back to article Marvell, Dell team on SmartNIC for 5G servers

Dell and Marvell have linked arms to create an accelerator card for servers used in 5G networks. Announced today ahead of the Mobile World Congress (MWC) conference, the "Dell Open RAN Accelerator Card" uses Marvell's Octeon – silicon dedicated to networking chores – so that the CPUs housed in PowerEdge servers used in 5G …

  1. Anonymous Coward
    Anonymous Coward

    Is it me?

    Or does there seem an awful lot of potential attack vectors in all of these layers?

    Firstly, ILO, (on HPE servers, HPE's management system) which I've never found particular robust or stable or easy to manage. Maybe the result of the Active Health Management System that excessively wrote to the 4M flash storage and caused premature hardware failure of HP Server's on-board flash storage.

    HPE have not helped, they have consistently just batted away the issue (their support is a minefield to navigate, as is updating ILO, formatting it via scripting (not that easy), even just following the advisories etc. Hours upon hours to nothing. The biggest bugbear with so many failed servers due to ILO, was it was initially impossible to update the system ROMPaq on devices out of 1yr warranty, you had to pay to get access to that update.

    Only once the issue was identified by HPE, were fixes made available, several years into the problem, long after the flash memory had been damaged beyond repair for most users. The fixes, that have been put out there, seem superficial 'made to look like they work, but don't', HP added "Format Flash" option, (a botch if there ever was) within ILO interface that just doesn't work (yet to find a machine that it did with the affected fault). Fundamentally, it doesn't solve the issue of the hardware onboard flash storage being excessively written by the Health Management System Engine and damaged beyond repair.

    Then there is the underlying iffy Intel Linux based management engine, that in effect works across core network and outer RAN designs. Newer Intel chips having a new Linux based sub-system, that seems, could work across core networks, by getting under the radar.

    If Government or others, want to write a complete spying sorry 'security' engine to sit on top of a forked/customised OpenRAN implementation, there really isn't much stopping them with this hardware, it's not that the Qualcomm hardware has holes 'as such' (too early to tell), it just has all the acceleration features to enable holes via customised software. The edge cards seem even sold, going by the blurb, with such marketing, incorporated into those Qualcomm Edge Cards, for on-the-fly decryption.

    Maybe it is me, but there seem an awful lot of potential attack vectors here in these products, and HP's ILO, really doesn't help things. Dell seem to re-use rebadged Qualcomm cards, from the information on the Qualcomm site.

    I suppose the only way we'll find out, is the hard way.

    1. Anonymous Coward
      Anonymous Coward

      Re: Is it me?

      To add: (because this is easier than dealing with HPE support).

      HPE, you really should put out a recall, and offer mainboard replacements for free to all affected products with ILO issues. (Gen8/Gen9) "Controller firmware revision 2.10.00 NAND write failture: Media is in a WRITE-PROTECTED state".

      The issue clearly wasn't acted upon, and dealt with within a time-frame that the end-user could have done anything to prevent the systematic hardware failure of the onboard flash, due to the excessive amount of data being written by the Active Health System Management Engine.

      I won't be recommending your products until you do.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022