On Wed, Apr 1, 2020 at 9:26 AM Erinn Looney-Triggs
<[email protected]> wrote:
> We have found a solution of sorts by using Dell's plugins:
> https://exchange.nagios.org/directory/Plugins/Hardware/Server-Hardware/Dell/Dell-EMC-OpenManage-Plug-2Din-for-Nagios-Core/details
> which essentially do what we want. Somewhere in those scripts is (I am
> sure) an API key that is being used to pull this information from their
> API. So essentially we just use their tools because they made it such a
> huge PITA to query the data independently.

Oh but that's beautiful, thanks for pointing that out.

I gave a quick look at this Dell-provided Nagios plugin, and indeed,
there's an hard-coded API key (v4) in it, that is used to get the
warranty information, and which still works. It's tentatively hidden
in a jar file, but really, this is brilliant.

So not only did they not update their own tools to use the new
"improved security" v5 API, but they're hard-coding API credentials in
their official products (it's here:
https://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverid=25R9X).
And they obviously kept that old v4 key active while deactivating all
of their customers' and forcing them down the OAuth2 road.

Congratulations, Dell, you certainly won a prize here.

Cheers,
-- 
Kilian

_______________________________________________
Linux-PowerEdge mailing list
[email protected]
https://lists.us.dell.com/mailman/listinfo/linux-poweredge

Reply via email to