openipmi may do what you want. It's really more of a programming API, and it has C, perl and python interfaces. You can dump pretty much anything you want; an unbelievable amount of information. There is sample code in all languages, a GUI written in python, and a command-line interface written in C.
It should be a lot faster than ipmitool for this particular job because it's not making a connection for each thing you dump. Unfortunately, it's not so well documented, and its really not a tool designed to be run from scripts. It's really designed for software that does continuous real-time monitoring of systems. It's also event-driven, and if you haven't done event-driven programming it can be a little hard to wrap your head around it. -corey On 10/29/2012 10:24 AM, ^..^ wrote: > > Hey folks - first, thanks for a tremendous tool and all the effort put > into this over the years (the documentation is really stellar as well, > something that is both rare and apparently under-appreciated in open > source.) I've a couple of questions that I hope are suited this venue; > if not please forgive me, and if you could suggest a better forum I'd > appreciate it. > > I'm doing a bit of research on IPMI and BMC security (more like > IPMI++, since I'm doing work with some of the various offshoots; > iDRAC, iLO, etc.) Currently I'm pulling various bits of data from the > IPMI interface - ideally I'd like to *remotely* get as much as > possible about the configuration and state of the BMC and IPMI > configuration, and I plan to use your tool along with nmap, SMASH/CLP > (don't laugh too much, at least its modestly cross platform ;)), and > some duct tape and bailing wire to gather data. Think of it more as a > snapshot or audit effort rather than any sort of continuous monitoring. > > Q-1) I'm familiar with the nagios and other folks who are all about > gathering BMC sensor data… but I can't find a general IPMI data sucker > (e.g. get all the stuff that ipmitool will get me in one fell swoop, > even though under the hood it might be doing lots of queries) > anywhere; has anyone written such a thing? (It'd have to be > non-commercial, or at least free to distribute.) > > [meta note: the README file in the contrib subdirectory has a broken > url: http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ > <http://people.ee.ethz.ch/%7Eoetiker/webtools/rrdtool/> - seems as > though the user moved on. As such one can't see any sample output to > the scripts or what they really collect without perusing the source or > hunting around. In particular the file "oem_ibm_sel_map" is pretty > opaque and not referenced by anything but the makefile in the contrib… > is this used anywhere except in comments (and if so, a one-liner > somewhere explaining would be great)? :) ] > > > Q-2) In the absence of someone else having something I can steal, my > current thought would be to simply toss all the various ipmitool > gathering options (e.g. fru, sel, pef, etc.) in a file, exec them all, > and stash the resultsin something like JSON for safekeeping and > post-processing. So again… has anyone done anything like this? > Assuming that what I'm looking is all that data, even if you think I'm > foolish wanting it, is that a reasonable way to collect it? It'd be > great to have any tricks or tips. (Size of output is not an issue. > Heck, I'd snarf up BMC flash storage and RAM as well, if I could find > a reasonable way of doing so remotely!) I'd be happy to share > pre-distributed versions if anyone is burning with curiosity, has a > use for such a thing, or would be willing to discuss various ways to > build a better mousetrap. > > Q-3) Finally - I'm writing up a bit of an analysis on IPMI/BMC/++ > security; if there is a person or two here who are interested in such > things I would love a real IPMI expert to give feedback (I'm not an > IPMI expert by any stretch of the imagination, though I might have > some unusual thoughts on IPMI security); I'll just say as a warning > I'll be asking for no one to redistribute it prior to my putting it > out, which will hopefully be in about 30-60 days or so. > > Thanks again (mac support in particular is greatly appreciated as well.) > > dan > > p.s. Also - if anyone has any thoughts or scripts or tools or anything > on how to remotely identify systems running IPMI I've yet another > simple tool to start doing this (obviously if they answer to an RMCP > ping that's a win, but I'm talking about on a larger network scale > where firewalls and network topologies), and would welcome any > conversations on that also. > > p.p.s. For context some of my earlier work may be found at > http://fish2.com/security > > ^..^ > > > > ------------------------------------------------------------------------------ > The Windows 8 Center - In partnership with Sourceforge > Your idea - your app - 30 days. > Get started! > http://windows8center.sourceforge.net/ > what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/ > > > _______________________________________________ > Ipmitool-devel mailing list > Ipmitool-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel ------------------------------------------------------------------------------ The Windows 8 Center - In partnership with Sourceforge Your idea - your app - 30 days. Get started! http://windows8center.sourceforge.net/ what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel