Hi everybody,

first of all, thank you for all the feedback and sorry for the delay in my 
answer.

On 12/16/2014 04:35 PM, Albert Chu wrote:
> I just tried this on some of my systems and it works perfectly.  I have a
> speculation that it may be specific to your machine.

Thank you for trying this out on your side.

> After setting the new password on the remote system, I bet that it has
> begun using the new password for all of it's internal hashing mechanisms,
> leading new authentication hashes and what not.  Either the remote system
> is no longer accepted new packets from FreeIPMI b/c it's sending "bad
> packets" w/ the wrong hashes, or perhaps the system is sending FreeIPMI
> "bad packets" and FreeIPMI is dropping them.  Eventually leading to the
> session timeout.

Got it.

> If it happens to be the latter case, the FreeIPMI workaround
> "noauthcodecheck" could alleve your situation.  Use that workaround at your
> own discretion, I hope it's obvious what it does.  If it's the former, I
> think it's a bug that has to be reported to the vendor.  It should still be
> using the originally information from when the session was created.

The no-auth code did the trick !

> Another possibility might be to use other authentication mechanisms, and
> see if they work.  Perhaps some of the IPMI 2.0 ones (-D lan20 and -I w/
> various cipher suites) were implemented better.

I should have tried that by myself. Using -D lan20 (and using the default cipher
suite) also work.

Thank you for your help.

Jean-Baptiste




_______________________________________________
Freeipmi-users mailing list
Freeipmi-users@gnu.org
https://lists.gnu.org/mailman/listinfo/freeipmi-users

Reply via email to