Discussion:
[Ipmitool-devel] querying Apple Xserve with ipmitool 1.8.9
Lev Givon
2007-07-26 23:13:52 UTC
Permalink
I recently tried to use a build of ipmitool 1.8.9 on Linux to remotely
access the Lights Out Management device of an Apple Xserve (Intel
architecture). Although I was able to use the current version (2.0.0,
strangely enough) of ipmitool included in MacOSX 10.4.10 to access
said Xserve by specifying a username and password on the command line,
invoking the binary built on Linux with the same parameters resulted
in the following error:

Invalid user name
Error: Unable to establish LAN session
Get Device ID command failed
Unable to open SDR for reading

Does anyone happen to know whether it is necessary to specify some
special combination of parameters to the open source version of
ipmitool to permit it to access Apple's LOM?

L.G.
Jim Murphy
2007-07-28 23:56:12 UTC
Permalink
Post by Lev Givon
I recently tried to use a build of ipmitool 1.8.9 on Linux to remotely
access the Lights Out Management device of an Apple Xserve (Intel
architecture). Although I was able to use the current version (2.0.0,
strangely enough) of ipmitool included in MacOSX 10.4.10 to access
said Xserve by specifying a username and password on the command line,
invoking the binary built on Linux with the same parameters resulted
Invalid user name
Error: Unable to establish LAN session
Get Device ID command failed
Unable to open SDR for reading
What command line parameters did you specify? Did you specify the "-
C" (for Cypher Suite) option?

Also, what does the result from "mc info" show when using the Mac OS
X version of ipmitool?

(FWIW, I'm the software lead at Apple for all things BMC/LOM on Xserve.)

I apologize for the confusion calling ipmitool on Mac OS X version 2.
In hindsight, I probably should have done something different to
differentiate our version. At a high level it still resembles
ipmitool (upon which it was based), but behind the scenes it's been
completely gutted to support our IPMI software infrastructure.


Jim Murphy
Lev Givon
2007-07-29 18:46:06 UTC
Permalink
Post by Jim Murphy
Post by Lev Givon
I recently tried to use a build of ipmitool 1.8.9 on Linux to remotely
access the Lights Out Management device of an Apple Xserve (Intel
architecture). Although I was able to use the current version (2.0.0,
strangely enough) of ipmitool included in MacOSX 10.4.10 to access
said Xserve by specifying a username and password on the command line,
invoking the binary built on Linux with the same parameters resulted
Invalid user name
Error: Unable to establish LAN session
Get Device ID command failed
Unable to open SDR for reading
What command line parameters did you specify? Did you specify the
"-C" (for Cypher Suite) option?
ipmitool -U myusername -H myxserve.com chassis status

I also tried ipmitool with the following parameters:

ipmitool -C 3 -L OPERATOR -I lanplus -U myusername -H myxserve.com
chassis status

This resulted in the following error when I tried it:

Error: Unable to establish IPMI v2 / RMCP+ session
Error sending Chassis Status command

Note that I built ipmitool against openssl 0.9.8e and freeipmi 0.3.1.
Post by Jim Murphy
Also, what does the result from "mc info" show when using the Mac OS X
version of ipmitool?
Device ID : 32
Device Revision : 1
Firmware Revision : 1.2.7
IPMI Version : 2.0
Manufacturer ID : 63
Manufacturer Name : Apple Computer, Inc.
Product ID : 1 (0x0001)
Device Available : yes
Provides Device SDRs : no
Additional Device Support :
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Chassis Device
Aux Firmware Rev Info :
0x01
0x00
0x27
0x01
Post by Jim Murphy
(FWIW, I'm the software lead at Apple for all things BMC/LOM on Xserve.)
What better person to respond to my question? :-)
Post by Jim Murphy
I apologize for the confusion calling ipmitool on Mac OS X version
2. In hindsight, I probably should have done something different to
differentiate our version. At a high level it still resembles
ipmitool (upon which it was based), but behind the scenes it's been
completely gutted to support our IPMI software infrastructure.
Perhaps a note in future versions of the man page would ameliorate the
confusion; judging from the page, one is lead to believe that there
should be no functional difference between the MacOSX version and the
stock open source version.
Post by Jim Murphy
Jim Murphy
L.G.
Lev Givon
2007-08-30 12:30:35 UTC
Permalink
Post by Lev Givon
Post by Jim Murphy
Post by Lev Givon
I recently tried to use a build of ipmitool 1.8.9 on Linux to remotely
access the Lights Out Management device of an Apple Xserve (Intel
architecture). Although I was able to use the current version (2.0.0,
strangely enough) of ipmitool included in MacOSX 10.4.10 to access
said Xserve by specifying a username and password on the command line,
invoking the binary built on Linux with the same parameters resulted
Invalid user name
Error: Unable to establish LAN session
Get Device ID command failed
Unable to open SDR for reading
What command line parameters did you specify? Did you specify the
"-C" (for Cypher Suite) option?
ipmitool -U myusername -H myxserve.com chassis status
ipmitool -C 3 -L OPERATOR -I lanplus -U myusername -H myxserve.com
chassis status
Error: Unable to establish IPMI v2 / RMCP+ session
Error sending Chassis Status command
Note that I built ipmitool against openssl 0.9.8e and freeipmi 0.3.1.
Post by Jim Murphy
Also, what does the result from "mc info" show when using the Mac OS X
version of ipmitool?
Device ID : 32
Device Revision : 1
Firmware Revision : 1.2.7
IPMI Version : 2.0
Manufacturer ID : 63
Manufacturer Name : Apple Computer, Inc.
Product ID : 1 (0x0001)
Device Available : yes
Provides Device SDRs : no
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Chassis Device
0x01
0x00
0x27
0x01
Sorry to touch on this again, but is there currently any way to use
ipmitool 1.8.9 on Linux to query the LOMs on Apple Xserves?

L.G.
Dmitry Frolov
2007-08-30 14:00:27 UTC
Permalink
* Lev Givon <***@columbia.edu> [30.08.2007 19:31]:

[...]
Post by Lev Givon
Sorry to touch on this again, but is there currently any way to use
ipmitool 1.8.9 on Linux to query the LOMs on Apple Xserves?
Found that while googling:

http://www.afp548.com/comment.php?mode=view&cid=8640

Let us know...
Lev Givon
2007-08-30 14:07:47 UTC
Permalink
Post by Dmitry Frolov
[...]
Post by Lev Givon
Sorry to touch on this again, but is there currently any way to use
ipmitool 1.8.9 on Linux to query the LOMs on Apple Xserves?
http://www.afp548.com/comment.php?mode=view&cid=8640
Let us know...
I noticed that page last month; when I tried it (with extra
verbosity turned on), ipmitool returned the following error:

Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

L.G.
Cress, Andrew R
2007-08-30 14:34:16 UTC
Permalink
If the server won't respond to Get Channel Authentication Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.

You would have to check locally on the server to see if IPMI LAN is
configured or not.

Andy

-----Original Message-----
From: ipmitool-devel-***@lists.sourceforge.net
[mailto:ipmitool-devel-***@lists.sourceforge.net] On Behalf Of Lev
Givon
Sent: Thursday, August 30, 2007 10:08 AM
To: ipmitool-***@lists.sourceforge.net
Subject: Re: [Ipmitool-devel] querying Apple Xserve with ipmitool 1.8.9
Post by Dmitry Frolov
[...]
Post by Lev Givon
Sorry to touch on this again, but is there currently any way to use
ipmitool 1.8.9 on Linux to query the LOMs on Apple Xserves?
http://www.afp548.com/comment.php?mode=view&cid=8640
Let us know...
I noticed that page last month; when I tried it (with extra
verbosity turned on), ipmitool returned the following error:

Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

L.G.

------------------------------------------------------------------------
-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
Lev Givon
2007-08-30 22:10:29 UTC
Permalink
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using

IPMITool -U username -H hostname sdr
Post by Cress, Andrew R
You would have to check locally on the server to see if IPMI LAN is
configured or not.
Andy
L.G.
Dmitry Frolov
2007-08-31 01:44:05 UTC
Permalink
Post by Lev Givon
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using
IPMITool -U username -H hostname sdr
You can get the dumps with Linux and Apple's ipmitool -vvv (if Apple's
ipmitool also supports this) and look at the difference.
Lev Givon
2007-08-31 02:11:40 UTC
Permalink
Post by Dmitry Frolov
Post by Lev Givon
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using
IPMITool -U username -H hostname sdr
You can get the dumps with Linux and Apple's ipmitool -vvv (if Apple's
ipmitool also supports this) and look at the difference.
Unfortunately, Apple's version of ipmitool doesn't print any extra
information when the verbosity flags are specified.

Here is what I obtained after running the command

ipmitool -vvv -C des -L OPERATOR -I lanplus -U username -H hostname chassis status

on Linux (username, hostname, and the requested password were all
specified properly). I probably ought to mention that my ipmitool
binary was built against freeipmi 0.3.1 and was configured with the
lanplus interface enabled.

IPMI LAN host hostname port 623
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session
Error sending Chassis Status command

L.G.
Jim Murphy
2007-09-08 00:36:53 UTC
Permalink
Post by Lev Givon
Post by Dmitry Frolov
Post by Lev Givon
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication
Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using
IPMITool -U username -H hostname sdr
You can get the dumps with Linux and Apple's ipmitool -vvv (if Apple's
ipmitool also supports this) and look at the difference.
Unfortunately, Apple's version of ipmitool doesn't print any extra
information when the verbosity flags are specified.
That's sort of a feature. Architecturally our version of ipmitool is
just a skeleton that wraps around a private system framework that
does all of the IPMI work. The verbosity flags are telling the tool
to tell the framework to be verbose, but that doesn't really do much
in the production version you have. I'll see if there is a way to
provide a debug version in the future that can be helpful for this
sort of issue.
Post by Lev Givon
Here is what I obtained after running the command
ipmitool -vvv -C des -L OPERATOR -I lanplus -U username -H hostname chassis status
There are two problems with your command line here.

