Could anyone please give me a hint what's going wrong here when activating the session? Any help would be very much appreciated
lanplus interface does not work either Thanks Michael # ipmitool -vvvvv -I lan -H 36.105.71.32 -U admin -P XXXXXXX chassis power status ipmi_lan_send_cmd:opened=[0], open=[4524816] IPMI LAN host 36.105.71.32 port 623 Sending IPMI/RMCP presence ping packet send_packet (12 bytes) 06 00 ff 06 00 00 11 be 80 00 00 00 recv_packet (28 bytes) 06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2 03 00 00 00 81 00 00 00 00 00 00 00 Received IPMI/RMCP response packet: IPMI Supported ASF Version 1.0 RMCP Version 1.0 RMCP Sequence 255 IANA Enterprise 7154 ipmi_lan_send_cmd:opened=[1], open=[4524816] added list entry seq=0x01 cmd=0x38 >> IPMI Request Session Header (level 0) >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 01 >> Rq Lun : 0 >> Command : 38 send_packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 04 38 0e 04 31 recv_packet (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 01 14 04 00 00 00 00 00 8b ipmi message header (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 01 14 04 00 00 00 00 00 8b << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x01 cmd=0x38 get_auth_capabilities (8 bytes) 01 14 04 00 00 00 00 00 Channel 01 Authentication Capabilities: Privilege Level : ADMINISTRATOR Auth Types : MD5 PASSWORD Per-msg auth : enabled User level auth : enabled Non-null users : enabled Null users : disabled Anonymous login : disabled Proceeding with AuthType MD5 ipmi_lan_send_cmd:opened=[1], open=[4524816] added list entry seq=0x02 cmd=0x39 >> IPMI Request Session Header (level 0) >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 02 >> Rq Lun : 0 >> Command : 39 send_packet (38 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18 c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00 00 00 00 00 00 33 recv_packet (42 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 41 ipmi message header (42 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 41 << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 39 << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x02 cmd=0x39 get_session_challenge (20 bytes) e0 1f 85 09 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db Opening Session Session ID : 09851fe0 Challenge : b7fbc8eb257fd61c8af39c93e56208db Privilege Level : ADMINISTRATOR Auth Type : MD5 ipmi_lan_send_cmd:opened=[1], open=[4524816] added list entry seq=0x03 cmd=0x3a >> IPMI Request Session Header (level 0) >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x09851fe0 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 03 >> Rq Lun : 0 >> Command : 3a MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 77 de 00 66 a7 >> IPMI Request Session Header (level 0) >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x09851fe0 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 03 >> Rq Lun : 0 >> Command : 3a MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 77 de 00 66 a7 >> IPMI Request Session Header (level 0) >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x09851fe0 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 03 >> Rq Lun : 0 >> Command : 3a MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 77 de 00 66 a7 >> IPMI Request Session Header (level 0) >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x09851fe0 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 03 >> Rq Lun : 0 >> Command : 3a MD5 AuthCode : cf8dca55f66b522382449d4efc08cc2c send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 e0 1f 85 09 cf 8d ca 55 f6 6b 52 23 82 44 9d 4e fc 08 cc 2c 1d 20 18 c8 81 0c 3a 02 04 b7 fb c8 eb 25 7f d6 1c 8a f3 9c 93 e5 62 08 db 77 de 00 66 a7 No response from remote controller cleared list entry seq=0x03 cmd=0x3a Activate Session command failed Error: Unable to establish LAN session Failed to open LAN interface Unable to get Chassis Power Status ------------------------------------------------------------------------ Michael Hebenstreit Senior Cluster Architect Intel Corporation, MS: RR1-105/H14 Software and Services Group/DCE 4100 Sara Road Tel.: +1 505-794-3144 Rio Rancho, NM 87124 UNITED STATES E-mail: michael.hebenstr...@intel.com ------------------------------------------------------------------------------ Slashdot TV. Video for Nerds. Stuff that matters. http://tv.slashdot.org/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel