[Openipmi-developer] OpenIPMI via LAN to SuperMicro board doe sn't succeed
WANGNICK Sebastian
sebastian.wangnick at eurocontrol.int
Wed Nov 26 03:29:49 EST 2003
Oh, yes. My original email contained the Ethereal dumps:
--- snip ---
But still, when trying
./ipmisample -dmsg lan 200.200.200.4 623 oem user ADMIN ADMIN
the board doesn't respond to the Activate Session request:
Frame 1 (65 bytes on wire, 65 bytes captured)
Arrival Time: Nov 25, 2003 10:50:10.094931000
Time delta from previous packet: 0.000000000 seconds
Time relative to first packet: 0.000000000 seconds
Frame Number: 1
Packet Length: 65 bytes
Capture Length: 65 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 51
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x1923 (correct)
Source: odslin4.mas.eurocontrol.be (200.200.200.1)
Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
Source port: afs3-callback (7001)
Destination port: aux_bus_shunt (623)
Length: 31
Checksum: 0x8d6b (correct)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Channel Auth Capabilities (0x38)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 9
Response Address: BMC Slave Address (0x20)
NetFn/LUN: Application Request
0001 10.. = NetFn: Application Request (0x06)
.... ..00 = Response LUN: 0x00
Checksum 1: 0xc8
Request Address: Remote Console Software ID (0x81)
Seq/LUN: 0x04
0000 01.. = Sequence: 0x01
.... ..00 = Request LUN: 0x00
Command: Get Channel Auth Capabilities (0x38)
Checksum 2: 0x33
Data (2 bytes)
0000 00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00 .0H%aM..v.?...E.
0010 00 33 00 00 40 00 40 11 19 23 c8 c8 c8 01 c8 c8 .3.. at .@..#......
0020 c8 04 1b 59 02 6f 00 1f 8d 6b 06 00 ff 07 00 00 ...Y.o...k......
0030 00 00 00 00 00 00 00 09 20 18 c8 81 04 38 0e 02 ........ ....8..
0040 33 3
Frame 2 (72 bytes on wire, 72 bytes captured)
Arrival Time: Nov 25, 2003 10:50:10.321677000
Time delta from previous packet: 0.226746000 seconds
Time relative to first packet: 0.226746000 seconds
Frame Number: 2
Packet Length: 72 bytes
Capture Length: 72 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
Destination: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 58
Identification: 0x0a9c (2716)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x0e70 (correct)
Source: 200.200.200.4 (200.200.200.4)
Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: afs3-callback (7001)
Source port: aux_bus_shunt (623)
Destination port: afs3-callback (7001)
Length: 38
Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Channel Auth Capabilities (0x38)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 16
Request Address: Remote Console Software ID (0x81)
NetFn/LUN: Application Response
0001 11.. = NetFn: Application Response (0x07)
.... ..00 = Request LUN: 0x00
Checksum 1: 0x63
Response Address: BMC Slave Address (0x20)
Seq/LUN: 0x04
0000 01.. = Sequence: 0x01
.... ..00 = Response LUN: 0x00
Command: Get Channel Auth Capabilities (0x38)
Completion Code: Command completed normally (0x00)
Checksum 2: 0x97
Data (8 bytes)
0000 00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10 ..v.?..0H%aM..E.
0010 00 3a 0a 9c 40 00 40 11 0e 70 c8 c8 c8 04 c8 c8 .:.. at .@..p......
0020 c8 01 02 6f 1b 59 00 26 00 00 06 00 ff 07 00 00 ...o.Y.&........
0030 00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 01 ..........c .8..
0040 20 1c 00 bd 13 00 00 97 .......
