Hi,
     I am using ipmitool v1.8.8 in Red Hat Enterprise Linux. I have a doubt
regarding SOL in lanplus.
     ipmitool -v -v -v -A MD5 -o intelplus -C 0 -I lanplus -H
192.168.3.81sol activate

     RMCP+ open session request negotiates with BMC for authentication
NONE. After successful RAKP(1-4) messages, the Activate Payload command is
sent requesting for SOL payload activation with encryption and
authentication. This cannot be done as per the IPMIv2.0 specifications,
right?

There are two things to be noted,
1. I am specifying the authentication type as MD5. But while opening the
session, it doesn't go for it.
2. Encryption cannot be done alone, it should be accompanied by
authentication too. So how can it ask for encryption while the
authentication is negotiated for none.
For these reasons, the payload activation is getting rejected.

With Regards,
Yugender


Verbose is here


[EMAIL PROTECTED] ~]# ipmitool -v -v -v -o intelplus -I lanplus -H
192.168.3.72 -C 0 -A MD5 sol activate

IPMI LAN host 192.168.3.72 port 623



Sending IPMI command payload

   netfn   : 0x06

   command : 0x38

   data    : 0x8e 0x04



BUILDING A v1.5 COMMAND

IPMI Request Session Header

  Authtype   : NONE

  Sequence   : 0x00000000

  Session ID : 0x00000000

IPMI Request Message Header

  Rs Addr    : 20

  NetFn      : 06

  Rs LUN     : 0

  Rq Addr    : 81

  Rq Seq     : 00

  Rq Lun     : 0

  Command    : 38

sending packet (23 bytes)

06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18

c8 81 00 38 8e 04 b5

sending packet (23 bytes)

06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18

c8 81 00 38 8e 04 b5

<< Received data (30 bytes)

06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c

63 20 00 38 00 01 95 09 03 00 00 00 00 06

<< IPMI Response Session Header

<<   Authtype                : NONE

<<   Payload type            : IPMI (0)

<<   Session ID              : 0x00000000

<<   Sequence                : 0x00000000

<<   IPMI Msg/Payload Length : 16

<< IPMI Response Message Header

<<   Rq Addr    : 81

<<   NetFn      : 07

<<   Rq LUN     : 0

<<   Rs Addr    : 20

<<   Rq Seq     : 00

<<   Rs Lun     : 0

<<   Command    : 38

<<   Compl Code : 0x00

SENDING AN OPEN SESSION REQUEST



sending packet (48 bytes)

06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00

00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00

01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00

<< Received data (30 bytes)

06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c

63 20 00 38 00 01 95 09 03 00 00 00 00 06

<< IPMI Response Session Header

<<   Authtype                : NONE

<<   Payload type            : IPMI (0)

<<   Session ID              : 0x00000000

<<   Sequence                : 0x00000000

<<   IPMI Msg/Payload Length : 16

<< IPMI Response Message Header

<<   Rq Addr    : 81

<<   NetFn      : 07

<<   Rq LUN     : 0

<<   Rs Addr    : 20

<<   Rq Seq     : 00

<<   Rs Lun     : 0

<<   Command    : 38

<<   Compl Code : 0x00

IPMI Request Match NOT FOUND

<< Received data (52 bytes)

06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00

00 00 04 00 a4 a3 a2 a0 22 5b cc 05 00 00 00 08

00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08

00 00 00 00

<<OPEN SESSION RESPONSE

<<  Message tag                        : 0x00

<<  RMCP+ status                       : no errors

<<  Maximum privilege level            : admin

<<  Console Session ID                 : 0xa0a2a3a4

<<  BMC Session ID                     : 0x05cc5b22

<<  Negotiated authenticatin algorithm : none

<<  Negotiated integrity algorithm     : none

<<  Negotiated encryption algorithm    : none



Console generated random number (16 bytes)

78 2f d1 d2 62 94 27 de ee f2 eb 50 9f 09 7a 8e

SENDING A RAKP 1 MESSAGE



sending packet (44 bytes)

06 00 ff 07 06 12 00 00 00 00 00 00 00 00 1c 00

00 00 00 00 22 5b cc 05 78 2f d1 d2 62 94 27 de

ee f2 eb 50 9f 09 7a 8e 14 00 00 00

<< Received data (56 bytes)

06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00

00 00 00 00 a4 a3 a2 a0 76 3c 18 d6 cb 0a 0f 7f

c9 df cb bf fc b0 6d 7c ff ff ff ff ff ff ff ff

ff ff ff ff ff ff ff ff

<<RAKP 2 MESSAGE

<<  Message tag                   : 0x00

<<  RMCP+ status                  : no errors

<<  Console Session ID            : 0xa0a2a3a4

<<  BMC random number             : 0x763c18d6cb0a0f7fc9dfcbbffcb06d7c

<<  BMC GUID                      : 0xffffffffffffffffffffffffffffffff

<<  Key exchange auth code         : none



bmc_rand (16 bytes)

76 3c 18 d6 cb 0a 0f 7f c9 df cb bf fc b0 6d 7c

Generated K1 (20 bytes)

01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01

01 01 01 01

Generated K2 (20 bytes)

02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02

02 02 02 02

SENDING A RAKP 3 MESSAGE



sending packet (24 bytes)

06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00

00 00 00 00 22 5b cc 05

<< Received data (24 bytes)

06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00

00 00 00 00 a4 a3 a2 a0

<<RAKP 4 MESSAGE

<<  Message tag                   : 0x00

<<  RMCP+ status                  : no errors

<<  Console Session ID            : 0xa0a2a3a4

<<  Key exchange auth code        : none



IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY





Sending IPMI command payload

   netfn   : 0x06

   command : 0x3b

   data    : 0x04



BUILDING A v2 COMMAND

sending packet (24 bytes)

06 00 ff 07 06 00 22 5b cc 05 03 00 00 00 08 00

20 18 c8 81 04 3b 04 3c

<< Received data (25 bytes)

06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00

81 1c 63 20 04 3b 00 04 9d

<< IPMI Response Session Header

<<   Authtype                : Unknown (0x6)

<<   Payload type            : IPMI (0)

<<   Session ID              : 0xa0a2a3a4

<<   Sequence                : 0x00000001

<<   IPMI Msg/Payload Length : 9

<< IPMI Response Message Header

<<   Rq Addr    : 81

<<   NetFn      : 07

<<   Rq LUN     : 0

<<   Rs Addr    : 20

<<   Rq Seq     : 01

<<   Rs Lun     : 0

<<   Command    : 3b

<<   Compl Code : 0x00

set_session_privlvl (1 bytes)

04

Set Session Privilege Level to ADMINISTRATOR





Sending IPMI command payload

   netfn   : 0x06

   command : 0x48

   data    : 0x01 0x01 0xc4 0x00 0x00 0x00



BUILDING A v2 COMMAND

sending packet (29 bytes)

06 00 ff 07 06 00 22 5b cc 05 04 00 00 00 0d 00

20 18 c8 81 08 48 01 01 c4 00 00 00 69
èactivate payload with encryption and authentication.

<< Received data (24 bytes)

06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00

81 1c 63 20 08 48 83 0d

<< IPMI Response Session Header

<<   Authtype                : Unknown (0x6)

<<   Payload type            : IPMI (0)

<<   Session ID              : 0xa0a2a3a4

<<   Sequence                : 0x00000002

<<   IPMI Msg/Payload Length : 8

<< IPMI Response Message Header

<<   Rq Addr    : 81

<<   NetFn      : 07

<<   Rq LUN     : 0

<<   Rs Addr    : 20

<<   Rq Seq     : 02

<<   Rs Lun     : 0

<<   Command    : 48

<<   Compl Code : 0x83

Info: cannot activate SOL payload with encryption



Sending IPMI command payload

   netfn   : 0x06

   command : 0x3c

   data    : 0x22 0x5b 0xcc 0x05



BUILDING A v2 COMMAND

sending packet (27 bytes)

06 00 ff 07 06 00 22 5b cc 05 05 00 00 00 0b 00

20 18 c8 81 0c 3c 22 5b cc 05 e9

<< Received data (24 bytes)

06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00

81 1c 63 20 0c 3c 00 98

<< IPMI Response Session Header

<<   Authtype                : Unknown (0x6)

<<   Payload type            : IPMI (0)

<<   Session ID              : 0xa0a2a3a4

<<   Sequence                : 0x00000003

<<   IPMI Msg/Payload Length : 8

<< IPMI Response Message Header

<<   Rq Addr    : 81

<<   NetFn      : 07

<<   Rq LUN     : 0

<<   Rs Addr    : 20

<<   Rq Seq     : 03

<<   Rs Lun     : 0

<<   Command    : 3c

<<   Compl Code : 0x00

Closed Session 05cc5b22
-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to