Could anyone please give me a hint what's going wrong here when activating the 
session?  Any help would be very much appreciated

lanplus interface does not work either

Thanks
Michael

# ipmitool -vvvvv -I lan -H 36.105.71.32 -U admin -P XXXXXXX chassis power 
status
ipmi_lan_send_cmd:opened=[0], open=[4524816]
IPMI LAN host 36.105.71.32 port 623
Sending IPMI/RMCP presence ping packet
send_packet (12 bytes)
 06 00 ff 06 00 00 11 be 80 00 00 00
recv_packet (28 bytes)
 06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2
 03 00 00 00 81 00 00 00 00 00 00 00
Received IPMI/RMCP response packet:
  IPMI Supported
  ASF Version 1.0
  RMCP Version 1.0
  RMCP Sequence 255
  IANA Enterprise 7154

ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x01 cmd=0x38
>> IPMI Request Session Header (level 0)
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 01
>>   Rq Lun     : 0
>>   Command    : 38
send_packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 04 38 0e 04 31
recv_packet (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 04 38 00 01 14 04 00 00 00 00 00 8b
ipmi message header (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 04 38 00 01 14 04 00 00 00 00 00 8b
<< IPMI Response Session Header
<<   Authtype   : NONE
<<   Sequence   : 0x00000000
<<   Session ID : 0x00000000
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x01 cmd=0x38
get_auth_capabilities (8 bytes)
 01 14 04 00 00 00 00 00
Channel 01 Authentication Capabilities:
  Privilege Level : ADMINISTRATOR
  Auth Types      : MD5 PASSWORD
  Per-msg auth    : enabled
  User level auth : enabled
  Non-null users  : enabled
  Null users      : disabled
  Anonymous login : disabled

Proceeding with AuthType MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x02 cmd=0x39
>> IPMI Request Session Header (level 0)
>>   Authtype   : MD5
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 02
>>   Rq Lun     : 0
>>   Command    : 39
send_packet (38 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18
 c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00
 00 00 00 00 00 33
recv_packet (42 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
 63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
 1c 8a f3 9c 93 e5 62 08 db 41
ipmi message header (42 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c
 63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6
 1c 8a f3 9c 93 e5 62 08 db 41
<< IPMI Response Session Header
<<   Authtype   : NONE
<<   Sequence   : 0x00000000
<<   Session ID : 0x00000000
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 39
<<   Compl Code : 0x00
IPMI Request Match found
removed list entry seq=0x02 cmd=0x39
get_session_challenge (20 bytes)
 e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93
 e5 62 08 db
Opening Session
  Session ID      : 09851fe0
  Challenge       : b7fbc8eb257fd61c8af39c93e56208db
  Privilege Level : ADMINISTRATOR
  Auth Type       : MD5
ipmi_lan_send_cmd:opened=[1], open=[4524816]
added list entry seq=0x03 cmd=0x3a
>> IPMI Request Session Header (level 0)
>>   Authtype   : MD5
>>   Sequence   : 0x00000000
>>   Session ID : 0x09851fe0
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 03
>>   Rq Lun     : 0
>>   Command    : 3a
  MD5 AuthCode    : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
 9c 93 e5 62 08 db 77 de 00 66 a7
>> IPMI Request Session Header (level 0)
>>   Authtype   : MD5
>>   Sequence   : 0x00000000
>>   Session ID : 0x09851fe0
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 03
>>   Rq Lun     : 0
>>   Command    : 3a
  MD5 AuthCode    : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
 9c 93 e5 62 08 db 77 de 00 66 a7
>> IPMI Request Session Header (level 0)
>>   Authtype   : MD5
>>   Sequence   : 0x00000000
>>   Session ID : 0x09851fe0
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 03
>>   Rq Lun     : 0
>>   Command    : 3a
  MD5 AuthCode    : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
 9c 93 e5 62 08 db 77 de 00 66 a7
>> IPMI Request Session Header (level 0)
>>   Authtype   : MD5
>>   Sequence   : 0x00000000
>>   Session ID : 0x09851fe0
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 03
>>   Rq Lun     : 0
>>   Command    : 3a
  MD5 AuthCode    : cf8dca55f66b522382449d4efc08cc2c
send_packet (59 bytes)
 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca
 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18
 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3
 9c 93 e5 62 08 db 77 de 00 66 a7
  No response from remote controller
cleared list entry seq=0x03 cmd=0x3a
Activate Session command failed
Error: Unable to establish LAN session
Failed to open LAN interface
Unable to get Chassis Power Status

------------------------------------------------------------------------
Michael Hebenstreit                 Senior Cluster Architect
Intel Corporation, MS: RR1-105/H14  Software and Services Group/DCE
4100 Sara Road                      Tel.:   +1 505-794-3144 
Rio Rancho, NM 87124
UNITED STATES                       E-mail: michael.hebenstr...@intel.com


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to