Frame 3 (80 bytes on wire, 80 bytes captured)
Arrival Time: Nov 25, 2003 10:50:10.321885000
Time delta from previous packet: 0.000208000 seconds
Time relative to first packet: 0.226954000 seconds
Frame Number: 3
Packet Length: 80 bytes
Capture Length: 80 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 66
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x1914 (correct)
Source: odslin4.mas.eurocontrol.be (200.200.200.1)
Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
Source port: afs3-callback (7001)
Destination port: aux_bus_shunt (623)
Length: 46
Checksum: 0x3693 (correct)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Session Challenge (0x39)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 24
Response Address: BMC Slave Address (0x20)
NetFn/LUN: Application Request
0001 10.. = NetFn: Application Request (0x06)
.... ..00 = Response LUN: 0x00
Checksum 1: 0xc8
Request Address: Remote Console Software ID (0x81)
Seq/LUN: 0x08
0000 10.. = Sequence: 0x02
.... ..00 = Request LUN: 0x00
Command: Get Session Challenge (0x39)
Checksum 2: 0xd0
Data (17 bytes)
0000 00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00 .0H%aM..v.?...E.
0010 00 42 00 00 40 00 40 11 19 14 c8 c8 c8 01 c8 c8 .B.. at .@.........
0020 c8 04 1b 59 02 6f 00 2e 36 93 06 00 ff 07 00 00 ...Y.o..6.......
0030 00 00 00 00 00 00 00 18 20 18 c8 81 08 39 05 41 ........ ....9.A
0040 44 4d 49 4e 00 00 00 00 00 00 00 00 00 00 00 d0 DMIN............
Frame 4 (85 bytes on wire, 85 bytes captured)
Arrival Time: Nov 25, 2003 10:50:10.436904000
Time delta from previous packet: 0.115019000 seconds
Time relative to first packet: 0.341973000 seconds
Frame Number: 4
Packet Length: 85 bytes
Capture Length: 85 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
Destination: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 71
Identification: 0x0a9d (2717)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x0e62 (correct)
Source: 200.200.200.4 (200.200.200.4)
Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: afs3-callback (7001)
Source port: aux_bus_shunt (623)
Destination port: afs3-callback (7001)
Length: 51
Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Session Challenge (0x39)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 28
Request Address: Remote Console Software ID (0x81)
NetFn/LUN: Application Response
0001 11.. = NetFn: Application Response (0x07)
.... ..00 = Request LUN: 0x00
Checksum 1: 0x63
Response Address: BMC Slave Address (0x20)
Seq/LUN: 0x08
0000 10.. = Sequence: 0x02
.... ..00 = Response LUN: 0x00
Command: Get Session Challenge (0x39)
Completion Code: Command completed normally (0x00)
Checksum 2: 0xdd
Data (20 bytes)
0000 00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10 ..v.?..0H%aM..E.
0010 00 47 0a 9d 40 00 40 11 0e 62 c8 c8 c8 04 c8 c8 .G.. at .@..b......
0020 c8 01 02 6f 1b 59 00 33 00 00 06 00 ff 07 00 00 ...o.Y.3........
0030 00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 10 ..........c .9..
0040 3d 22 9c 75 4e d2 39 a4 0b 56 61 6f 20 df ea 78 =".uN.9..Vao ..x
0050 6b 86 c2 dd 00 k....
Frame 5 (101 bytes on wire, 101 bytes captured)
Arrival Time: Nov 25, 2003 10:50:10.437332000
Time delta from previous packet: 0.000428000 seconds
Time relative to first packet: 0.342401000 seconds
Frame Number: 5
Packet Length: 101 bytes
Capture Length: 101 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
Source: 00:04:76:0f:3f:b5 (odslin4.mas.eurocontrol.be)
Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 87
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x18ff (correct)
Source: odslin4.mas.eurocontrol.be (200.200.200.1)
Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: afs3-callback (7001), Dst Port: aux_bus_shunt (623)
Source port: afs3-callback (7001)
Destination port: aux_bus_shunt (623)
Length: 67
Checksum: 0xc2b9 (correct)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Activate Session (0x3a)
Session: ID 0x9c223d10 (25 bytes)
Authentication Type: OEM (0x05)
Session Sequence Number: 0x00000000
Session ID: 0x9c223d10
Authentication Code: DD4D2F557F83B6DFE6E9CACAE38CA53E
Message Length: 29
Response Address: BMC Slave Address (0x20)
NetFn/LUN: Application Request
0001 10.. = NetFn: Application Request (0x06)
.... ..00 = Response LUN: 0x00
Checksum 1: 0xc8
Request Address: Remote Console Software ID (0x81)
Seq/LUN: 0x0c
0000 11.. = Sequence: 0x03
.... ..00 = Request LUN: 0x00
Command: Activate Session (0x3a)
Checksum 2: 0x3c
Data (22 bytes)
0000 00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00 .0H%aM..v.?...E.
0010 00 57 00 00 40 00 40 11 18 ff c8 c8 c8 01 c8 c8 .W.. at .@.........
0020 c8 04 1b 59 02 6f 00 43 c2 b9 06 00 ff 07 05 00 ...Y.o.C........
0030 00 00 00 10 3d 22 9c dd 4d 2f 55 7f 83 b6 df e6 ....="..M/U.....
0040 e9 ca ca e3 8c a5 3e 1d 20 18 c8 81 0c 3a 05 02 ......>. ....:..
0050 75 4e d2 39 a4 0b 56 61 6f 20 df ea 78 6b 86 c2 uN.9..Vao ..xk..
0060 dd 76 ef fd 3c .v..<
The same holds true when changing ipmi_auths[5] to:
{ ipmi_md5_authcode_init, ipmi_md5_authcode_gen,
ipmi_md5_authcode_check, ipmi_md5_authcode_cleanup }
However, the Java IPMI tool that SuperMicro delivers with the BMC is able to activate the session:
Frame 3 (80 bytes on wire, 80 bytes captured)
Arrival Time: Nov 25, 2003 10:44:18.427023000
Time delta from previous packet: 0.002488000 seconds
Time relative to first packet: 0.123603000 seconds
Frame Number: 3
Packet Length: 80 bytes
Capture Length: 80 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
Source: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 66
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x1914 (correct)
Source: odslin4.mas.eurocontrol.be (200.200.200.1)
Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: 36271 (36271), Dst Port: aux_bus_shunt (623)
Source port: 36271 (36271)
Destination port: aux_bus_shunt (623)
Length: 46
Checksum: 0xcd34 (correct)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Get Session Challenge (0x39)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 24
Response Address: BMC Slave Address (0x20)
NetFn/LUN: Application Request
0001 10.. = NetFn: Application Request (0x06)
.... ..00 = Response LUN: 0x00
Checksum 1: 0xc8
Request Address: Unknown (0x00)
Seq/LUN: 0x00
0000 00.. = Sequence: 0x00
.... ..00 = Request LUN: 0x00
Command: Get Session Challenge (0x39)
Checksum 2: 0x59
Data (17 bytes)
0000 00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00 .0H%aM..v.?...E.
0010 00 42 00 00 40 00 40 11 19 14 c8 c8 c8 01 c8 c8 .B.. at .@.........
0020 c8 04 8d af 02 6f 00 2e cd 34 06 00 ff 07 00 00 .....o...4......
0030 00 00 00 00 00 00 00 18 20 18 c8 00 00 39 05 41 ........ ....9.A
0040 44 4d 49 4e 00 00 00 00 00 00 00 00 00 00 00 59 DMIN...........Y
Frame 4 (85 bytes on wire, 85 bytes captured)
Arrival Time: Nov 25, 2003 10:44:18.542351000
Time delta from previous packet: 0.115328000 seconds
Time relative to first packet: 0.238931000 seconds
Frame Number: 4
Packet Length: 85 bytes
Capture Length: 85 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
Destination: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 71
Identification: 0x0a93 (2707)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x0e6c (correct)
Source: 200.200.200.4 (200.200.200.4)
Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: 36271 (36271)
Source port: aux_bus_shunt (623)
Destination port: 36271 (36271)
Length: 51
Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Get Session Challenge (0x39)
Session: ID 0x00000000 (9 bytes)
Authentication Type: NONE (0x00)
Session Sequence Number: 0x00000000
Session ID: 0x00000000
Message Length: 28
Request Address: Unknown (0x00)
NetFn/LUN: Application Response
0001 11.. = NetFn: Application Response (0x07)
.... ..00 = Request LUN: 0x00
Checksum 1: 0xe4
Response Address: BMC Slave Address (0x20)
Seq/LUN: 0x00
0000 00.. = Sequence: 0x00
.... ..00 = Response LUN: 0x00
Command: Get Session Challenge (0x39)
Completion Code: Command completed normally (0x00)
Checksum 2: 0x85
Data (20 bytes)
0000 00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10 ..v.?..0H%aM..E.
0010 00 47 0a 93 40 00 40 11 0e 6c c8 c8 c8 04 c8 c8 .G.. at .@..l......
0020 c8 01 02 6f 8d af 00 33 00 00 06 00 ff 07 00 00 ...o...3........
0030 00 00 00 00 00 00 00 1c 00 1c e4 20 00 39 00 10 ........... .9..
0040 30 d2 b3 b4 66 5c 8d 59 95 1f 9e 48 1d 51 b3 4f 0...f\.Y...H.Q.O
0050 cd eb 3f 85 00 ..?..
Frame 5 (101 bytes on wire, 101 bytes captured)
Arrival Time: Nov 25, 2003 10:44:18.549163000
Time delta from previous packet: 0.006812000 seconds
Time relative to first packet: 0.245743000 seconds
Frame Number: 5
Packet Length: 101 bytes
Capture Length: 101 bytes
Ethernet II, Src: 00:04:76:0f:3f:b5, Dst: 00:30:48:25:61:4d
Destination: 00:30:48:25:61:4d (Supermic_25:61:4d)
Source: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
Type: IP (0x0800)
Internet Protocol, Src Addr: odslin4.mas.eurocontrol.be (200.200.200.1), Dst Addr: 200.200.200.4 (200.200.200.4)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 87
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x18ff (correct)
Source: odslin4.mas.eurocontrol.be (200.200.200.1)
Destination: 200.200.200.4 (200.200.200.4)
User Datagram Protocol, Src Port: 36271 (36271), Dst Port: aux_bus_shunt (623)
Source port: 36271 (36271)
Destination port: aux_bus_shunt (623)
Length: 67
Checksum: 0x836b (correct)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Request (0x06), Cmd: Activate Session (0x3a)
Session: ID 0xb3d23010 (25 bytes)
Authentication Type: OEM (0x05)
Session Sequence Number: 0x00000000
Session ID: 0xb3d23010
Authentication Code: 5A50292FC164E754A3E7846B0A96880F
Message Length: 29
Response Address: BMC Slave Address (0x20)
NetFn/LUN: Application Request
0001 10.. = NetFn: Application Request (0x06)
.... ..00 = Response LUN: 0x00
Checksum 1: 0xc8
Request Address: Unknown (0x00)
Seq/LUN: 0x00
0000 00.. = Sequence: 0x00
.... ..00 = Request LUN: 0x00
Command: Activate Session (0x3a)
Checksum 2: 0xbd
Data (22 bytes)
0000 00 30 48 25 61 4d 00 04 76 0f 3f b5 08 00 45 00 .0H%aM..v.?...E.
0010 00 57 00 00 40 00 40 11 18 ff c8 c8 c8 01 c8 c8 .W.. at .@.........
0020 c8 04 8d af 02 6f 00 43 83 6b 06 00 ff 07 05 00 .....o.C.k......
0030 00 00 00 10 30 d2 b3 5a 50 29 2f c1 64 e7 54 a3 ....0..ZP)/.d.T.
0040 e7 84 6b 0a 96 88 0f 1d 20 18 c8 00 00 3a 05 04 ..k..... ....:..
0050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0060 00 00 00 00 bd .....
Frame 6 (90 bytes on wire, 90 bytes captured)
Arrival Time: Nov 25, 2003 10:44:18.627386000
Time delta from previous packet: 0.078223000 seconds
Time relative to first packet: 0.323966000 seconds
Frame Number: 6
Packet Length: 90 bytes
Capture Length: 90 bytes
Ethernet II, Src: 00:30:48:25:61:4d, Dst: 00:04:76:0f:3f:b5
Destination: 00:04:76:0f:3f:b5 (3Com_0f:3f:b5)
Source: 00:30:48:25:61:4d (Supermic_25:61:4d)
Type: IP (0x0800)
Internet Protocol, Src Addr: 200.200.200.4 (200.200.200.4), Dst Addr: odslin4.mas.eurocontrol.be (200.200.200.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 76
Identification: 0x0a94 (2708)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x0e66 (correct)
Source: 200.200.200.4 (200.200.200.4)
Destination: odslin4.mas.eurocontrol.be (200.200.200.1) User Datagram Protocol, Src Port: aux_bus_shunt (623), Dst Port: 36271 (36271)
Source port: aux_bus_shunt (623)
Destination port: 36271 (36271)
Length: 56
Checksum: 0x0000 (none)
Remote Management Control Protocol, Class: IPMI
Version: 0x06
Sequence: 0xff
Type: Normal RMCP, Class: IPMI
...0 0111 = Class: IPMI (0x07)
0... .... = Message Type: Normal RMCP (0x00) Intelligent Platform Management Interface, NetFn: Application Response (0x07), Cmd: Activate Session (0x3a)
Session: ID 0xb3d23010 (25 bytes)
Authentication Type: OEM (0x05)
Session Sequence Number: 0x00000001
Session ID: 0xb3d23010
Authentication Code: 1C000048D88D000200000000000000A4
Message Length: 18
Request Address: Unknown (0x00)
NetFn/LUN: Application Response
0001 11.. = NetFn: Application Response (0x07)
.... ..00 = Request LUN: 0x00
Checksum 1: 0xe4
Response Address: BMC Slave Address (0x20)
Seq/LUN: 0x00
0000 00.. = Sequence: 0x00
.... ..00 = Response LUN: 0x00
Command: Activate Session (0x3a)
Completion Code: Command completed normally (0x00)
Checksum 2: 0xd8
Data (10 bytes)
0000 00 04 76 0f 3f b5 00 30 48 25 61 4d 08 00 45 10 ..v.?..0H%aM..E.
0010 00 4c 0a 94 40 00 40 11 0e 66 c8 c8 c8 04 c8 c8 .L.. at .@..f......
0020 c8 01 02 6f 8d af 00 38 00 00 06 00 ff 07 05 01 ...o...8........
0030 00 00 00 10 30 d2 b3 1c 00 00 48 d8 8d 00 02 00 ....0.....H.....
0040 00 00 00 00 00 00 a4 12 00 1c e4 20 00 3a 00 05 ........... .:..
0050 10 30 d2 b3 00 00 00 00 04 d8 .0........
--- snip ---
Regards,
Sebastian
--
Dipl.-Inform. Sebastian <dot> Wangnick <at eurocontrol dot int>
Office: Eurocontrol Maastricht UAC, Horsterweg 11, NL-6199AC Maastricht-Airport,
Tel: +31-433661-370, Fax: -300
-----Original Message-----
From: Zheng, Jeff [mailto:jeff.zheng at intel.com]
Sent: Wednesday 26 November 2003 08:56
To: WANGNICK Sebastian; openipmi-developer at lists.sourceforge.net; Beowulf
Subject: RE: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed
Did you enable lan support?
> Thanks
> Jeff Jeff.Zheng at intel.com
> BTW, I speak for myself, not for Intel Corp.
-----Original Message-----
From: openipmi-developer-admin at lists.sourceforge.net
[mailto:openipmi-developer-admin at lists.sourceforge.net]On Behalf Of WANGNICK Sebastian
Sent: Wednesday, November 26, 2003 3:30 PM
To: 'openipmi-developer at lists.sourceforge.net'; Beowulf
Subject: RE: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed
Hello Corey,
thanks, I'll try to challenge SuperMicro with that ...
Actually, I'm currenly evaluating PC's for a replacement programme of one of our systems (about 120 machines):
*) I've got the SuperMicro SM-X5DPL-iGM with the IPMI 1.5 kit, which has the prescribed problems.
*) I've also got a Tyan S2469UGN with the M3289 remote supervisor adaptor, but the M3289 didn't work and was returned for repair.
*) I've also got an IBM E-Series x225 server. That one doesn't support IPMI, however, but runs a web server on the remote management card. This card has its own backup power supply and network connection (which is nice since you can provide it with its IP address via DHCP).
Could anyone on this mailing recommend another dual-processor mainboard, which would be capable of one of the "standard" IPMI authentication mechanisms?
I'm cross-posting to the beowulf mailing list since Google tells me that the SuperMicro issue has been discussed there before as well ...
Regards,
Sebastian
--
Dipl.-Inform. Sebastian <dot> Wangnick <at eurocontrol dot int>
Office: Eurocontrol Maastricht UAC, Horsterweg 11, NL-6199AC Maastricht-Airport,
Tel: +31-433661-370, Fax: -300
-----Original Message-----
From: Corey Minyard [mailto:minyard at acm.org]
Sent: Tuesday 25 November 2003 15:10
To: WANGNICK Sebastian
Cc: 'openipmi-developer at lists.sourceforge.net'
Subject: Re: [Openipmi-developer] OpenIPMI via LAN to SuperMicro board doesn't succeed
According to that authentication support bitmask, it only supports an
OEM authentication type, as you have already figured out. That means
you have to find out what algorithm they are using and implement it.
OpenIPMI doesn't currently have an interface to register authentication
algorithms, but it needs one, I guess.
Also, you probably want "admin" privilege level, not "user" as user
cannot really do very much.
-Corey
WANGNICK Sebastian wrote:
>Dear all,
>
>I'm trying in vain to connect via LAN to a SuperMicro systems using
>OpenIPMI (1.1.5). It seems that the SuperMicro *only* offers
>Authorisation Capability 5 (that is OEM according to the Ethereal IPMI
>code).
>
>[I've changed ipmi_lan.c:auth_cap_done to provide the details of the problem:
> ipmi_log(IPMI_LOG_ERR_INFO, "Requested authentication %d not
>supported (supporting 0x%x only)", lan->authtype, (unsigned int)
>msg->data[2]); ]
>
>Seems that the SuperMicro BMC sets msg->data[2] to 0x20.
>
>Now, to overcome the problem, I've added to ipmi_auth.h:
> #define IPMI_AUTHTYPE_OEM 5
>changed in ipmi_auth.c ipmi_auths[5] to:
> { ipmi_md2_authcode_init, ipmi_md2_authcode_gen,
> ipmi_md2_authcode_check, ipmi_md2_authcode_cleanup }
>and added to sample.c:main:
> } else if (strcmp(argv[curr_arg+3], "oem") == 0) {
> authtype = IPMI_AUTHTYPE_OEM;
>
>But still, when trying
> ./ipmisample -dmsg lan 200.200.200.4 623 oem user ADMIN ADMIN the
>board doesn't respond to the Activate Session request:
>
>
____
This message and any files transmitted with it are legally privileged and intended for the sole use of the individual(s) or entity to whom they are addressed. If you are not the intended recipient, please notify the sender by reply and delete the message and any attachments from your system. Any unauthorised use or disclosure of the content of this message is strictly prohibited and may be unlawful.
Nothing in this e-mail message amounts to a contractual or legal commitment on the part of EUROCONTROL unless it is confirmed by appropriately signed hard copy.
Any views expressed in this message are those of the sender.
_______________________________________________
Beowulf mailing list, Beowulf at beowulf.org
To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf
More information about the Beowulf
mailing list