Hebenstreit, Michael
2014-08-26 04:28:52 UTC
Could anyone please give me a hint what's going wrong here when activating the session? Any help would be very much appreciated
lanplus interface does not work either
Thanks
Michael
# ipmitool -vvvvv -I lan -H 36.105.71.32 -U admin -P XXXXXXX chassis power status
ipmi_lan_send_cmd:opened=[0], open=[4524816]
IPMI LAN host 36.105.71.32 port 623
Sending IPMI/RMCP presence ping packet
send_packet (12 bytes)
06 00 ff 06 00 00 11 be 80 00 00 00
recv_packet (28 bytes)
06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2
03 00 00 00 81 00 00 00 00 00 00 00
Received IPMI/RMCP response packet:
IPMI Supported
ASF Version 1.0
RMCP Version 1.0
RMCP Sequence 255
IANA Enterprise 7154
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x01 cmd=0x38
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 04 38 0e 04 31
recv_packet (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
ipmi message header (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 01
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x01 cmd=0x38
get_auth_capabilities (8 bytes)
01 14 04 00 00 00 00 00
Channel 01 Authentication Capabilities:
Privilege Level : ADMINISTRATOR
Auth Types : MD5 PASSWORD
Per-msg auth : enabled
User level auth : enabled
Non-null users : enabled
Null users : disabled
Anonymous login : disabled
Proceeding with AuthType MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x02 cmd=0x39
06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18
c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00
00 00 00 00 00 33
recv_packet (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
ipmi message header (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 02
<< Rs Lun : 0
<< Command : 39
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x02 cmd=0x39
get_session_challenge (20 bytes)
e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93
e5 62 08 db
Opening Session
Session ID : 09851fe0
Challenge : b7fbc8eb257fd61c8af39c93e56208db
Privilege Level : ADMINISTRATOR
Auth Type : MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x03 cmd=0x3a
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
No response from remote controller
cleared list entry seq=0x03 cmd=0x3a
Activate Session command failed
Error: Unable to establish LAN session
Failed to open LAN interface
Unable to get Chassis Power Status
------------------------------------------------------------------------
Michael Hebenstreit Senior Cluster Architect
Intel Corporation, MS: RR1-105/H14 Software and Services Group/DCE
4100 Sara Road Tel.: +1 505-794-3144
Rio Rancho, NM 87124
UNITED STATES E-mail: ***@intel.com
lanplus interface does not work either
Thanks
Michael
# ipmitool -vvvvv -I lan -H 36.105.71.32 -U admin -P XXXXXXX chassis power status
ipmi_lan_send_cmd:opened=[0], open=[4524816]
IPMI LAN host 36.105.71.32 port 623
Sending IPMI/RMCP presence ping packet
send_packet (12 bytes)
06 00 ff 06 00 00 11 be 80 00 00 00
recv_packet (28 bytes)
06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2
03 00 00 00 81 00 00 00 00 00 00 00
Received IPMI/RMCP response packet:
IPMI Supported
ASF Version 1.0
RMCP Version 1.0
RMCP Sequence 255
IANA Enterprise 7154
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x01 cmd=0x38
IPMI Request Session Header (level 0)
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 01
Rq Lun : 0
Command : 38
send_packet (23 bytes)Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 01
Rq Lun : 0
Command : 38
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 04 38 0e 04 31
recv_packet (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
ipmi message header (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 01
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x01 cmd=0x38
get_auth_capabilities (8 bytes)
01 14 04 00 00 00 00 00
Channel 01 Authentication Capabilities:
Privilege Level : ADMINISTRATOR
Auth Types : MD5 PASSWORD
Per-msg auth : enabled
User level auth : enabled
Non-null users : enabled
Null users : disabled
Anonymous login : disabled
Proceeding with AuthType MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x02 cmd=0x39
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 02
Rq Lun : 0
Command : 39
send_packet (38 bytes)Authtype : MD5
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 02
Rq Lun : 0
Command : 39
06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18
c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00
00 00 00 00 00 33
recv_packet (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
ipmi message header (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 02
<< Rs Lun : 0
<< Command : 39
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x02 cmd=0x39
get_session_challenge (20 bytes)
e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93
e5 62 08 db
Opening Session
Session ID : 09851fe0
Challenge : b7fbc8eb257fd61c8af39c93e56208db
Privilege Level : ADMINISTRATOR
Auth Type : MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x03 cmd=0x3a
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2cAuthtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2cAuthtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2cAuthtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2cAuthtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
No response from remote controller
cleared list entry seq=0x03 cmd=0x3a
Activate Session command failed
Error: Unable to establish LAN session
Failed to open LAN interface
Unable to get Chassis Power Status
------------------------------------------------------------------------
Michael Hebenstreit Senior Cluster Architect
Intel Corporation, MS: RR1-105/H14 Software and Services Group/DCE
4100 Sara Road Tel.: +1 505-794-3144
Rio Rancho, NM 87124
UNITED STATES E-mail: ***@intel.com