Guessing from your other post this is related to the 'Get Channel Auth Capabilities' cmd (NetNn 0x06 Cmd 0x38). As the name suggests, this is used to query the channel authentication capabilities and is one of the few commands which are supported without an active session (Get System GUID is another one). It is typically the first IPMI command in a session handshake for both RMCP and RMCP+.
I you are really interested on how things work on a technical level I suggest you dig into the IPMI Specification. RMCP Session handling is described in section 6.12.7 (Figure 6-1) and RMCP+ in section 13.15 (also check Figure 13-5). You also need to study the involved IPMI commands with their responses. RMCP+ Open Session Cmd is described in 13.17 and the response in 13.18. For RMCP+ Message Status Codes see table 13-15 (this includes the 'No matching cipher suite' for the Open Session cmd response). From: VJ [mailto:purplet...@gmail.com] Sent: Wednesday, February 22, 2017 11:27 PM To: ipmitool-devel@lists.sourceforge.net Subject: [Ipmitool-devel] How to verify authtype I followed the instruction from : https://www.thomas-krenn.com/en/wiki/Deactivate_IPMI_NONE_Authentication_Type and I can see the below from 'ipmitool lan print 1' Admin : MD5 But, when I try to access from ipmitool, I see : BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE whats happening ? Thanks.
smime.p7s
Description: S/MIME cryptographic signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel