Discussion:
[Ipmitool-devel] problems opening a connection
Hebenstreit, Michael
2014-08-26 04:28:52 UTC
Permalink
Could anyone please give me a hint what's going wrong here when activating the session? Any help would be very much appreciated

lanplus interface does not work either

Thanks
Michael

# ipmitool -vvvvv -I lan -H 36.105.71.32 -U admin -P XXXXXXX chassis power status
ipmi_lan_send_cmd:opened=[0], open=[4524816]
IPMI LAN host 36.105.71.32 port 623
Sending IPMI/RMCP presence ping packet
send_packet (12 bytes)
06 00 ff 06 00 00 11 be 80 00 00 00
recv_packet (28 bytes)
06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2
03 00 00 00 81 00 00 00 00 00 00 00
Received IPMI/RMCP response packet:
IPMI Supported
ASF Version 1.0
RMCP Version 1.0
RMCP Sequence 255
IANA Enterprise 7154

ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x01 cmd=0x38
IPMI Request Session Header (level 0)
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 01
Rq Lun : 0
Command : 38
send_packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 04 38 0e 04 31
recv_packet (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
ipmi message header (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 04 38 00 01 14 04 00 00 00 00 00 8b
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 01
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x01 cmd=0x38
get_auth_capabilities (8 bytes)
01 14 04 00 00 00 00 00
Channel 01 Authentication Capabilities:
Privilege Level : ADMINISTRATOR
Auth Types : MD5 PASSWORD
Per-msg auth : enabled
User level auth : enabled
Non-null users : enabled
Null users : disabled
Anonymous login : disabled

Proceeding with AuthType MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x02 cmd=0x39
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 02
Rq Lun : 0
Command : 39
send_packet (38 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18
c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00
00 00 00 00 00 33
recv_packet (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
ipmi message header (42 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
1c 8a f3 9c 93 e5 62 08 db 41
<< IPMI Response Session Header
<< Authtype : NONE
<< Sequence : 0x00000000
<< Session ID : 0x00000000
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 02
<< Rs Lun : 0
<< Command : 39
<< Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x02 cmd=0x39
get_session_challenge (20 bytes)
e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93
e5 62 08 db
Opening Session
Session ID : 09851fe0
Challenge : b7fbc8eb257fd61c8af39c93e56208db
Privilege Level : ADMINISTRATOR
Auth Type : MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x03 cmd=0x3a
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
IPMI Request Session Header (level 0)
Authtype : MD5
Sequence : 0x00000000
Session ID : 0x09851fe0
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 03
Rq Lun : 0
Command : 3a
MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
9c 93 e5 62 08 db 77 de 00 66 a7
No response from remote controller
cleared list entry seq=0x03 cmd=0x3a
Activate Session command failed
Error: Unable to establish LAN session
Failed to open LAN interface
Unable to get Chassis Power Status

------------------------------------------------------------------------
Michael Hebenstreit                 Senior Cluster Architect
Intel Corporation, MS: RR1-105/H14  Software and Services Group/DCE
4100 Sara Road          Tel.:   +1 505-794-3144
Rio Rancho, NM 87124
UNITED STATES                       E-mail: ***@intel.com
Continue reading on narkive:
Loading...