On Aug 30, 2007, at 7:11 PM, Lev Givon wrote:
> Received from Dmitry Frolov on Thu, Aug 30, 2007 at 09:44:05PM EDT:
>>> Received from Cress, Andrew R on Thu, Aug 30, 2007 at 10:34:16AM  
>>> EDT:
>>>>
>>>> If the server won't respond to Get Channel Authentication  
>>>> Capabilities
>>>> (the first IPMI LAN request, required by the IPMI spec), then  
>>>> either the
>>>> IPMI LAN isn't configured, or it doesn't support IPMI LAN.
>>>>
>>>
>>> The LOM device on the Xserve is configured; I can successfully query
>>> it using Apple's version of ipmitool from a remote machine using
>>>
>>> IPMITool -U username -H hostname sdr
>>
>> You can get the dumps with Linux and Apple's ipmitool -vvv (if  
>> Apple's
>> ipmitool also supports this) and look at the difference.
>
> Unfortunately, Apple's version of ipmitool doesn't print any extra
> information when the verbosity flags are specified.

That's sort of a feature. Architecturally our version of ipmitool is  
just a skeleton that wraps around a private system framework that  
does all of the IPMI work. The verbosity flags are telling the tool  
to tell the framework to be verbose, but that doesn't really do much  
in the production version you have. I'll see if there is a way to  
provide a debug version in the future that can be helpful for this  
sort of issue.

> Here is what I obtained after running the command
>
> ipmitool -vvv -C des -L OPERATOR -I lanplus -U username -H hostname  
> chassis status

There are two problems with your command line here.

Your "-C" cypher suite syntax is incorrect. The "C" parameter takes  
an integer from 0 to 15, not an ASCII string. If you want to  
explicitly specify it, "-C 3" is the strongest suite, but ipmitool  
uses 3 as the default so you can omit it.

Second, our LOM firmware is from Intel, and you must tell ipmitool to  
use the IntelPlus work-around for authentication.

With these two in mind, a valid command line would be:

ipmitool -o intelplus -L OPERATOR -I lanplus -U username -H hostname  
chassis status


(Sorry I haven't responded sooner, but I've been out of the country  
and away from work.)

Jim

> on Linux (username, hostname, and the requested password were all
> specified properly). I probably ought to mention that my ipmitool
> binary was built against freeipmi 0.3.1 and was configured with the
> lanplus interface enabled.
>
> IPMI LAN host hostname port 623
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
> Get Auth Capabilities error
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
>
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x0e 0x03
>
> BUILDING A v1.5 COMMAND
>>> IPMI Request Session Header
>>>   Authtype   : NONE
>>>   Sequence   : 0x00000000
>>>   Session ID : 0x00000000
>>> IPMI Request Message Header
>>>   Rs Addr    : 20
>>>   NetFn      : 06
>>>   Rs LUN     : 0
>>>   Rq Addr    : 81
>>>   Rq Seq     : 00
>>>   Rq Lun     : 0
>>>   Command    : 38
> Get Auth Capabilities error
> Error issuing Get Channel Authentication Capabilies request
> Error: Unable to establish IPMI v2 / RMCP+ session
> Error sending Chassis Status command
>
>                                                       L.G.
>
> ---------------------------------------------------------------------- 
> ---
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a  
> browser.
> Download your FREE copy of Splunk now >>  http://get.splunk.com/
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Jim Murphy                                       CPU Software Projects
[EMAIL PROTECTED]                                  Apple, Inc.




-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to