2018-02-20

Updating iDRAC SSL Certs through Powershell


One of the things I'm working on at work right now is updating all our iDRACs after Meltdown/Spectre. We had never had the SSL set up, we had just always clicked through the security warning. I got tired of this and decided to setup proper SSL from our enterprise CA,

At first I went to do a manual signing for a multi-year period with a wildcard issued from my enterprise CA, but I decided that automating it with PowerShell would be better, since it would be more dynamic, and scale to more servers.

In this post, I will be talking about setting

  1. generating a Certificate Signing Request (CSR) from the iDRAC,
  2. sign it with an enterprise CA, 
  3. uploads the signed cert to the iDRAC, and  
  4. reloads the iDRAC to apply the new cert




To interface with the iDRAC from the script, I'm using Dell Remote Access Controller Administration (RACADM) CLI, which supports remote access. 

First, you will want to make sure that your iDRAC has Remote RACADM enabled in make sure it is enabled under Network, Services, Remote RACADM in the iDRAC Web UI.  
Configure Remote RACADM through Network, Services, Remote RACADM

Next, we're going to want to run a few test commands with racadm in a fresh powershell prompt and run
& racadm.exe -r 192.168.100.215 -u root -p calvin getsvctag
 This will complain if the SSL certificate is invalid, which is kind of the point of why we are updating it in the first place. So you will probably see output like below


That first line after the certificate warning, is the service tag. I am using -r IP  but -r DNS.Host.Name is equally valid, if there is an entry set up, which I would highly recommend.

The script is divided into a few sections

  1. The Requirements Region - to make sure that we're running with a current version of PowerShell, that we have racadm.exe, and that we have certreq.exe
  2. Settings to connect to the iDRAC - the IP/hostname, and the credentials to connect to it
  3. CSR Fields
  4. Applying DNS and CSR settings to iDRAC
  5. Generating CSR
  6. Signing CSR
  7. Uploading signed certificate to iDRAC and reloading to apply
At first, I was applying the settings with 8+ separate racadm calls, but this was quite time consuming to wait for each to finish. Instead I switched to building a config file and applying that for all the CSR settings at once. 

You can pull a cfg or config file of what settings an iDRAC has with 
& racadm.exe -r 192.168.100.215 -u root -p calvin get -f $ENV:Temp\file.cfg
 and there are some interesting line-endings.

This line ending pattern is interesting, but in my testing it was a red-herring and it was perfectly happy if I just made my config file with CR-LF Line endings. 

However, I did find that I needed to have my config file I created ANSI encoded. I did this by specifying -Encoding ASCII  when I wrote my string with Out-File



#Requires -Version 5
#region Requirements
#Make sure you have DRAC tools installed, including racadm https://www.dell.com/support/home/us/en/4/Drivers/DriversDetails?driverId=K7F2N
If (!$(get-command racadm.exe -ErrorAction SilentlyContinue)) {Write-Host "Exiting, racadm does not exist"; Exit }
If (!$(get-command certreq.exe -ErrorAction SilentlyContinue)) {Write-Host "Exiting, certreq does not exist. Please install Certificate services tools."; Exit }
#endregion
$IP = '192.168.100.215' #Hostname also works if DNS is already setup
$idraccred = Get-Credential -Message "Please provide iDrac Login for $IP"
$idracuser = $idraccred.GetNetworkCredential().UserName
$idracpass = $idraccred.GetNetworkCredential().Password
$svcTag = $(& racadm.exe -r $IP -u $idracuser -p $idracpass getsvctag ).trim() -replace '[^a-zA-Z0-9]', '' #Get output, remove all spaces and smash together all letters and numbers
$svcTag = ($svcTag -match "^([A-Z0-9]{7})$")[-1] #Match each grouping of seven letters and numbers (like a service tag) and take the last one from the end, which should always be the service tag
$idracName = "idrac-$svcTag"
$domName = 'domain.local'
$CAname = 'CA.domain.local\CA1-CA'
$CSRContactEmail = 'IT@contoso.one'
$CSROrgname = 'Consoto One'
$CsrCountryCode = 'US'
$csrLocality = 'Asheville'
$csrState = 'NC'
#Not really needed, but I'll set them to keep everything neat
& racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.NIC.DNSRacName $idracName
& racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.NIC.DNSDomainName $domName
#Setup CSR Fields
$idracoptions = @"
[iDRAC.Security]
CsrCommonName=$idracName.$domName
CsrCountryCode=$CsrCountryCode
CsrEmailAddr=$CSRContactEmail
CsrKeySize=2048
CsrOrganizationName=$CSROrgname
CsrOrganizationUnit=IT
CsrLocalityName=$csrLocality
CsrStateName=$csrState
"@
Out-File "$env:temp\$idracName.cfg" -InputObject $idracoptions -Encoding ascii
& racadm.exe -r $IP -u $idracuser -p $idracpass set -f "$env:temp\$idracName.cfg"
#region separate racadm commands to apply this config file's settings individually
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrCommonName $idracName.$domName
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrCountryCode US
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrEmailAddr $CSRContactEmail
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrKeySize 2048
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrOrganizationName $CSROrgname
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrOrganizationUnit IT
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrLocalityName $csrLocality
# # & racadm.exe -r $IP -u $idracuser -p $idracpass set iDRAC.Security.CsrStateName $csrState
#endregion
#Make sure we have our scratch directory to work in
If ( (Test-Path "$env:TEMP\Powershellssl\") -eq $false ) { New-Item -ItemType Directory -Path "$env:TEMP\Powershellssl\"}
#Build Filenames and have the idrac Generate the Cert
$csrPath = Join-Path "$Env:TEMP\PowerShellSSL\" -ChildPath ("$idracName-" + $( Get-Date -f "yyyyMMdd") + ".csr" )
$outCert = Join-Path "$Env:TEMP\PowerShellSSL\" -ChildPath ("$idracName-" + $( Get-Date -f "yyyyMMdd") + ".cer" )
& racadm -r $IP -u $idracuser -p $idracpass sslcsrgen -g -f $csrPath
#Sign the cert signing request with certreq
& certreq.exe -config $CAname -attrib ""CertificateTemplate:WebServer"" $csrPath $outCert
#Upload Signed cert to iDRAC
& racadm.exe -r $IP -u $idracuser -p $idracpass sslcertupload -t 1 -f $outCert
#Reload the idrac to have the fresh SSL cert show.
& racadm.exe -r $IP -u $idracuser -p $idracpass racreset #Reset as in Reload, not reset settings. racresetcfg will reset the settings too

5 comments:

  1. Thanks for this guide, great work.

    How can I do multiple servers from the script?

    Thanks!

    ReplyDelete
  2. Another thing; getting this error;

    ERROR: The Common Name (CN) field of the CSR Security group must
    be configured before a CSR can be generated.

    IS this script compatible with v6 of IDRAC?

    Thanks

    ReplyDelete
  3. This script saved me a lot of time!!!! Very easy to read. Thank you. Wasn't hard to automate about 100 certs from a CSV.

    ReplyDelete
  4. Bummer, as of iDRAC Version 4.40, this no longer works, as the "racadm.exe -r $IP -u $idracuser -p $idracpass set -f "$env:temp\$idracName.cfg" function was removed.
    I had to convert the $idracoptions = @" section to match the XML and then upload the cfg as a xml file to get it to work on the newer version.

    ReplyDelete
    Replies
    1. I know this a few years old, but do you happen to have a sample of your script?

      Delete

Putting your public website on your Domain Controllers .... Sort of

In a post a while back I talked about a current trend to move websites from www.contoso.one to just contoso.one . The method I outlined in t...