Hi,
I am using ipmitool v1.8.8 in Red Hat Enterprise Linux. I have a doubt
regarding SOL in lanplus.
ipmitool -v -v -v -A MD5 -o intelplus -C 0 -I lanplus -H
192.168.3.81sol activate
RMCP+ open session request negotiates with BMC for authentication
NONE. After successful RAKP(1-4) messages, the Activate Payload command is
sent requesting for SOL payload activation with encryption and
authentication. This cannot be done as per the IPMIv2.0 specifications,
right?
There are two things to be noted,
1. I am specifying the authentication type as MD5. But while opening the
session, it doesn't go for it.
2. Encryption cannot be done alone, it should be accompanied by
authentication too. So how can it ask for encryption while the
authentication is negotiated for none.
For these reasons, the payload activation is getting rejected.
With Regards,
Yugender
Verbose is here
[EMAIL PROTECTED] ~]# ipmitool -v -v -v -o intelplus -I lanplus -H
192.168.3.72 -C 0 -A MD5 sol activate
IPMI LAN host 192.168.3.72 port 623
Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04
BUILDING A v1.5 COMMAND
IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 95 09 03 00 00 00 00 06
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
SENDING AN OPEN SESSION REQUEST
sending packet (48 bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (30 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
63 20 00 38 00 01 95 09 03 00 00 00 00 06
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
IPMI Request Match NOT FOUND
<< Received data (52 bytes)
06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
00 00 04 00 a4 a3 a2 a0 22 5b cc 05 00 00 00 08
00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
00 00 00 00
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Maximum privilege level : admin
<< Console Session ID : 0xa0a2a3a4
<< BMC Session ID : 0x05cc5b22
<< Negotiated authenticatin algorithm : none
<< Negotiated integrity algorithm : none
<< Negotiated encryption algorithm : none
Console generated random number (16 bytes)
78 2f d1 d2 62 94 27 de ee f2 eb 50 9f 09 7a 8e
SENDING A RAKP 1 MESSAGE
sending packet (44 bytes)
06 00 ff 07 06 12 00 00 00 00 00 00 00 00 1c 00
00 00 00 00 22 5b cc 05 78 2f d1 d2 62 94 27 de
ee f2 eb 50 9f 09 7a 8e 14 00 00 00
<< Received data (56 bytes)
06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
00 00 00 00 a4 a3 a2 a0 76 3c 18 d6 cb 0a 0f 7f
c9 df cb bf fc b0 6d 7c ff ff ff ff ff ff ff ff
ff ff ff ff ff ff ff ff
<<RAKP 2 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< BMC random number : 0x763c18d6cb0a0f7fc9dfcbbffcb06d7c
<< BMC GUID : 0xffffffffffffffffffffffffffffffff
<< Key exchange auth code : none
bmc_rand (16 bytes)
76 3c 18 d6 cb 0a 0f 7f c9 df cb bf fc b0 6d 7c
Generated K1 (20 bytes)
01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
01 01 01 01
Generated K2 (20 bytes)
02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
02 02 02 02
SENDING A RAKP 3 MESSAGE
sending packet (24 bytes)
06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
00 00 00 00 22 5b cc 05
<< Received data (24 bytes)
06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< Key exchange auth code : none
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
Sending IPMI command payload
netfn : 0x06
command : 0x3b
data : 0x04
BUILDING A v2 COMMAND
sending packet (24 bytes)
06 00 ff 07 06 00 22 5b cc 05 03 00 00 00 08 00
20 18 c8 81 04 3b 04 3c
<< Received data (25 bytes)
06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
81 1c 63 20 04 3b 00 04 9d
<< IPMI Response Session Header
<< Authtype : Unknown (0x6)
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000001
<< IPMI Msg/Payload Length : 9
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 01
<< Rs Lun : 0
<< Command : 3b
<< Compl Code : 0x00
set_session_privlvl (1 bytes)
04
Set Session Privilege Level to ADMINISTRATOR
Sending IPMI command payload
netfn : 0x06
command : 0x48
data : 0x01 0x01 0xc4 0x00 0x00 0x00
BUILDING A v2 COMMAND
sending packet (29 bytes)
06 00 ff 07 06 00 22 5b cc 05 04 00 00 00 0d 00
20 18 c8 81 08 48 01 01 c4 00 00 00 69
èactivate payload with encryption and authentication.
<< Received data (24 bytes)
06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
81 1c 63 20 08 48 83 0d
<< IPMI Response Session Header
<< Authtype : Unknown (0x6)
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000002
<< IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 02
<< Rs Lun : 0
<< Command : 48
<< Compl Code : 0x83
Info: cannot activate SOL payload with encryption
Sending IPMI command payload
netfn : 0x06
command : 0x3c
data : 0x22 0x5b 0xcc 0x05
BUILDING A v2 COMMAND
sending packet (27 bytes)
06 00 ff 07 06 00 22 5b cc 05 05 00 00 00 0b 00
20 18 c8 81 0c 3c 22 5b cc 05 e9
<< Received data (24 bytes)
06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
81 1c 63 20 0c 3c 00 98
<< IPMI Response Session Header
<< Authtype : Unknown (0x6)
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000003
<< IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 03
<< Rs Lun : 0
<< Command : 3c
<< Compl Code : 0x00
Closed Session 05cc5b22
-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel