BR /&gt;//&amp;nbsp;&lt;A href="https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0120728" target="_blank"&gt;Useful Links for ProLiant Servers&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/Community-FAQ/bd-p/faq" target="_blank"&gt;Community FAQ&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/custom/page/page-id/hp.rulespage" target="_blank"&gt;Rules of Participation&lt;/A&gt;&amp;nbsp;/&amp;nbsp;&lt;A href="https://community.hpe.com/t5/Servers-The-Right-Compute/bg-p/ServersRightCompute" target="_blank"&gt;Servers Blog&lt;/A&gt;&amp;nbsp;//&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Obviously you dont support it but will you be adding support to it or should I just add this to the list of justifications for not purchasing any more HP servers as we replace our existing 250 G7 servers that have current HPE support contracts? Tls 1.0 and 1.1 both have security issues that were announced before the EOL of iLO 3 support and as such it should have been updated to use 1.2.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jul 2018 06:36:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7012456#M163275</guid>
      <dc:creator>G8KeaPoR</dc:creator>
      <dc:date>2018-07-20T06:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: ILO3 TLS 1.2 capabilities</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7012783#M163314</link>
      <description>&lt;P&gt;New servers don't have iLO 3 in them. HPE ProLiant Gen8, Gen 9 and Gen10 servers have iLO 4 and iLO 5, which both support TLSv1.2&lt;/P&gt;&lt;P&gt;But iLO 3 did address the TLSv1.0 and TLSv1.1 issues.&lt;/P&gt;&lt;P&gt;iLO 3 implemented both the split record fix and TLS bad padding alert masking, which mitigate the IV implementation problems and the padding-check oracles which are the root cause problems for TLSv1.0 and TLSv1.1 (and TLSv1.2, actually in some implementations)&lt;/P&gt;&lt;P&gt;iLO 3 added the ability to disable the HTTPS webserver entirely, which certainly addresses the issues, and works well for some customers who are primarily using SSH for management.&lt;/P&gt;&lt;P&gt;It's worth mentioning that many such attacks require code injection, an active or forwarding man in the middle, and tens of thousands of requests made against iLO. Those tend to be impossible to practically execute on iLO's small processor/webserver with static page content.&lt;/P&gt;&lt;P&gt;If there truly are concerns about a man-in-the-middle; a properly trusted iLO SSL certificate and a policy of respecting the browser's warnings is necessary to defeat those attacks, regardless of the presence of TLSv1.2+.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jul 2018 22:01:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7012783#M163314</guid>
      <dc:creator>Chris Davenport</dc:creator>
      <dc:date>2018-07-23T22:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ILO3 TLS 1.2 capabilities</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7158273#M176766</link>
      <description>&lt;P&gt;This was the reason that Richard Stallman started the open-source movement, a vendor stopped supporting one of his devices.&lt;/P&gt;&lt;P&gt;If HP is going to abandon hardware and not provide basic security updates,&amp;nbsp; they need to provide access for the community to be able to maintain the hardware that we have purchased.&amp;nbsp;&lt;/P&gt;&lt;P&gt;HP had to see that anything other than TLS 1.2 would be required before ILO3 was abandoned,&amp;nbsp; yet they didn't provide a way for their customers to fix the security of the devices.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have servers with ILO3's and advanced packs that one has to find an old insecure browser to manage.&amp;nbsp; This is getting harder and harder.&lt;/P&gt;&lt;P&gt;HP please step up or release the software code for devices to where the community can keep them running.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 13:35:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/ilo3-tls-1-2-capabilities/m-p/7158273#M176766</guid>
      <dc:creator>kayak1</dc:creator>
      <dc:date>2022-01-14T13:35:15Z</dc:date>
    </item>
  </channel>
</rss>

