IPMI supports several types of authentication methods for remote control servers.
One of the supported authentication methods is MD2, currently considered cryptographically weak and potentially detectable through vulnerability scans. Therefore, it is recommended to disable it.
Step 1. Connect to VMware ESXi via SSH as root (replace <your_ip_address_or_hostname> with the correct ip)
ssh root@<your_ip_address_or_hostname>
Step 2. Run this command
/opt/syneto/bin/ipmitool lan print
EXAMPLE OUTPUT
Auth Type Enable : Callback : MD2 MD5 PASSWORD : User : MD2 MD5 PASSWORD : Operator : MD2 MD5 PASSWORD : Admin : MD2 MD5 PASSWORD : OEM : MD2 MD5 PASSWORD
Step 3. Remove MD2 as an authentication type
/opt/syneto/bin/ipmitool lan set 1 auth Callback MD5,PASSWORD
/opt/syneto/bin/ipmitool lan set 1 auth User MD5,PASSWORD
/opt/syneto/bin/ipmitool lan set 1 auth Operator MD5,PASSWORD
/opt/syneto/bin/ipmitool lan set 1 auth Admin MD5,PASSWORD
/opt/syneto/bin/ipmitool lan set 1 auth OEM MD5,PASSWORD