20090702 remote administration of vmware server 2 - plembo/onemoretech GitHub Wiki

title: Remote administration of VMware Server 2 link: https://onemoretech.wordpress.com/2009/07/02/remote-administration-of-vmware-server-2/ author: lembobro description: post_id: 289 created: 2009/07/02 22:23:32 created_gmt: 2009/07/02 22:23:32 comment_status: open post_name: remote-administration-of-vmware-server-2 status: publish post_type: post

Remote administration of VMware Server 2

VMware Server 2.0 implements the new (well, for free Server users at least — ESX and ESXi have had it for ages) web interface for administration. When you install the server the listener for this is configured for ports 8222 and 8333. The former is only reachable if you’re coming in locally. Remote users have to use the latter, which is supposed to provide a “secure” SSL session, by dialing up https://[fully qualified hostname]:8333. Of course there’s a trick (or two) to making that work.

1. Turn off your popup blocker;

2. Accept the bogus SSL certificate that the server ships with.

On second thought, don’t turn off your popup blocker, wise guy, so you’ll get to stare at the blank gray screen that results when the login box popup is blocked (without the usual request to allow the popup).

As someone recently noted there are really two purposes to an SSL session. One is to provide an encrypted channel for communications. The other is to give the user some assurance that the site they’re connected to is actually who it says it is. That’s why we’ve implemented chains of trust using SSL certificates. The shipping bogus SSL cert for VMware server gives you the former, but not the latter.

Have no fear though, muchachos, you can actually install a legit certificate and key to replace VMware’s bogus pair and resolve this crisis. Got this from a piece by Arun Stephens, [VMware Server 2.0

Copyright 2004-2019 Phil Lembo