Hi Hank, On Fri, 2011-01-21 at 14:02 -0800, Hank Bruning wrote: > if your are using IPMI 2.0 RMCP sessions then you must use an OEM way > to find which privilege level is assigned to an IPMI cipher suite. > Often cipher suite 0 can not be used for Administrator or User roles. > What you are asking is outside the spec. In my opinion the spec is > faulty that a privilege level (admin, user, callback, etc)can not be > queried for which cipher suites that are supported. This is a major > fail for the IPMI spec. > Our Retuli product implements a proprietary way to do this. It's not > widely used.
Maybe I'm missing something from the conversation, but it isn't true that an OEM way is required to find which privilege level is assigned to a cipher suite. In Table 23-4 of the IPMI spec there is support for this w/ "RMCP+ Messaging Cipher Suite Privilege Levels". I'm unsure if this is supported in ipmitool, but it is in FreeIPMI. > /usr/sbin/bmc-config --checkout --section=Rmcpplus_Conf_Privilege Section Rmcpplus_Conf_Privilege ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary Maximum_Privilege_Cipher_Suite_Id_0 Unused ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary Maximum_Privilege_Cipher_Suite_Id_1 Unused ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary Maximum_Privilege_Cipher_Suite_Id_2 Unused <snip> In the above examples, the cipher suites are currently disabled, but they can be configured to whatever you want. I've tested this on atleast 4 or 5 different vendor implementations of IPMI. Al > Please ping Dell or Intel on you request. It's not new but more voices > heard might move an iceburg > > h...@jblade.com > IPMI Architecture Group > JBlade > > > On 01/21/2011 10:10 AM, Szabo, Steve G wrote: > > > > Anyone know which privilege is required when accessing ProLiant > > BL460c G6? > > > > > > > > > > $ ipmitool -vv -I lanplus -U someguy -H somehost -P somepass channel > > info > > > > IPMI LAN host somehost port 623 > > > > >> Sending IPMI command payload > > >> netfn : 0x06 > > >> command : 0x38 > > >> data : 0x8e 0x04 > > > > >> SENDING AN OPEN SESSION REQUEST > > > > <<OPEN SESSION RESPONSE > > << Message tag : 0x00 > > << RMCP+ status : no errors > > << Maximum privilege level : admin > > << Console Session ID : 0xa0a2a3a4 > > << BMC Session ID : 0x0086219a > > << Negotiated authenticatin algorithm : hmac_sha1 > > << Negotiated integrity algorithm : hmac_sha1_96 > > << Negotiated encryption algorithm : aes_cbc_128 > > > > >> Console generated random number (16 bytes) > > 42 21 af 9e be 27 90 14 c0 08 82 00 4d 86 88 65 > > >> SENDING A RAKP 1 MESSAGE > > > > <<RAKP 2 MESSAGE > > << Message tag : 0x00 > > << RMCP+ status : no errors > > << Console Session ID : 0xa0a2a3a4 > > << BMC random number : > > 0x3de07bce4ebad1deb8365f560bb22463 > > << BMC GUID : > > 0x3530373737394d585130313030334454 > > << Key exchange auth code [sha1] : > > 0xf102da4902ea7e1e68a2d44882b2c57fcfa70236 > > > > session integrity key input (40 bytes) > > 42 21 af 9e be 27 90 14 c0 08 82 00 4d 86 88 65 > > 3d e0 7b ce 4e ba d1 de b8 36 5f 56 0b b2 24 63 > > 14 06 73 79 73 6f 70 73 > > Generated session integrity key (20 bytes) > > ab 09 95 ee 2f 3d 08 25 20 7f 52 40 52 22 ab 4f > > 9c e9 17 1a > > Generated K1 (20 bytes) > > 52 ad 59 e4 f9 14 89 ed 68 97 cc bd 5d 86 4f 0b > > 0c 8f f9 b8 > > Generated K2 (20 bytes) > > 8b 9e f8 b4 d7 00 f4 68 c2 34 57 fd e4 16 21 1c > > ac 8b d1 99 > > >> SENDING A RAKP 3 MESSAGE > > > > <<RAKP 4 MESSAGE > > << Message tag : 0x00 > > << RMCP+ status : no errors > > << Console Session ID : 0xa0a2a3a4 > > << Key exchange auth code [sha1] : 0x6d9720c5ac3de5e28e47fedc > > > > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > > > > > >> Sending IPMI command payload > > >> netfn : 0x06 > > >> command : 0x3b > > >> data : 0x04 > > > > Set Session Privilege Level to ADMINISTRATOR failed: Unknown (0x81) > > Error: Unable to establish IPMI v2 / RMCP+ session > > Unable to Get Channel Info > > > > Cheers > > ------------------------------------------------------------------------- > > > > > > NOTICE: Confidential message which may be privileged. Unauthorized > > use/disclosure prohibited. If received in error, please go to > > www.td.com/legal for instructions. > > AVIS : Message confidentiel dont le contenu peut être privilégié. > > Utilisation/divulgation interdites sans permission. Si reçu par > > erreur, prière d'aller au www.td.com/francais/avis_juridique pour > > des instructions. > > > > > > ------------------------------------------------------------------------------ > > Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)! > > Finally, a world-class log management solution at an even better price-free! > > Download using promo code Free_Logger_4_Dev2Dev. Offer expires > > February 28th, so secure your free ArcSight Logger TODAY! > > http://p.sf.net/sfu/arcsight-sfd2d > > > > _______________________________________________ > > Ipmitool-devel mailing list > > Ipmitool-devel@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > -- Albert Chu ch...@llnl.gov Computer Scientist High Performance Systems Division Lawrence Livermore National Laboratory ------------------------------------------------------------------------------ Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)! Finally, a world-class log management solution at an even better price-free! Download using promo code Free_Logger_4_Dev2Dev. Offer expires February 28th, so secure your free ArcSight Logger TODAY! http://p.sf.net/sfu/arcsight-sfd2d _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel