Hi Al,

after an update of the IPMI firmware (from v3.15 to 3.40) on four
systems with Supermicro X9DR7-LN4F mainboard, IPMI queries with ipmi-sel
or ipmi-sensors via LAN fail with the following error:

ipmi_ctx_open_outofband_2_0: bad completion code 

We have already tried to upload the firmware again (without preserving
configuration), but this did not help.

We are using this command (ipmi.cfg has username/password):
        /usr/sbin/ipmi-sel -h [IP] --config-file /etc/ipmi/ipmi.cfg
        --driver-type=LAN_2_0 --output-event-state --interpret-oem-data
        --entity-sensor-names --sensor-types=all

We also executed the command with --debug. I've attached the output
(partially, because I'm not sure whether there may be sensitive data in
it as RAKP can be brute-force attacked).

Of course we could try to remove power down the servers and pull power
chords, and test again. But as these are production systems I'd want to
ask whether you have any idea or if there is a workaround.

PS: with firmware v3.15 we had no issues. I have tested the firmware
3.40 on another system with X9SCM-F, but I do not get any errors there.

Thanks for your help,
best regards,
Werner
10.10.5.6: =====================================================
10.10.5.6: IPMI 1.5 Get Channel Authentication Capabilities Request
10.10.5.6: =====================================================
10.10.5.6: RMCP Header:
10.10.5.6: ------------
10.10.5.6: [               6h] = version[ 8b]
10.10.5.6: [               0h] = reserved[ 8b]
10.10.5.6: [              FFh] = sequence_number[ 8b]
10.10.5.6: [               7h] = message_class.class[ 5b]
10.10.5.6: [               0h] = message_class.reserved[ 2b]
10.10.5.6: [               0h] = message_class.ack[ 1b]
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 Open Session Request
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 Open Session Response
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 RAKP Message 1 Request
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 RAKP Message 2 Response
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 RAKP Message 3 Request
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 RAKP Message 4 Response
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 Set Session Privilege Level Request
10.10.5.6: =====================================================
[...]
10.10.5.6: =====================================================
10.10.5.6: IPMI 2.0 Set Session Privilege Level Response
10.10.5.6: =====================================================
10.10.5.6: RMCP Header:
10.10.5.6: ------------
10.10.5.6: [               6h] = version[ 8b]
10.10.5.6: [               0h] = reserved[ 8b]
10.10.5.6: [              FFh] = sequence_number[ 8b]
10.10.5.6: [               7h] = message_class.class[ 5b]
10.10.5.6: [               0h] = message_class.reserved[ 2b]
10.10.5.6: [               0h] = message_class.ack[ 1b]
10.10.5.6: IPMI RMCPPLUS Session Header:
10.10.5.6: -----------------------------
10.10.5.6: [               6h] = authentication_type[ 4b]
10.10.5.6: [               0h] = reserved1[ 4b]
10.10.5.6: [               0h] = payload_type[ 6b]
10.10.5.6: [               1h] = payload_type.authenticated[ 1b]
10.10.5.6: [               1h] = payload_type.encrypted[ 1b]
10.10.5.6: [        6D356EB4h] = session_id[32b]
10.10.5.6: [               1h] = session_sequence_number[32b]
10.10.5.6: [              20h] = ipmi_payload_len[16b]
10.10.5.6: IPMI RMCPPLUS Payload:
10.10.5.6: ----------------------
10.10.5.6: [  BYTE ARRAY ... ] = confidentiality_header[16B]
[...]
10.10.5.6: [ 707060504030201h] = confidentiality_trailer[64b]
10.10.5.6: IPMI Message Header:
10.10.5.6: --------------------
10.10.5.6: [              81h] = rq_addr[ 8b]
10.10.5.6: [               0h] = rq_lun[ 2b]
10.10.5.6: [               7h] = net_fn[ 6b]
10.10.5.6: [              63h] = checksum1[ 8b]
10.10.5.6: [              20h] = rs_addr[ 8b]
10.10.5.6: [               0h] = rs_lun[ 2b]
10.10.5.6: [              16h] = rq_seq[ 6b]
10.10.5.6: IPMI Command Data:
10.10.5.6: ------------------
10.10.5.6: [              3Bh] = cmd[ 8b]
10.10.5.6: [              80h] = comp_code[ 8b]
10.10.5.6: IPMI Trailer:
10.10.5.6: -------------
10.10.5.6: [              CDh] = checksum2[ 8b]
10.10.5.6: IPMI RMCPPLUS Session Trailer:
10.10.5.6: ------------------------------
10.10.5.6: [            FFFFh] = integrity_pad[16b]
10.10.5.6: [               2h] = pad_length[ 8b]
10.10.5.6: [               7h] = next_header[ 8b]
10.10.5.6: [  BYTE ARRAY ... ] = authentication_code[12B]
10.10.5.6: [ F7h C9h 4Fh 1Ch 27h E0h F0h CDh ]
10.10.5.6: [ A9h 3Fh 7Eh 43h ]
ipmi_ctx_open_outofband_2_0: bad completion code





_______________________________________________
Freeipmi-users mailing list
Freeipmi-users@gnu.org
https://lists.gnu.org/mailman/listinfo/freeipmi-users

Reply via email to