Release Notes
file:///T|/htdocs/SOFTWARE/smdrac3/drac4/1.35/en/readme/DRAC4Readme.txt[10/26/2012 10:06:04 AM]
* The last user in the "cfgUserAdmin" group cannot be deleted.
* Virtual Media supports single session/single track, CD/DVD/image
data. (140403)
* The DRAC 4 will accept a Virtual Media connection to a disabled
virtual drive. This allows you to connect to the system and
enable the virtual drive for the next boot (the enable/disable
feature for Virtual Media does not take effect until the next boot).
(144613)
* Manually removing or modifying either the A record or TXT record
associated with the "cfgDNSRacName", via the DNS server
administrative interface will cause unexpected results.
* When the RAC name ("cfgDNSRacName") is not the default name
("RAC-<service tag>") and the firmware repair utility diskettes are
used to update the DRAC 4, two RAC names (the original and the
default) with the same IP address may be seen on the DNS server.
Other DRAC 4 firmware update methods avoid this behavior.
* The RAC will reset its NIC every 30 seconds when the network is
idle, to guarantee operational physical hardware mechanisms.
* The DRAC 4 DDNS implementation requires that DNS servers be
configured to allow non-secure updates.
* If the network bandwidth is low and Console Redirection is required,
the key repetition rate should be set to slow on the server.
* The PuTTY SSH client closes the connection when "gettracelog",
"getsel", "connect com2", or "connect -h com2" is executed. This is
a PuTTY client issue. The OpenSSH client works correctly.
* When a telnet login is invalid, a single session is counted towards
the maximum of four sessions for approximately one minute after the
invalid login attempt. If there are already three valid sessions,
this invalid session will prevent further login attempts for that
minute.
* If you run the Nessus Vulnerability test on the DRAC 4, you may see
the following vulnerabilities reported:
- Nessus reports HTTP (80/tcp) vulnerability as: "The remote
proxy is vulnerable to format strings attacks when issued a
badly-formed user name. This flaw allows an attacker to execute
arbitrary code on this host."
This report is displayed due to all HTTP requests (legal or not)
being forwarded by the DRAC 4 to HTTPS. It is not a security
issue on the DRAC 4.
- Nessus reports HTTP (80/tcp) vulnerability as: "It may be possible
to make a web server execute arbitrary code by sending it a too