Stephen Hoffman

@HoffmanLabs@infosec.exchange
242 Followers
191 Following
3.5K Posts
VSI OpenVMS, Apple macOS, iOS, iPadOS; Server & Network Security; IP & DECnet Networking; TLS, DNS, C et al. ⌘ irc·2600·net #vms pwd:VMS
@grawity It wouldn’t surprise me to learn an over-long password just gets truncated, alas.

I missed this post from LeoLabs on Dec 18, where they noted that 10s of debris objects were detected from the Starlink 35956 anomaly event of 17 Dec 2025.

They also assessed that the satellite’s initial drop in orbital altitude was likely caused by an internal energetic source (e.g., an explosion) rather than a collision with space debris or another object.

Ed Lu of LeoLabs posted today 100s of debris objects being tracked.

No info on fragment sizes or apogee.

No new word from SpaceX.
2/n

RE: https://infosec.exchange/@lorenzofb/115746958061196593

Interesting overview of Apple security work spanning hardening against exploits using changes to the OS and its components, using compiler features, some interesting new formal proof tools, and hardware changes.

Mozilla Firefox is seemingly running an impromptu demonstration of failing communications strategies with their “AI Browser” efforts for the future of Firefox, and they’re probably either going to keep digging their current hole yet deeper, or reset their implementation plans and communications strategy and try again.

RE: https://cyberplace.social/@GossiTheDog/115745701289876342

While you’re looking at this new HPE OneView CVE, a semi-occasional posting of the unfixed (and reportedly unfixable) iLO management processor CVE:

CVE-2013-4786

“HPSBHF02981 rev.4 - HPE Integrated Lights-Out 2, 3, 4, 5 (iLO 2, iLO 3, iLO 4, and iLO 5) and HPE Superdome Flex RMC - IPMI 2.0 RCMP+ Authentication Remote Password Hash Vulnerability (RAKP)”

TL;DR: ask nicely for a weakly-hashed IPMI password, then crack it offline.

On at least some of these boxes, the iLO command that blocks this access:

MP:CM> sa -lanipmi d

https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c04197764

Segment and restrict access to iLO on these boxes, disable IPMI access, etc.

HPE OneView CVE-2025-37164 worth paying attention to

- Widely used enterprise management software

- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out

- Being on OneView allows attacker to access VMware, 3PAR storage etc by design

- Expect exploitation in the wild as it's so simple

- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor

Shodan dork: product:"HPE OneView"

@mvilain RP04 wandered the server room, too.

Didn’t need a specific app, as a backup would cause the drives to stroll or to slap.

RP04 packs are fairly hefty stacks of magnetic media platters, manually inserted into a washing machine sized drive by sliding open the glass lid, inserting and latching the pack, and spinning it up to stupid-fast RPM.

https://www.columbia.edu/cu/computinghistory/rp04.html

One fine New Jersey afternoon, I used some rich and colorful and unbecoming language upon entering the server room, to the sight of a maintenance tech changing a lightbulb.

By standing atop the glass door of an RP04. Standing atop a spun-up RP04 pack.

Graphic visions of the potential for “just” a head crash*, or for julienned tech tartar if that glass shattered.

*head crashes are usually boring nowadays, but were far more kinetic in The Before Time.

Wandered into the group conference room in the DEC Maynard Mill — formerly an ancient brick and timber-frame woolen mill — and noticed the high ceiling was sagging unusually.

Yes, it was an old mill, everything leaned.

Some of it occasionally dripped lanolin-flavored centipedes.

But this sagging was unusual.

Turned out the upstairs neighbors parked an immense PDP-11/70* without regard to the location of the structural supporting beams.

That got fixed right quick — better placement and steel spreader plates and all — before that PDP took a quick trip to the basement.

*It might have been an -11/74, upstairs was into that sort of thing.

@paul_ipv6 Ask the likely medical facilities what they will accept.

From my limited and now-dated experience, hospitale will usually accept images of documents in urgent situations, but most then want the actual legal paperwork filed or faxed.

This isn’t something the facilities are unfamiliar with, though. Ask them.

Back when I was active, DNR status had very specific requirements including periodic renewals, and those details varied by jurisdiction.