Chris St Amand
2005-05-06 19:48:49 UTC
I am trying to establish a SOL connection with an Intel 2.0 IPMI machine. I
believe/hope that the Intel IPMI 2.0 implementation properly supports the
IPMI 2.0 SOL. The machine is an SE8520BD2 with an IPMI 2.0 add-on card.
I receive different errors depending on what I try. The verbose output is
below. Is this a problem with the machine itself? Or am I not sending
correcfly formmatted commands? I am new to ipmitool and I suspect
something I am doing is wrong because even though I put -P <password> it
always asks me for my password again anyways.
My second? question is regarding the Howto by Tim. Do I follow the same
process for an IPMI 2.0 machine or is there a more direct method since I am
connecting to an Intel IPMI 2.0 machine which should have the correct IPMI
2.0 SOL compatibility. If I am not asking the right question, please feel
free to tell me the right one and also the answer to it ;)
Thanks
- Chris
===================================
Here is some of my output:
[***@localhost usr]# ipmitool -I lanplus -H 192.168.100.218 -U admin -P
1234 -a sol activate -vvvv
Password:
IPMI LAN host 192.168.100.218 port 623
c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 86 0e 03 00 00 00 00 10
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x00 cmd=0x38
00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
<< Received data (52 bytes)
06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
00 00 00 00 a4 a3 a2 a0 c2 73 2c 01 00 00 00 08
01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08
01 00 00 00
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Maximum privilege level : Unknown (0x00)
<< Console Session ID : 0xa0a2a3a4
<< BMC Session ID : 0x012c73c2
<< Negotiated authenticatin algorithm : hmac_sha1
<< Negotiated integrity algorithm : hmac_sha1_96
<< Negotiated encryption algorithm : aes_cbc_128
00 00 00 00 c2 73 2c 01 a3 c8 19 5b 23 78 81 55
a6 d8 5f cd 8e 84 a2 87 14 00 00 05 61 64 6d 69
6e
<< Received data (76 bytes)
06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00
00 00 00 00 a4 a3 a2 a0 0e 5c d2 a3 cf d4 f5 2b
9d c0 5c ca 1c b5 49 f9 23 25 c4 85 45 f3 11 da
93 a4 00 04 23 af a1 66 89 1b 81 3e 23 8b d6 83
84 cf d8 50 ef a4 f9 dc 95 87 45 ae
<<RAKP 2 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< BMC random number : 0x0e5cd2a3cfd4f52b9dc05cca1cb549f9
<< BMC GUID : 0x2325c48545f311da93a4000423afa166
<< Key exchange auth code [sha1] :
0x891b813e238bd68384cfd850efa4f9dc958745ae
bmc_rand (16 bytes)
0e 5c d2 a3 cf d4 f5 2b 9d c0 5c ca 1c b5 49 f9
a6 d8 5f cd 8e 84 a2 87 0e 5c d2 a3 cf d4 f5 2b
9d c0 5c ca 1c b5 49 f9 23 25 c4 85 45 f3 11 da
93 a4 00 04 23 af a1 66 14 05 61 64 6d 69 6e
00 00 00 00
95 87 45 ae
a4 a3 a2 a0 14 05 61 64 6d 69 6e
00 00 00 00
generated rakp3 mac (20 bytes)
ca 0b 01 1f 7b 49 60 e5 b3 42 4d ac 22 62 3f 69
fc f5 18 72
session integrity key input (39 bytes)
a3 c8 19 5b 23 78 81 55 a6 d8 5f cd 8e 84 a2 87
0e 5c d2 a3 cf d4 f5 2b 9d c0 5c ca 1c b5 49 f9
14 05 61 64 6d 69 6e
Generated session integrity key (20 bytes)
e3 a1 12 25 77 cf 1f 41 21 ff 04 de 08 47 d3 4b
8f b7 64 2b
Generated K1 (20 bytes)
e1 0e a7 39 7b b4 ab 71 d0 2c e0 cf a3 29 79 b4
4b 9c 41 a4
Generated K2 (20 bytes)
8c 5e 64 1a 93 6b 02 5a bb 8f c2 a3 01 88 d8 f0
8c b7 7c f1
00 00 00 00 c2 73 2c 01 ca 0b 01 1f 7b 49 60 e5
b3 42 4d ac 22 62 3f 69 fc f5 18 72
<< Received data (24 bytes)
06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
00 0f 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : invalid integrity check value
<< Console Session ID : 0xa0a2a3a4
<< Key exchange auth code [sha1] : 0x005cd2a3cfd4f52b9dc05cca
RAKP 4 message indicates an error : invalid integrity check value
Error: Unable to establish IPMI v2 / RMCP+ session
Error: No response activating SOL payload
============================================================================
=======
[***@localhost root]# ipmitool -I lanplus -H 192.168.100.218 -U admin -P
1234 bmc info -vvvv
IPMI LAN host 192.168.100.218 port 623
c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 86 0e 03 00 00 00 00 10
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x00 cmd=0x38
00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
<< Received data (24 bytes)
06 00 ff 07 06 11 00 00 00 00 00 00 00 00 08 00
00 01 00 00 a4 a3 a2 a0
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : insufficient resources for session
<< Maximum privilege level : Unknown (0x00)
<< Console Session ID : 0xa0a2a3a4
Error in open session response message : insufficient resources for session
Error: Unable to establish IPMI v2 / RMCP+ session
Get Device ID command failed
[***@localhost root]#
============================================================================
==
Here is my output when connecting with a regular IOL connection:
[***@localhost usr]# ipmitool -I lan -H 192.168.100.218 -U admin -P 1234
bmc info
Device ID : 32
Device Revision : 1
Firmware Revision : 0.43
IPMI Version : 2.0
Manufacturer ID : 343
Product ID : 35 (0x0023)
Device Available : yes
Provides Device SDRs : no
Additional Device Support :
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Chassis Device
Aux Firmware Rev Info :
0x00
0x10
0x00
0x3d
[***@localhost usr]#
believe/hope that the Intel IPMI 2.0 implementation properly supports the
IPMI 2.0 SOL. The machine is an SE8520BD2 with an IPMI 2.0 add-on card.
I receive different errors depending on what I try. The verbose output is
below. Is this a problem with the machine itself? Or am I not sending
correcfly formmatted commands? I am new to ipmitool and I suspect
something I am doing is wrong because even though I put -P <password> it
always asks me for my password again anyways.
My second? question is regarding the Howto by Tim. Do I follow the same
process for an IPMI 2.0 machine or is there a more direct method since I am
connecting to an Intel IPMI 2.0 machine which should have the correct IPMI
2.0 SOL compatibility. If I am not asking the right question, please feel
free to tell me the right one and also the answer to it ;)
Thanks
- Chris
===================================
Here is some of my output:
[***@localhost usr]# ipmitool -I lanplus -H 192.168.100.218 -U admin -P
1234 -a sol activate -vvvv
Password:
IPMI LAN host 192.168.100.218 port 623
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04
BUILDING A v1.5 COMMANDnetfn : 0x06
command : 0x38
data : 0x8e 0x04
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 86 0e 03 00 00 00 00 10
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x00 cmd=0x38
SENDING AN OPEN SESSION REQUEST
sending packet (48 bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00sending packet (48 bytes)
00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
<< Received data (52 bytes)
06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
00 00 00 00 a4 a3 a2 a0 c2 73 2c 01 00 00 00 08
01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08
01 00 00 00
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Maximum privilege level : Unknown (0x00)
<< Console Session ID : 0xa0a2a3a4
<< BMC Session ID : 0x012c73c2
<< Negotiated authenticatin algorithm : hmac_sha1
<< Negotiated integrity algorithm : hmac_sha1_96
<< Negotiated encryption algorithm : aes_cbc_128
Console generated random number (16 bytes)
a3 c8 19 5b 23 78 81 55 a6 d8 5f cd 8e 84 a2 87SENDING A RAKP 1 MESSAGE
sending packet (49 bytes)
06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00sending packet (49 bytes)
00 00 00 00 c2 73 2c 01 a3 c8 19 5b 23 78 81 55
a6 d8 5f cd 8e 84 a2 87 14 00 00 05 61 64 6d 69
6e
<< Received data (76 bytes)
06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00
00 00 00 00 a4 a3 a2 a0 0e 5c d2 a3 cf d4 f5 2b
9d c0 5c ca 1c b5 49 f9 23 25 c4 85 45 f3 11 da
93 a4 00 04 23 af a1 66 89 1b 81 3e 23 8b d6 83
84 cf d8 50 ef a4 f9 dc 95 87 45 ae
<<RAKP 2 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< BMC random number : 0x0e5cd2a3cfd4f52b9dc05cca1cb549f9
<< BMC GUID : 0x2325c48545f311da93a4000423afa166
<< Key exchange auth code [sha1] :
0x891b813e238bd68384cfd850efa4f9dc958745ae
bmc_rand (16 bytes)
0e 5c d2 a3 cf d4 f5 2b 9d c0 5c ca 1c b5 49 f9
rakp2 mac input buffer (63 bytes)
a4 a3 a2 a0 c2 73 2c 01 a3 c8 19 5b 23 78 81 55a6 d8 5f cd 8e 84 a2 87 0e 5c d2 a3 cf d4 f5 2b
9d c0 5c ca 1c b5 49 f9 23 25 c4 85 45 f3 11 da
93 a4 00 04 23 af a1 66 14 05 61 64 6d 69 6e
rakp2 mac key (20 bytes)
31 32 33 34 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00
rakp2 mac as computed by the remote console (20 bytes)
89 1b 81 3e 23 8b d6 83 84 cf d8 50 ef a4 f9 dc95 87 45 ae
rakp3 mac input buffer (27 bytes)
0e 5c d2 a3 cf d4 f5 2b 9d c0 5c ca 1c b5 49 f9a4 a3 a2 a0 14 05 61 64 6d 69 6e
rakp3 mac key (20 bytes)
31 32 33 34 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00
generated rakp3 mac (20 bytes)
ca 0b 01 1f 7b 49 60 e5 b3 42 4d ac 22 62 3f 69
fc f5 18 72
session integrity key input (39 bytes)
a3 c8 19 5b 23 78 81 55 a6 d8 5f cd 8e 84 a2 87
0e 5c d2 a3 cf d4 f5 2b 9d c0 5c ca 1c b5 49 f9
14 05 61 64 6d 69 6e
Generated session integrity key (20 bytes)
e3 a1 12 25 77 cf 1f 41 21 ff 04 de 08 47 d3 4b
8f b7 64 2b
Generated K1 (20 bytes)
e1 0e a7 39 7b b4 ab 71 d0 2c e0 cf a3 29 79 b4
4b 9c 41 a4
Generated K2 (20 bytes)
8c 5e 64 1a 93 6b 02 5a bb 8f c2 a3 01 88 d8 f0
8c b7 7c f1
SENDING A RAKP 3 MESSAGE
sending packet (44 bytes)
06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00sending packet (44 bytes)
00 00 00 00 c2 73 2c 01 ca 0b 01 1f 7b 49 60 e5
b3 42 4d ac 22 62 3f 69 fc f5 18 72
<< Received data (24 bytes)
06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
00 0f 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : invalid integrity check value
<< Console Session ID : 0xa0a2a3a4
<< Key exchange auth code [sha1] : 0x005cd2a3cfd4f52b9dc05cca
RAKP 4 message indicates an error : invalid integrity check value
Error: Unable to establish IPMI v2 / RMCP+ session
Error: No response activating SOL payload
============================================================================
=======
[***@localhost root]# ipmitool -I lanplus -H 192.168.100.218 -U admin -P
1234 bmc info -vvvv
IPMI LAN host 192.168.100.218 port 623
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04
BUILDING A v1.5 COMMANDnetfn : 0x06
command : 0x38
data : 0x8e 0x04
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 86 0e 03 00 00 00 00 10
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x00 cmd=0x38
SENDING AN OPEN SESSION REQUEST
sending packet (48 bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00sending packet (48 bytes)
00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
<< Received data (24 bytes)
06 00 ff 07 06 11 00 00 00 00 00 00 00 00 08 00
00 01 00 00 a4 a3 a2 a0
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : insufficient resources for session
<< Maximum privilege level : Unknown (0x00)
<< Console Session ID : 0xa0a2a3a4
Error in open session response message : insufficient resources for session
Error: Unable to establish IPMI v2 / RMCP+ session
Get Device ID command failed
[***@localhost root]#
============================================================================
==
Here is my output when connecting with a regular IOL connection:
[***@localhost usr]# ipmitool -I lan -H 192.168.100.218 -U admin -P 1234
bmc info
Device ID : 32
Device Revision : 1
Firmware Revision : 0.43
IPMI Version : 2.0
Manufacturer ID : 343
Product ID : 35 (0x0023)
Device Available : yes
Provides Device SDRs : no
Additional Device Support :
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Chassis Device
Aux Firmware Rev Info :
0x00
0x10
0x00
0x3d
[***@localhost usr]#