Your "-C" cypher suite syntax is incorrect. The "C" parameter takes
an integer from 0 to 15, not an ASCII string. If you want to
explicitly specify it, "-C 3" is the strongest suite, but ipmitool
uses 3 as the default so you can omit it.

Second, our LOM firmware is from Intel, and you must tell ipmitool to
use the IntelPlus work-around for authentication.

With these two in mind, a valid command line would be:

ipmitool -o intelplus -L OPERATOR -I lanplus -U username -H hostname
chassis status


(Sorry I haven't responded sooner, but I've been out of the country
and away from work.)

Jim
Post by Lev Givon
on Linux (username, hostname, and the requested password were all
specified properly). I probably ought to mention that my ipmitool
binary was built against freeipmi 0.3.1 and was configured with the
lanplus interface enabled.
IPMI LAN host hostname port 623
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session
Error sending Chassis Status command
L.G.
----------------------------------------------------------------------
---
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a
browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Ipmitool-devel mailing list
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
Jim Murphy CPU Software Projects
***@apple.com Apple, Inc.
Jim Murphy
2007-09-08 04:00:04 UTC
Permalink
Post by Lev Givon
Post by Dmitry Frolov
Post by Lev Givon
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication
Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using
IPMITool -U username -H hostname sdr
You can get the dumps with Linux and Apple's ipmitool -vvv (if Apple's
ipmitool also supports this) and look at the difference.
Unfortunately, Apple's version of ipmitool doesn't print any extra
information when the verbosity flags are specified.
That's sort of a feature. Architecturally our version of ipmitool is
just a skeleton that wraps around a private system framework that
does all of the IPMI work. The verbosity flags are telling the tool
to tell the framework to be verbose, but that doesn't really do much
in the production version you have. I'll see if there is a way to
provide a debug version in the future that can be helpful for this
sort of issue.
Post by Lev Givon
Here is what I obtained after running the command
ipmitool -vvv -C des -L OPERATOR -I lanplus -U username -H hostname chassis status
There are two problems with your command line here.

Your "-C" cypher suite syntax is incorrect. The "C" parameter takes
an integer from 0 to 15, not an ASCII string. If you want to
explicitly specify it, "-C 3" is the strongest suite, but ipmitool
uses 3 as the default so you can omit it.

Second, our LOM firmware is from Intel, and you must tell ipmitool to
use the IntelPlus work-around for authentication.

With these two in mind, a valid command line would be:

ipmitool -o intelplus -L OPERATOR -I lanplus -U username -H hostname
chassis status


(Sorry I haven't responded sooner, but I've been out of the country
and away from work.)

Jim
Post by Lev Givon
on Linux (username, hostname, and the requested password were all
specified properly). I probably ought to mention that my ipmitool
binary was built against freeipmi 0.3.1 and was configured with the
lanplus interface enabled.
IPMI LAN host hostname port 623
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Post by Dmitry Frolov
Post by Lev Givon
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x03
BUILDING A v1.5 COMMAND
Post by Dmitry Frolov
Post by Lev Givon
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session
Error sending Chassis Status command
L.G.
----------------------------------------------------------------------
---
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a
browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Ipmitool-devel mailing list
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
Lev Givon
2007-09-09 07:11:28 UTC
Permalink
Post by Jim Murphy
Post by Lev Givon
Post by Dmitry Frolov
Post by Lev Givon
Post by Cress, Andrew R
If the server won't respond to Get Channel Authentication
Capabilities
(the first IPMI LAN request, required by the IPMI spec), then either the
IPMI LAN isn't configured, or it doesn't support IPMI LAN.
The LOM device on the Xserve is configured; I can successfully query
it using Apple's version of ipmitool from a remote machine using
IPMITool -U username -H hostname sdr
You can get the dumps with Linux and Apple's ipmitool -vvv (if Apple's
ipmitool also supports this) and look at the difference.
Unfortunately, Apple's version of ipmitool doesn't print any extra
information when the verbosity flags are specified.
That's sort of a feature. Architecturally our version of ipmitool is
just a skeleton that wraps around a private system framework that
does all of the IPMI work. The verbosity flags are telling the tool
to tell the framework to be verbose, but that doesn't really do much
in the production version you have. I'll see if there is a way to
provide a debug version in the future that can be helpful for this
sort of issue.
Post by Lev Givon
Here is what I obtained after running the command
ipmitool -vvv -C des -L OPERATOR -I lanplus -U username -H hostname chassis status
There are two problems with your command line here.
Your "-C" cypher suite syntax is incorrect. The "C" parameter takes
an integer from 0 to 15, not an ASCII string. If you want to
explicitly specify it, "-C 3" is the strongest suite, but ipmitool
uses 3 as the default so you can omit it.
Second, our LOM firmware is from Intel, and you must tell ipmitool to
use the IntelPlus work-around for authentication.
ipmitool -o intelplus -L OPERATOR -I lanplus -U username -H hostname
chassis status
This doesn't appear to work; I observed the same behavior as
previously described.
Post by Jim Murphy
(Sorry I haven't responded sooner, but I've been out of the country
and away from work.)
Jim
L.G.

Loading...