Hi. I have a problem with setup of console redirection in server chassis Intel SR1500 and ipmitool.
My setup in BIOS: console redirections. * serial port A * flow control - none * rate - 38.4K * terminal type - VT100 * legacy OS redirection - disabled serial port configuration. * serial A - enable * address - 3F8 * IRQ - 4 Setup of the boot loader and agetty: /etc/grub/grub.conf ========= serial --unit=0 ---speed=38400 --word=8 --parity=no terminal --timeout=0 serial console kernel /boot/vmlinuz root=/dev/sda1 console=tty0 console=ttyS0,38400n8 ========= /etc/inittab ========= s0:2345:repswan:/sbin/agetty -L 57600 vt100 s1:2345:repswan:/sbin/agetty -L 57600 vt100 ========= # ps ax | grep agetty 4295 tty1 Ss+ 0:00 /sbin/agetty 38400 tty1 linux 4296 tty2 Ss+ 0:00 /sbin/agetty 38400 tty2 linux 4297 tty3 Ss+ 0:00 /sbin/agetty 38400 tty3 linux 4298 tty4 Ss+ 0:00 /sbin/agetty 38400 tty4 linux 4299 tty5 Ss+ 0:00 /sbin/agetty 38400 tty5 linux 4300 tty6 Ss+ 0:00 /sbin/agetty 38400 tty6 linux 4301 ttyS0 Ss+ 0:00 /sbin/agetty -L 38400 ttyS0 vt100 4302 ttyS1 Ss+ 0:00 /sbin/agetty -L 38400 ttyS1 vt100 # dmesg | grep tty Kernel command line: root=/dev/sda1 ro console=tty0 console=ttyS0,38400n8 console [tty0] enabled console [ttyS0] enabled serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A 00:07: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A What I'm trying to do: ipmitool -I lanplus -H 192.168.0.61 -o intelplus set enabled true ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol payload enable ipmitool -I lanplus -H 192.168.0.61 -o intelplus sol activate IPMI LAN host 192.168.0.61 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : admin << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0ee5f2a9 << Negotiated authenticatin algorithm : hmac_sha1 << Negotiated integrity algorithm : hmac_sha1_96 << Negotiated encryption algorithm : aes_cbc_128 >> Console generated random number (16 bytes) 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 >> SENDING A RAKP 1 MESSAGE <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x2f597e510866238ba23b8f032c38d615 << BMC GUID : 0xebc651dc64c511dcabcd000bab086eb6 << Key exchange auth code [sha1] : 0x0b7bc9902873c85d4125d27624a9ab56bac7e56f bmc_rand (16 bytes) 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 >> rakp2 mac input buffer (58 bytes) a4 a3 a2 a0 a9 f2 e5 0e 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 eb c6 51 dc 64 c5 11 dc ab cd 00 0b ab 08 6e b6 14 00 >> rakp2 mac key (20 bytes) 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >> rakp2 mac as computed by the remote console (20 bytes) 0b 7b c9 90 28 73 c8 5d 41 25 d2 76 24 a9 ab 56 ba c7 e5 6f >> rakp3 mac input buffer (22 bytes) 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 a4 a3 a2 a0 04 00 >> rakp3 mac key (20 bytes) 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 generated rakp3 mac (20 bytes) 48 b1 d9 fb c9 f4 33 0b c5 f3 d1 a4 c1 ca df be f4 64 6c 22 session integrity key input (34 bytes) 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 2f 59 7e 51 08 66 23 8b a2 3b 8f 03 2c 38 d6 15 14 00 Generated session integrity key (20 bytes) 14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88 ab 49 c4 2b 70 f5 Generated K1 (20 bytes) 32 8a c5 05 ec 16 31 c6 20 a1 6b 5f a6 5a 32 df 04 e3 80 98 Generated K2 (20 bytes) 7c bd 39 af 23 48 01 e8 dd f5 e3 19 dd f7 4f 3c 1b 5c fc 3e >> SENDING A RAKP 3 MESSAGE <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code [sha1] : 0x594ac682178bc09c2278cad8 >> rakp4 mac input buffer (36 bytes) 55 1b 88 b2 79 5a 1f 94 57 fa a2 a7 56 cb 77 c1 a9 f2 e5 0e eb c6 51 dc 64 c5 11 dc ab cd 00 0b ab 08 6e b6 >> rakp4 mac key (sik) (20 bytes) 14 68 25 16 29 f1 52 1e db 6d 97 31 f0 88 ab 49 c4 2b 70 f5 >> rakp4 mac as computed by the BMC (20 >> bytes) 59 4a c6 82 17 8b c0 9c 22 78 ca d8 2c 38 d6 15 eb c6 51 dc >> rakp4 mac as computed by the remote >> console (20 bytes) 59 4a c6 82 17 8b c0 9c 22 78 ca d8 4b 6c 47 a7 17 3a 2c f4 IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 BUILDING A v2 COMMAND >> Initialization vector (16 bytes) 80 49 e8 ff 11 bd 65 d7 bf 30 9f a3 8b 6b 37 90 authcode input (48 bytes) 06 c0 a9 f2 e5 0e 03 00 00 00 20 00 80 49 e8 ff 11 bd 65 d7 bf 30 9f a3 8b 6b 37 90 0e b5 84 a5 80 1a 9f a2 86 18 be ff a0 19 bf 1f ff ff 02 07 authcode output (12 bytes) 54 6a 89 7e ec 4f a1 cc 39 3d c7 e2 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 32 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 set_session_privlvl (1 bytes) 04 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc4 >> 0x00 0x00 0x00 BUILDING A v2 COMMAND >> Initialization vector (16 >> bytes) ba a7 a4 3e 00 9b 8b 4d 6e 1c 05 b7 29 b9 bf 62 authcode input (48 bytes) 06 c0 a9 f2 e5 0e 04 00 00 00 20 00 ba a7 a4 3e 00 9b 8b 4d 6e 1c 05 b7 29 b9 bf 62 de c3 86 89 59 02 75 38 15 8d ec 62 aa 52 22 d8 ff ff 02 07 authcode output (12 bytes) 10 3a 42 ea 9f d2 ea 54 a8 47 e5 e0 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 48 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 48 << Compl Code : 0x00 [SOL Session operational. Use ~? for help] After sol activate I see only: ========== [SOL Session operational. Use ~? for help] ========== Where have I gone wrong? Has anyone ever tried to setup console redirection on SR1500? If there's any information more needed I will post it. Thanks in advance. -- BRGDS. Alexey Vlasov. ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel