Thanks for the pointer (and for further encouragement, hank)… the documentation is … well, it is what it is (to their credit they've put together some great other-than-openipmi info on IPMI itself, I'll note, and the code even has comments that are useful, how unusual.)
So based on what you and hank said I went back and took another look… their perl example program doesn't even work, the python one has me installing many packages before I even get to test it (it too ultimately failed, once I had the dependencies all installed). I can probably spend a bit more time and finally get it to work… but it didn't work on ubuntu and centos/red hat out of the box (and it also doesn't support the mac). This doesn't bode well if I ever want my own tool to see any use; dependencies suck. If you want to get people to use your stuff make it simple and well documented, which is just what you folks have done both with ipmitool; it just works, and works well (I've used ipmiutil pretty extensively and it's a great tool, but it doesn't work on the mac either, and doesn't seem to offer any game-winning additional benefits that I can see on linux.) As you said about openipmi "unfortunately, it's not so well documented, and its really not a tool designed to be run from scripts. It's really designed for software that does continuous real-time monitoring of systems." So perhaps I'll just be a happy user at the /dev layer. In sum ipmitool still seems the winner for my needs, at least. I applaud the intellectual generousness of all you ipmitool devs and friends-o-ipmitool trying to convince me not to use it ;) As a once-in-awhile auditing tool performance isn't really much of an issue; the data and results are far more important than speedy delivery. dan p.s. All IMHO, and subject to change and capriciousness. I might be cursing your tool soon enough, but so far so good! ^..^ On Oct 29, 2012, at 1:26 PM, Corey Minyard <tcminy...@gmail.com> wrote: > openipmi may do what you want. It's really more of a programming API, and it > has C, perl and python interfaces. You can dump pretty much anything you > want; an unbelievable amount of information. There is sample code in all > languages, a GUI written in python, and a command-line interface written in C. > > It should be a lot faster than ipmitool for this particular job because it's > not making a connection for each thing you dump. > > Unfortunately, it's not so well documented, and its really not a tool > designed to be run from scripts. It's really designed for software that does > continuous real-time monitoring of systems. It's also event-driven, and if > you haven't done event-driven programming it can be a little hard to wrap > your head around it. > > -corey > > On 10/29/2012 10:24 AM, ^..^ wrote: >> >> Hey folks - first, thanks for a tremendous tool and all the effort put into >> this over the years (the documentation is really stellar as well, something >> that is both rare and apparently under-appreciated in open source.) I've a >> couple of questions that I hope are suited this venue; if not please forgive >> me, and if you could suggest a better forum I'd appreciate it. >> >> I'm doing a bit of research on IPMI and BMC security (more like IPMI++, >> since I'm doing work with some of the various offshoots; iDRAC, iLO, etc.) >> Currently I'm pulling various bits of data from the IPMI interface - ideally >> I'd like to *remotely* get as much as possible about the configuration and >> state of the BMC and IPMI configuration, and I plan to use your tool along >> with nmap, SMASH/CLP (don't laugh too much, at least its modestly cross >> platform ;)), and some duct tape and bailing wire to gather data. Think of >> it more as a snapshot or audit effort rather than any sort of continuous >> monitoring. >> >> Q-1) I'm familiar with the nagios and other folks who are all about >> gathering BMC sensor data… but I can't find a general IPMI data sucker (e.g. >> get all the stuff that ipmitool will get me in one fell swoop, even though >> under the hood it might be doing lots of queries) anywhere; has anyone >> written such a thing? (It'd have to be non-commercial, or at least free to >> distribute.) >> >> [meta note: the README file in the contrib subdirectory has a broken url: >> http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ >> <http://people.ee.ethz.ch/%7Eoetiker/webtools/rrdtool/> - seems as though >> the user moved on. As such one can't see any sample output to the scripts or >> what they really collect without perusing the source or hunting around. In >> particular the file "oem_ibm_sel_map" is pretty opaque and not referenced by >> anything but the makefile in the contrib… is this used anywhere except in >> comments (and if so, a one-liner somewhere explaining would be great)? :) ] >> >> >> Q-2) In the absence of someone else having something I can steal, my current >> thought would be to simply toss all the various ipmitool gathering options >> (e.g. fru, sel, pef, etc.) in a file, exec them all, and stash the resultsin >> something like JSON for safekeeping and post-processing. So again… has >> anyone done anything like this? Assuming that what I'm looking is all that >> data, even if you think I'm foolish wanting it, is that a reasonable way to >> collect it? It'd be great to have any tricks or tips. (Size of output is not >> an issue. Heck, I'd snarf up BMC flash storage and RAM as well, if I could >> find a reasonable way of doing so remotely!) I'd be happy to share >> pre-distributed versions if anyone is burning with curiosity, has a use for >> such a thing, or would be willing to discuss various ways to build a better >> mousetrap. >> >> Q-3) Finally - I'm writing up a bit of an analysis on IPMI/BMC/++ security; >> if there is a person or two here who are interested in such things I would >> love a real IPMI expert to give feedback (I'm not an IPMI expert by any >> stretch of the imagination, though I might have some unusual thoughts on >> IPMI security); I'll just say as a warning I'll be asking for no one to >> redistribute it prior to my putting it out, which will hopefully be in about >> 30-60 days or so. >> >> Thanks again (mac support in particular is greatly appreciated as well.) >> >> dan >> >> p.s. Also - if anyone has any thoughts or scripts or tools or anything on >> how to remotely identify systems running IPMI I've yet another simple tool >> to start doing this (obviously if they answer to an RMCP ping that's a win, >> but I'm talking about on a larger network scale where firewalls and network >> topologies), and would welcome any conversations on that also. >> >> p.p.s. For context some of my earlier work may be found at >> http://fish2.com/security >> >> ^..^ >> >> >> >> ------------------------------------------------------------------------------ >> The Windows 8 Center - In partnership with Sourceforge >> Your idea - your app - 30 days. >> Get started! >> http://windows8center.sourceforge.net/ >> what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/ >> >> >> _______________________________________________ >> Ipmitool-devel mailing list >> Ipmitool-devel@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > ------------------------------------------------------------------------------ The Windows 8 Center - In partnership with Sourceforge Your idea - your app - 30 days. Get started! http://windows8center.sourceforge.net/ what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel