[Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed

Zheng, Jeff jeff.zheng at intel.com
Wed Nov 26 07:24:27 EST 2003


I can connect using following commands:

[root at jeff home]# ipmicmd -k "0f 00 06 01" lan 172.16.211.198 623 none user "" "
"
Connection 0 to the BMC is upConnection to the BMC restoredNo IPMB address speci
fied
0f 07 00 01 00 20 81 00 19 51 9f 57 01 00 0e 00 00 10 01 25

After set LAN password by SSU,
[root at jeff home]# ipmicmd -k "0f 00 06 01" lan 172.16.211.198 623 md2 user "" "1
23456"
Connection 0 to the BMC is upConnection to the BMC restoredNo IPMB address speci
fied
0f 07 00 01 00 20 81 00 19 51 9f 57 01 00 0e 00 00 10 01 25

> Thanks
> Jeff                        Jeff.Zheng at intel.com
> BTW, I speak for myself, not for Intel Corp.


-----Original Message-----
From: WANGNICK Sebastian [mailto:sebastian.wangnick at eurocontrol.int]
Sent: Wednesday, November 26, 2003 4:30 PM
To: Zheng, Jeff; Beowulf
Subject: RE: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board
doesn't succeed


Oh, yes. My original email contained the Ethereal dumps:

--- snip ---
But still, when trying
	./ipmisample -dmsg  lan 200.200.200.4 623 oem user ADMIN ADMIN
the board doesn't respond to the Activate Session request:

Frame 1 (65 bytes on wire, 65 bytes captured)
    Arrival Time: Nov 25, 2003 10:50:10.094931000
    Time delta from previous packet: 0.000000000 seconds
    Time relative to first packet: 0.000000000 seconds
    Frame Number: 1
    Packet Length: 65 bytes
    Capture Length: 65 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
    Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
    Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 51
    Identification: 0x0000 (0)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x1923 (correct)
    Source: odslin4.mas.eurocontrol.be (200.200.200.1)
    Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
    Source port: afs3-callback (7001)
    Destination port: aux_bus_shunt (623)
    Length: 31
    Checksum: 0x8d6b (correct)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Channel Auth Capabilities (0x38)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 9
    Response Address: BMC Slave Address (0x20)
    NetFn/LUN: Application Request
        0001 10.. = NetFn: Application Request (0x06)
        .... ..00 = Response LUN: 0x00
    Checksum 1: 0xc8
    Request Address: Remote Console Software ID (0x81)
    Seq/LUN: 0x04
        0000 01.. = Sequence: 0x01
        .... ..00 = Request LUN: 0x00
    Command: Get Channel Auth Capabilities (0x38)
    Checksum 2: 0x33
Data (2 bytes)

0000  00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00   .0H%aM..v.?...E.
0010  00 33 00 00 40 00 40 11 19 23 c8 c8 c8 01 c8 c8   .3.. at .@..#......
0020  c8 04 1b 59 02 6f 00 1f 8d 6b 06 00 ff 07 00 00   ...Y.o...k......
0030  00 00 00 00 00 00 00 09 20 18 c8 81 04 38 0e 02   ........ ....8..
0040  33                                                3

Frame 2 (72 bytes on wire, 72 bytes captured)
    Arrival Time: Nov 25, 2003 10:50:10.321677000
    Time delta from previous packet: 0.226746000 seconds
    Time relative to first packet: 0.226746000 seconds
    Frame Number: 2
    Packet Length: 72 bytes
    Capture Length: 72 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
    Destination: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
    Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 58
    Identification: 0x0a9c (2716)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x0e70 (correct)
    Source: 200.200.200.4 (200.200.200.4)
    Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: afs3-callback (7001)
    Source port: aux_bus_shunt (623)
    Destination port: afs3-callback (7001)
    Length: 38
    Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Channel Auth Capabilities (0x38)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 16
    Request Address: Remote Console Software ID (0x81)
    NetFn/LUN: Application Response
        0001 11.. = NetFn: Application Response (0x07)
        .... ..00 = Request LUN: 0x00
    Checksum 1: 0x63
    Response Address: BMC Slave Address (0x20)
    Seq/LUN: 0x04
        0000 01.. = Sequence: 0x01
        .... ..00 = Response LUN: 0x00
    Command: Get Channel Auth Capabilities (0x38)
    Completion Code: Command completed normally (0x00)
    Checksum 2: 0x97
Data (8 bytes)

0000  00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10   ..v.?..0H%aM..E.
0010  00 3a 0a 9c 40 00 40 11 0e 70 c8 c8 c8 04 c8 c8   .:.. at .@..p......
0020  c8 01 02 6f 1b 59 00 26 00 00 06 00 ff 07 00 00   ...o.Y.&........
0030  00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 01   ..........c .8..
0040  20 1c 00 bd 13 00 00 97                            .......

Frame 3 (80 bytes on wire, 80 bytes captured)
    Arrival Time: Nov 25, 2003 10:50:10.321885000
    Time delta from previous packet: 0.000208000 seconds
    Time relative to first packet: 0.226954000 seconds
    Frame Number: 3
    Packet Length: 80 bytes
    Capture Length: 80 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
    Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
    Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 66
    Identification: 0x0000 (0)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x1914 (correct)
    Source: odslin4.mas.eurocontrol.be (200.200.200.1)
    Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
    Source port: afs3-callback (7001)
    Destination port: aux_bus_shunt (623)
    Length: 46
    Checksum: 0x3693 (correct)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Session Challenge (0x39)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 24
    Response Address: BMC Slave Address (0x20)
    NetFn/LUN: Application Request
        0001 10.. = NetFn: Application Request (0x06)
        .... ..00 = Response LUN: 0x00
    Checksum 1: 0xc8
    Request Address: Remote Console Software ID (0x81)
    Seq/LUN: 0x08
        0000 10.. = Sequence: 0x02
        .... ..00 = Request LUN: 0x00
    Command: Get Session Challenge (0x39)
    Checksum 2: 0xd0
Data (17 bytes)

0000  00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00   .0H%aM..v.?...E.
0010  00 42 00 00 40 00 40 11 19 14 c8 c8 c8 01 c8 c8   .B.. at .@.........
0020  c8 04 1b 59 02 6f 00 2e 36 93 06 00 ff 07 00 00   ...Y.o..6.......
0030  00 00 00 00 00 00 00 18 20 18 c8 81 08 39 05 41   ........ ....9.A
0040  44 4d 49 4e 00 00 00 00 00 00 00 00 00 00 00 d0   DMIN............

Frame 4 (85 bytes on wire, 85 bytes captured)
    Arrival Time: Nov 25, 2003 10:50:10.436904000
    Time delta from previous packet: 0.115019000 seconds
    Time relative to first packet: 0.341973000 seconds
    Frame Number: 4
    Packet Length: 85 bytes
    Capture Length: 85 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
    Destination: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
    Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 71
    Identification: 0x0a9d (2717)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x0e62 (correct)
    Source: 200.200.200.4 (200.200.200.4)
    Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: afs3-callback (7001)
    Source port: aux_bus_shunt (623)
    Destination port: afs3-callback (7001)
    Length: 51
    Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Session Challenge (0x39)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 28
    Request Address: Remote Console Software ID (0x81)
    NetFn/LUN: Application Response
        0001 11.. = NetFn: Application Response (0x07)
        .... ..00 = Request LUN: 0x00
    Checksum 1: 0x63
    Response Address: BMC Slave Address (0x20)
    Seq/LUN: 0x08
        0000 10.. = Sequence: 0x02
        .... ..00 = Response LUN: 0x00
    Command: Get Session Challenge (0x39)
    Completion Code: Command completed normally (0x00)
    Checksum 2: 0xdd
Data (20 bytes)

0000  00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10   ..v.?..0H%aM..E.
0010  00 47 0a 9d 40 00 40 11 0e 62 c8 c8 c8 04 c8 c8   .G.. at .@..b......
0020  c8 01 02 6f 1b 59 00 33 00 00 06 00 ff 07 00 00   ...o.Y.3........
0030  00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 10   ..........c .9..
0040  3d 22 9c 75 4e d2 39 a4 0b 56 61 6f 20 df ea 78   =".uN.9..Vao ..x
0050  6b 86 c2 dd 00                                    k....

Frame 5 (101 bytes on wire, 101 bytes captured)
    Arrival Time: Nov 25, 2003 10:50:10.437332000
    Time delta from previous packet: 0.000428000 seconds
    Time relative to first packet: 0.342401000 seconds
    Frame Number: 5
    Packet Length: 101 bytes
    Capture Length: 101 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
    Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
    Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 87
    Identification: 0x0000 (0)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x18ff (correct)
    Source: odslin4.mas.eurocontrol.be (200.200.200.1)
    Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
    Source port: afs3-callback (7001)
    Destination port: aux_bus_shunt (623)
    Length: 67
    Checksum: 0xc2b9 (correct)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Activate Session (0x3a)
    Session: ID 0x9c223d10 (25 bytes)
        Authentication Type: OEM (0x05)
        Session Sequence Number: 0x00000000
        Session ID: 0x9c223d10
        Authentication Code: DD4D2F557F83B6DFE6E9CACAE38CA53E
    Message Length: 29
    Response Address: BMC Slave Address (0x20)
    NetFn/LUN: Application Request
        0001 10.. = NetFn: Application Request (0x06)
        .... ..00 = Response LUN: 0x00
    Checksum 1: 0xc8
    Request Address: Remote Console Software ID (0x81)
    Seq/LUN: 0x0c
        0000 11.. = Sequence: 0x03
        .... ..00 = Request LUN: 0x00
    Command: Activate Session (0x3a)
    Checksum 2: 0x3c
Data (22 bytes)

0000  00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00   .0H%aM..v.?...E.
0010  00 57 00 00 40 00 40 11 18 ff c8 c8 c8 01 c8 c8   .W.. at .@.........
0020  c8 04 1b 59 02 6f 00 43 c2 b9 06 00 ff 07 05 00   ...Y.o.C........
0030  00 00 00 10 3d 22 9c dd 4d 2f 55 7f 83 b6 df e6   ....="..M/U.....
0040  e9 ca ca e3 8c a5 3e 1d 20 18 c8 81 0c 3a 05 02   ......>. ....:..
0050  75 4e d2 39 a4 0b 56 61 6f 20 df ea 78 6b 86 c2   uN.9..Vao ..xk..
0060  dd 76 ef fd 3c                                    .v..<

The same holds true when changing ipmi_auths[5] to:
    { ipmi_md5_authcode_init,  ipmi_md5_authcode_gen,
      ipmi_md5_authcode_check, ipmi_md5_authcode_cleanup }

However, the Java IPMI tool that SuperMicro delivers with the BMC is able to activate the session:

Frame 3 (80 bytes on wire, 80 bytes captured)
    Arrival Time: Nov 25, 2003 10:44:18.427023000
    Time delta from previous packet: 0.002488000 seconds
    Time relative to first packet: 0.123603000 seconds
    Frame Number: 3
    Packet Length: 80 bytes
    Capture Length: 80 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
    Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Source: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
    Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 66
    Identification: 0x0000 (0)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x1914 (correct)
    Source: odslin4.mas.eurocontrol.be (200.200.200.1)
    Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: 36271 (36271), Dst Port: aux_bus_shunt (623)
    Source port: 36271 (36271)
    Destination port: aux_bus_shunt (623)
    Length: 46
    Checksum: 0xcd34 (correct)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Session Challenge (0x39)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 24
    Response Address: BMC Slave Address (0x20)
    NetFn/LUN: Application Request
        0001 10.. = NetFn: Application Request (0x06)
        .... ..00 = Response LUN: 0x00
    Checksum 1: 0xc8
    Request Address: Unknown (0x00)
    Seq/LUN: 0x00
        0000 00.. = Sequence: 0x00
        .... ..00 = Request LUN: 0x00
    Command: Get Session Challenge (0x39)
    Checksum 2: 0x59
Data (17 bytes)

0000  00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00   .0H%aM..v.?...E.
0010  00 42 00 00 40 00 40 11 19 14 c8 c8 c8 01 c8 c8   .B.. at .@.........
0020  c8 04 8d af 02 6f 00 2e cd 34 06 00 ff 07 00 00   .....o...4......
0030  00 00 00 00 00 00 00 18 20 18 c8 00 00 39 05 41   ........ ....9.A
0040  44 4d 49 4e 00 00 00 00 00 00 00 00 00 00 00 59   DMIN...........Y

Frame 4 (85 bytes on wire, 85 bytes captured)
    Arrival Time: Nov 25, 2003 10:44:18.542351000
    Time delta from previous packet: 0.115328000 seconds
    Time relative to first packet: 0.238931000 seconds
    Frame Number: 4
    Packet Length: 85 bytes
    Capture Length: 85 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
    Destination: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
    Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 71
    Identification: 0x0a93 (2707)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x0e6c (correct)
    Source: 200.200.200.4 (200.200.200.4)
    Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: 36271 (36271)
    Source port: aux_bus_shunt (623)
    Destination port: 36271 (36271)
    Length: 51
    Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Session Challenge (0x39)
    Session: ID 0x00000000 (9 bytes)
        Authentication Type: NONE (0x00)
        Session Sequence Number: 0x00000000
        Session ID: 0x00000000
    Message Length: 28
    Request Address: Unknown (0x00)
    NetFn/LUN: Application Response
        0001 11.. = NetFn: Application Response (0x07)
        .... ..00 = Request LUN: 0x00
    Checksum 1: 0xe4
    Response Address: BMC Slave Address (0x20)
    Seq/LUN: 0x00
        0000 00.. = Sequence: 0x00
        .... ..00 = Response LUN: 0x00
    Command: Get Session Challenge (0x39)
    Completion Code: Command completed normally (0x00)
    Checksum 2: 0x85
Data (20 bytes)

0000  00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10   ..v.?..0H%aM..E.
0010  00 47 0a 93 40 00 40 11 0e 6c c8 c8 c8 04 c8 c8   .G.. at .@..l......
0020  c8 01 02 6f 8d af 00 33 00 00 06 00 ff 07 00 00   ...o...3........
0030  00 00 00 00 00 00 00 1c 00 1c e4 20 00 39 00 10   ........... .9..
0040  30 d2 b3 b4 66 5c 8d 59 95 1f 9e 48 1d 51 b3 4f   0...f\.Y...H.Q.O
0050  cd eb 3f 85 00                                    ..?..

Frame 5 (101 bytes on wire, 101 bytes captured)
    Arrival Time: Nov 25, 2003 10:44:18.549163000
    Time delta from previous packet: 0.006812000 seconds
    Time relative to first packet: 0.245743000 seconds
    Frame Number: 5
    Packet Length: 101 bytes
    Capture Length: 101 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
    Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Source: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
    Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 87
    Identification: 0x0000 (0)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x18ff (correct)
    Source: odslin4.mas.eurocontrol.be (200.200.200.1)
    Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: 36271 (36271), Dst Port: aux_bus_shunt (623)
    Source port: 36271 (36271)
    Destination port: aux_bus_shunt (623)
    Length: 67
    Checksum: 0x836b (correct)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Activate Session (0x3a)
    Session: ID 0xb3d23010 (25 bytes)
        Authentication Type: OEM (0x05)
        Session Sequence Number: 0x00000000
        Session ID: 0xb3d23010
        Authentication Code: 5A50292FC164E754A3E7846B0A96880F
    Message Length: 29
    Response Address: BMC Slave Address (0x20)
    NetFn/LUN: Application Request
        0001 10.. = NetFn: Application Request (0x06)
        .... ..00 = Response LUN: 0x00
    Checksum 1: 0xc8
    Request Address: Unknown (0x00)
    Seq/LUN: 0x00
        0000 00.. = Sequence: 0x00
        .... ..00 = Request LUN: 0x00
    Command: Activate Session (0x3a)
    Checksum 2: 0xbd
Data (22 bytes)

0000  00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00   .0H%aM..v.?...E.
0010  00 57 00 00 40 00 40 11 18 ff c8 c8 c8 01 c8 c8   .W.. at .@.........
0020  c8 04 8d af 02 6f 00 43 83 6b 06 00 ff 07 05 00   .....o.C.k......
0030  00 00 00 10 30 d2 b3 5a 50 29 2f c1 64 e7 54 a3   ....0..ZP)/.d.T.
0040  e7 84 6b 0a 96 88 0f 1d 20 18 c8 00 00 3a 05 04   ..k..... ....:..
0050  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0060  00 00 00 00 bd                                    .....

Frame 6 (90 bytes on wire, 90 bytes captured)
    Arrival Time: Nov 25, 2003 10:44:18.627386000
    Time delta from previous packet: 0.078223000 seconds
    Time relative to first packet: 0.323966000 seconds
    Frame Number: 6
    Packet Length: 90 bytes
    Capture Length: 90 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
    Destination: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
    Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 76
    Identification: 0x0a94 (2708)
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x0e66 (correct)
    Source: 200.200.200.4 (200.200.200.4)
    Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: 36271 (36271)
    Source port: aux_bus_shunt (623)
    Destination port: 36271 (36271)
    Length: 56
    Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
    Version: 0x06
    Sequence: 0xff
    Type: Normal RMCP, Class: IPMI
        ...0 0111 = Class: IPMI (0x07)
        0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Activate Session (0x3a)
    Session: ID 0xb3d23010 (25 bytes)
        Authentication Type: OEM (0x05)
        Session Sequence Number: 0x00000001
        Session ID: 0xb3d23010
        Authentication Code: 1C000048D88D000200000000000000A4
    Message Length: 18
    Request Address: Unknown (0x00)
    NetFn/LUN: Application Response
        0001 11.. = NetFn: Application Response (0x07)
        .... ..00 = Request LUN: 0x00
    Checksum 1: 0xe4
    Response Address: BMC Slave Address (0x20)
    Seq/LUN: 0x00
        0000 00.. = Sequence: 0x00
        .... ..00 = Response LUN: 0x00
    Command: Activate Session (0x3a)
    Completion Code: Command completed normally (0x00)
    Checksum 2: 0xd8
Data (10 bytes)

0000  00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10   ..v.?..0H%aM..E.
0010  00 4c 0a 94 40 00 40 11 0e 66 c8 c8 c8 04 c8 c8   .L.. at .@..f......
0020  c8 01 02 6f 8d af 00 38 00 00 06 00 ff 07 05 01   ...o...8........
0030  00 00 00 10 30 d2 b3 1c 00 00 48 d8 8d 00 02 00   ....0.....H.....
0040  00 00 00 00 00 00 a4 12 00 1c e4 20 00 3a 00 05   ........... .:..
0050  10 30 d2 b3 00 00 00 00 04 d8                     .0........
--- snip ---

Regards,
Sebastian
--
Dipl.-Inform. Sebastian <dot> Wangnick <at eurocontrol dot int>
Office: Eurocontrol Maastricht UAC, Horsterweg 11, NL-6199AC Maastricht-Airport,
        Tel: +31-433661-370, Fax: -300


-----Original Message-----
From: Zheng, Jeff [mailto:jeff.zheng at intel.com] 
Sent: Wednesday 26 November 2003 08:56
To: WANGNICK Sebastian; openipmi-developer at lists.sourceforge.net; Beowulf
Subject: RE: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed


Did you enable lan support?

> Thanks
> Jeff                        Jeff.Zheng at intel.com
> BTW, I speak for myself, not for Intel Corp.


-----Original Message-----
From: openipmi-developer-admin at lists.sourceforge.net
[mailto:openipmi-developer-admin at lists.sourceforge.net]On Behalf Of WANGNICK Sebastian
Sent: Wednesday, November 26, 2003 3:30 PM
To: 'openipmi-developer at lists.sourceforge.net'; Beowulf
Subject: RE: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed


Hello Corey,

thanks, I'll try to challenge SuperMicro with that ...

Actually, I'm currenly evaluating PC's for a replacement programme of one of our systems (about 120 machines): 

 *) I've got the SuperMicro SM-X5DPL-iGM with the IPMI 1.5 kit, which has the prescribed problems. 

 *) I've also got a Tyan S2469UGN with the M3289 remote supervisor adaptor, but the M3289 didn't work and was returned for repair.

 *) I've also got an IBM E-Series x225 server. That one doesn't support IPMI, however, but runs a web server on the remote management card. This card has its own backup power supply and network connection (which is nice since you can provide it with its IP address via DHCP).

Could anyone on this mailing recommend another dual-processor mainboard, which would be capable of one of the "standard" IPMI authentication mechanisms?

I'm cross-posting to the beowulf mailing list since Google tells me that the SuperMicro issue has been discussed there before as well ...

Regards,
Sebastian
--
Dipl.-Inform. Sebastian <dot> Wangnick <at eurocontrol dot int>
Office: Eurocontrol Maastricht UAC, Horsterweg 11, NL-6199AC Maastricht-Airport,
        Tel: +31-433661-370, Fax: -300


-----Original Message-----
From: Corey Minyard [mailto:minyard at acm.org] 
Sent: Tuesday 25 November 2003 15:10
To: WANGNICK Sebastian
Cc: 'openipmi-developer at lists.sourceforge.net'
Subject: Re: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed


According to that authentication support bitmask, it only supports an 
OEM authentication type, as you have already figured out.  That means 
you have to find out what algorithm they are using and implement it.  
OpenIPMI doesn't currently have an interface to register authentication 
algorithms, but it needs one, I guess.

Also, you probably want "admin" privilege level, not "user" as user 
cannot really do very much.

-Corey

WANGNICK Sebastian wrote:

>Dear all,
>
>I'm trying in vain to connect via LAN to a SuperMicro systems using
>OpenIPMI (1.1.5). It seems that the SuperMicro *only* offers 
>Authorisation Capability 5 (that is OEM according to the Ethereal IPMI 
>code).
>
>[I've changed ipmi_lan.c:auth_cap_done to provide the details of the problem:
>        ipmi_log(IPMI_LOG_ERR_INFO, "Requested authentication %d not
>supported (supporting 0x%x only)", lan->authtype, (unsigned int) 
>msg->data[2]); ]
>
>Seems that the SuperMicro BMC sets msg->data[2] to 0x20.
>
>Now, to overcome the problem, I've added to ipmi_auth.h:
>	#define IPMI_AUTHTYPE_OEM	5
>changed in ipmi_auth.c ipmi_auths[5] to:
>    { ipmi_md2_authcode_init,  ipmi_md2_authcode_gen,
>      ipmi_md2_authcode_check, ipmi_md2_authcode_cleanup }
>and added to sample.c:main: 
>	} else if (strcmp(argv[curr_arg+3], "oem") == 0) {
>	    authtype = IPMI_AUTHTYPE_OEM;
>
>But still, when trying
>	./ipmisample -dmsg  lan 200.200.200.4 623 oem user ADMIN ADMIN the
>board doesn't respond to the Activate Session request:
>  
>

____

This message and any files transmitted with it are legally privileged and intended for the sole use of the individual(s) or entity to whom they are addressed. If you are not the intended recipient, please notify the sender by reply and delete the message and any attachments from your system. Any unauthorised use or disclosure of the content of this message is strictly prohibited and may be unlawful.

Nothing in this e-mail message amounts to a contractual or legal commitment on the part of EUROCONTROL unless it is confirmed by appropriately signed hard copy.

Any views expressed in this message are those of the sender.
_______________________________________________
Beowulf mailing list, Beowulf at beowulf.org
To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf



More information about the Beowulf mailing list