freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] "authentication type unavailable for attempted priv


From: Al Chu
Subject: Re: [Freeipmi-users] "authentication type unavailable for attempted privilege level" with Intel S5000PAL Mainboard
Date: Mon, 31 Aug 2009 10:06:28 -0700

Hey Werner,

Actually, your default config may be the issue afterall, not the
motherboard.  Your default config is not allowing authentication by any
privilege level other than "admin".  How about trying ipmimonitoring
with the -l admin, to tell ipmimonitoring to use the admin privilege
level.

Out of my curiosity, did the Intel motherboard come like this by
default?

Al

On Mon, 2009-08-31 at 12:18 +0200, Werner Fischer wrote:
> Hi Al,
> 
> sorry for my late reply. Now I'm back in the office. You find my results
> below:
> 
> On Mon, 2009-08-24 at 10:40 -0700, Al Chu wrote:
> > Hi Werner,
> > 
> > Thanks for the feedback.
> > 
> > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 --debug -u admin -p 
> > > relation
> > 
> > Could you run --debug with the -W "authcap".  I'm wondering if it's
> > failing in a different location and the workaround has to be in multiple
> > places.
> sure, here it is:
> 
> -------------------------------------------------------------------------------------
> 
> address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W "authcap" --debug -u 
> admin -p relation
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities Request
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               0h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [               0h] = session_id[32b]
> 192.168.1.211: [               9h] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [               6h] = net_fn[ 6b]
> 192.168.1.211: [              C8h] = checksum1[ 8b]
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [              33h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              38h] = cmd[ 8b]
> 192.168.1.211: [               Eh] = channel_number[ 4b]
> 192.168.1.211: [               0h] = reserved1[ 4b]
> 192.168.1.211: [               3h] = maximum_privilege_level[ 4b]
> 192.168.1.211: [               0h] = reserved2[ 4b]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [              6Ah] = checksum2[ 8b]
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities Response
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               0h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [               0h] = session_id[32b]
> 192.168.1.211: [              10h] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [               7h] = net_fn[ 6b]
> 192.168.1.211: [              63h] = checksum1[ 8b]
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [              33h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              38h] = cmd[ 8b]
> 192.168.1.211: [               0h] = comp_code[ 8b]
> 192.168.1.211: [               1h] = channel_number[ 8b]
> 192.168.1.211: [               0h] = authentication_type.none[ 1b]
> 192.168.1.211: [               0h] = authentication_type.md2[ 1b]
> 192.168.1.211: [               0h] = authentication_type.md5[ 1b]
> 192.168.1.211: [               0h] = authentication_type.reserved1[ 1b]
> 192.168.1.211: [               0h] = 
> authentication_type.straight_password_key[ 1b]
> 192.168.1.211: [               0h] = authentication_type.oem_prop[ 1b]
> 192.168.1.211: [               0h] = authentication_type.reserved2[ 2b]
> 192.168.1.211: [               0h] = authentication_status.anonymous_login[ 
> 1b]
> 192.168.1.211: [               0h] = authentication_status.null_username[ 1b]
> 192.168.1.211: [               1h] = authentication_status.non_null_username[ 
> 1b]
> 192.168.1.211: [               0h] = 
> authentication_status.user_level_authentication[ 1b]
> 192.168.1.211: [               0h] = 
> authentication_status.per_message_authentication[ 1b]
> 192.168.1.211: [               0h] = authentication_status.reserved[ 3b]
> 192.168.1.211: [               0h] = reserved1[ 8b]
> 192.168.1.211: [               0h] = oem_id[24b]
> 192.168.1.211: [               0h] = oem_auxiliary_data[ 8b]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [              D7h] = checksum2[ 8b]
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Get Session Challenge Request
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               0h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [               0h] = session_id[32b]
> 192.168.1.211: [              18h] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [               6h] = net_fn[ 6b]
> 192.168.1.211: [              C8h] = checksum1[ 8b]
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [              34h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              39h] = cmd[ 8b]
> 192.168.1.211: [               2h] = authentication_type[ 4b]
> 192.168.1.211: [               0h] = reserved[ 4b]
> 192.168.1.211: [  BYTE ARRAY ... ] = user_name[16B]
> 192.168.1.211: [ 61h 64h 6Dh 69h 6Eh 00h 00h 00h ]
> 192.168.1.211: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [              6Bh] = checksum2[ 8b]
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Get Session Challenge Response
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               0h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [               0h] = session_id[32b]
> 192.168.1.211: [              1Ch] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [               7h] = net_fn[ 6b]
> 192.168.1.211: [              63h] = checksum1[ 8b]
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [              34h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              39h] = cmd[ 8b]
> 192.168.1.211: [               0h] = comp_code[ 8b]
> 192.168.1.211: [         AC03D99h] = temp_session_id[32b]
> 192.168.1.211: [  BYTE ARRAY ... ] = challenge_string[16B]
> 192.168.1.211: [ 69h F4h 8Ah 89h 60h E4h E2h 1Ch ]
> 192.168.1.211: [ 2Ah CCh 96h A0h 6Dh 5Ah CAh 7Ah ]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [              4Eh] = checksum2[ 8b]
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Activiate Session Request
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               2h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [         AC03D99h] = session_id[32b]
> 192.168.1.211: [  BYTE ARRAY ... ] = authentication_code[16B]
> 192.168.1.211: [ 6Bh 25h AAh 78h 0Bh D3h F8h 14h ]
> 192.168.1.211: [ C4h 57h 15h 6Eh 15h C3h 15h F6h ]
> 192.168.1.211: [              1Dh] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [               6h] = net_fn[ 6b]
> 192.168.1.211: [              C8h] = checksum1[ 8b]
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [              35h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              3Ah] = cmd[ 8b]
> 192.168.1.211: [               2h] = authentication_type[ 4b]
> 192.168.1.211: [               0h] = reserved1[ 4b]
> 192.168.1.211: [               3h] = maximum_privilege_level[ 4b]
> 192.168.1.211: [               0h] = reserved2[ 4b]
> 192.168.1.211: [  BYTE ARRAY ... ] = challenge_string[16B]
> 192.168.1.211: [ 69h F4h 8Ah 89h 60h E4h E2h 1Ch ]
> 192.168.1.211: [ 2Ah CCh 96h A0h 6Dh 5Ah CAh 7Ah ]
> 192.168.1.211: [        279F274Fh] = initial_outbound_sequence_number[32b]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [              47h] = checksum2[ 8b]
> 192.168.1.211: =====================================================
> 192.168.1.211: IPMI 1.5 Activiate Session Response
> 192.168.1.211: =====================================================
> 192.168.1.211: RMCP Header:
> 192.168.1.211: ------------
> 192.168.1.211: [               6h] = version[ 8b]
> 192.168.1.211: [               0h] = reserved[ 8b]
> 192.168.1.211: [              FFh] = sequence_number[ 8b]
> 192.168.1.211: [               7h] = message_class.class[ 5b]
> 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> 192.168.1.211: [               0h] = message_class.ack[ 1b]
> 192.168.1.211: IPMI Session Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [               2h] = authentication_type[ 8b]
> 192.168.1.211: [               0h] = session_sequence_number[32b]
> 192.168.1.211: [         AC03D99h] = session_id[32b]
> 192.168.1.211: [  BYTE ARRAY ... ] = authentication_code[16B]
> 192.168.1.211: [ 29h BCh 75h CEh 94h F5h 23h 0Eh ]
> 192.168.1.211: [ A9h A9h 97h FFh 58h 22h C4h 89h ]
> 192.168.1.211: [               8h] = ipmi_msg_len[ 8b]
> 192.168.1.211: IPMI Message Header:
> 192.168.1.211: --------------------
> 192.168.1.211: [              81h] = rq_addr[ 8b]
> 192.168.1.211: [               0h] = rq_lun[ 2b]
> 192.168.1.211: [               7h] = net_fn[ 6b]
> 192.168.1.211: [              63h] = checksum1[ 8b]
> 192.168.1.211: [              20h] = rs_addr[ 8b]
> 192.168.1.211: [               0h] = rs_lun[ 2b]
> 192.168.1.211: [              35h] = rq_seq[ 6b]
> 192.168.1.211: IPMI Command Data:
> 192.168.1.211: ------------------
> 192.168.1.211: [              3Ah] = cmd[ 8b]
> 192.168.1.211: [              CCh] = comp_code[ 8b]
> 192.168.1.211: IPMI Trailer:
> 192.168.1.211: --------------
> 192.168.1.211: [               6h] = checksum2[ 8b]
> ipmi_ctx_open_outofband: bad completion code: request data/parameter invalid
> address@hidden ~]#
> 
> -------------------------------------------------------------------------------------
> 
> > 
> > A few other random thoughts.
> > 
> > Could you also try different authentication types.  Like "-a md2" and
> > "-a straight_password_key".
> address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="authcap" -u admin -p 
> relation
> ipmimonitoring: authentication type unavailable for attempted privilege level
> address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="authcap" -a md2 -u 
> admin -p relation
> ipmimonitoring: authentication type unavailable for attempted privilege level
> address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="authcap" -a 
> STRAIGHT_PASSWORD_KEY -u admin -p relation
> ipmimonitoring: authentication type unavailable for attempted privilege level
> address@hidden ~]#
> 
> > 
> > Also, what is the output of "bmc-config --checkout
> > --section=lan_conf_auth", just so we can check to make sure the
> > configuration looks good.
> I ran the command remotely as I have currently no Linux installed on the
> box (if it is necessary, just tell me, than I can put a Linux on it and
> run bmc-config locally):
> 
> address@hidden ~]# bmc-config -h 192.168.1.211 -u admin -p relation 
> --checkout --section=lan_conf_auth
> #
> # Section Lan_Conf_Auth Comments 
> #
> # In the Lan_Conf_Auth section, allowable authentication mechanisms for IPMI 
> 1.5 
> # is configured. Most users will want to set all "MD5" authentication to 
> "Yes" 
> # and the rest to "No". If you have configured a NULL username and a NULL 
> # password, you will also want to configure some of the "None" fields to 
> "Yes" 
> # to allow "None" authentication to work. Some motherboards do not allow you 
> to 
> # enable OEM authentication, so you may wish to set all OEM related fields to 
> # "No". 
> #
> Section Lan_Conf_Auth
>       ## Possible values: Yes/No
>       Callback_Enable_Auth_Type_None                No
>       ## Possible values: Yes/No
>       Callback_Enable_Auth_Type_MD5                 No
>       ## Possible values: Yes/No
>       Callback_Enable_Auth_Type_Straight_Password   No
>       ## Possible values: Yes/No
>       User_Enable_Auth_Type_None                    No
>       ## Possible values: Yes/No
>       User_Enable_Auth_Type_MD5                     No
>       ## Possible values: Yes/No
>       User_Enable_Auth_Type_Straight_Password       No
>       ## Possible values: Yes/No
>       Operator_Enable_Auth_Type_None                No
>       ## Possible values: Yes/No
>       Operator_Enable_Auth_Type_MD5                 No
>       ## Possible values: Yes/No
>       Operator_Enable_Auth_Type_Straight_Password   No
>       ## Possible values: Yes/No
>       Admin_Enable_Auth_Type_None                   No
>       ## Possible values: Yes/No
>       Admin_Enable_Auth_Type_MD5                    Yes
>       ## Possible values: Yes/No
>       Admin_Enable_Auth_Type_Straight_Password      Yes
>       ## Possible values: Yes/No
>       OEM_Enable_Auth_Type_None                     No
>       ## Possible values: Yes/No
>       OEM_Enable_Auth_Type_MD5                      No
>       ## Possible values: Yes/No
>       OEM_Enable_Auth_Type_Straight_Password        No
> EndSection
> address@hidden ~]# 
> 
> If you need any further results, just let me know!
> 
> Thanks for your support,
> Werner
> 
> > 
> > Thanks,
> > 
> > Al
> > 
> > On Mon, 2009-08-24 at 15:31 +0200, Werner Fischer wrote:
> > > Hi Al,
> > > 
> > > thanks for the updated tar.gz. I tried it, but somehow it still seems to
> > > cause problems (see below). I'll be two days out of office - so I can do
> > > further tests on Thursday.
> > > 
> > > thanks for your support!
> > > 
> > > address@hidden ~]# rpm -q freeipmi
> > > freeipmi-0.7.12.beta2-1.fc9.i386
> > > address@hidden ~]# ipmimonitoring -V
> > > ipmimonitoring - 0.7.12.beta2
> > > Copyright (C) 2007-2008 Lawrence Livermore National Security, LLC.
> > > Copyright (C) 2006-2007 The Regents of the University of California.
> > > This program is free software; you may redistribute it under the terms of
> > > the GNU General Public License.  This program has absolutely no warranty.
> > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -u admin -p relation
> > > ipmimonitoring: authentication type unavailable for attempted privilege 
> > > level
> > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="intel20" -u admin 
> > > -p relation
> > > ipmimonitoring: authentication type unavailable for attempted privilege 
> > > level
> > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="authcap" -u admin 
> > > -p relation
> > > ipmimonitoring: authentication type unavailable for attempted privilege 
> > > level
> > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 --debug -u admin -p 
> > > relation
> > > 192.168.1.211: =====================================================
> > > 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities Request
> > > 192.168.1.211: =====================================================
> > > 192.168.1.211: RMCP Header:
> > > 192.168.1.211: ------------
> > > 192.168.1.211: [               6h] = version[ 8b]
> > > 192.168.1.211: [               0h] = reserved[ 8b]
> > > 192.168.1.211: [              FFh] = sequence_number[ 8b]
> > > 192.168.1.211: [               7h] = message_class.class[ 5b]
> > > 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> > > 192.168.1.211: [               0h] = message_class.ack[ 1b]
> > > 192.168.1.211: IPMI Session Header:
> > > 192.168.1.211: --------------------
> > > 192.168.1.211: [               0h] = authentication_type[ 8b]
> > > 192.168.1.211: [               0h] = session_sequence_number[32b]
> > > 192.168.1.211: [               0h] = session_id[32b]
> > > 192.168.1.211: [               9h] = ipmi_msg_len[ 8b]
> > > 192.168.1.211: IPMI Message Header:
> > > 192.168.1.211: --------------------
> > > 192.168.1.211: [              20h] = rs_addr[ 8b]
> > > 192.168.1.211: [               0h] = rs_lun[ 2b]
> > > 192.168.1.211: [               6h] = net_fn[ 6b]
> > > 192.168.1.211: [              C8h] = checksum1[ 8b]
> > > 192.168.1.211: [              81h] = rq_addr[ 8b]
> > > 192.168.1.211: [               0h] = rq_lun[ 2b]
> > > 192.168.1.211: [              13h] = rq_seq[ 6b]
> > > 192.168.1.211: IPMI Command Data:
> > > 192.168.1.211: ------------------
> > > 192.168.1.211: [              38h] = cmd[ 8b]
> > > 192.168.1.211: [               Eh] = channel_number[ 4b]
> > > 192.168.1.211: [               0h] = reserved1[ 4b]
> > > 192.168.1.211: [               3h] = maximum_privilege_level[ 4b]
> > > 192.168.1.211: [               0h] = reserved2[ 4b]
> > > 192.168.1.211: IPMI Trailer:
> > > 192.168.1.211: --------------
> > > 192.168.1.211: [              EAh] = checksum2[ 8b]
> > > 192.168.1.211: =====================================================
> > > 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities Response
> > > 192.168.1.211: =====================================================
> > > 192.168.1.211: RMCP Header:
> > > 192.168.1.211: ------------
> > > 192.168.1.211: [               6h] = version[ 8b]
> > > 192.168.1.211: [               0h] = reserved[ 8b]
> > > 192.168.1.211: [              FFh] = sequence_number[ 8b]
> > > 192.168.1.211: [               7h] = message_class.class[ 5b]
> > > 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> > > 192.168.1.211: [               0h] = message_class.ack[ 1b]
> > > 192.168.1.211: IPMI Session Header:
> > > 192.168.1.211: --------------------
> > > 192.168.1.211: [               0h] = authentication_type[ 8b]
> > > 192.168.1.211: [               0h] = session_sequence_number[32b]
> > > 192.168.1.211: [               0h] = session_id[32b]
> > > 192.168.1.211: [              10h] = ipmi_msg_len[ 8b]
> > > 192.168.1.211: IPMI Message Header:
> > > 192.168.1.211: --------------------
> > > 192.168.1.211: [              81h] = rq_addr[ 8b]
> > > 192.168.1.211: [               0h] = rq_lun[ 2b]
> > > 192.168.1.211: [               7h] = net_fn[ 6b]
> > > 192.168.1.211: [              63h] = checksum1[ 8b]
> > > 192.168.1.211: [              20h] = rs_addr[ 8b]
> > > 192.168.1.211: [               0h] = rs_lun[ 2b]
> > > 192.168.1.211: [              13h] = rq_seq[ 6b]
> > > 192.168.1.211: IPMI Command Data:
> > > 192.168.1.211: ------------------
> > > 192.168.1.211: [              38h] = cmd[ 8b]
> > > 192.168.1.211: [               0h] = comp_code[ 8b]
> > > 192.168.1.211: [               1h] = channel_number[ 8b]
> > > 192.168.1.211: [               0h] = authentication_type.none[ 1b]
> > > 192.168.1.211: [               0h] = authentication_type.md2[ 1b]
> > > 192.168.1.211: [               0h] = authentication_type.md5[ 1b]
> > > 192.168.1.211: [               0h] = authentication_type.reserved1[ 1b]
> > > 192.168.1.211: [               0h] = 
> > > authentication_type.straight_password_key[ 1b]
> > > 192.168.1.211: [               0h] = authentication_type.oem_prop[ 1b]
> > > 192.168.1.211: [               0h] = authentication_type.reserved2[ 2b]
> > > 192.168.1.211: [               0h] = 
> > > authentication_status.anonymous_login[ 1b]
> > > 192.168.1.211: [               0h] = authentication_status.null_username[ 
> > > 1b]
> > > 192.168.1.211: [               1h] = 
> > > authentication_status.non_null_username[ 1b]
> > > 192.168.1.211: [               0h] = 
> > > authentication_status.user_level_authentication[ 1b]
> > > 192.168.1.211: [               0h] = 
> > > authentication_status.per_message_authentication[ 1b]
> > > 192.168.1.211: [               0h] = authentication_status.reserved[ 3b]
> > > 192.168.1.211: [               0h] = reserved1[ 8b]
> > > 192.168.1.211: [               0h] = oem_id[24b]
> > > 192.168.1.211: [               0h] = oem_auxiliary_data[ 8b]
> > > 192.168.1.211: IPMI Trailer:
> > > 192.168.1.211: --------------
> > > 192.168.1.211: [              57h] = checksum2[ 8b]
> > > ipmimonitoring: authentication type unavailable for attempted privilege 
> > > level
> > > address@hidden ~]# 
> > > 
> > > 
> > > On Fri, 2009-08-21 at 14:03 -0700, Al Chu wrote:
> > > > Hi Werner,
> > > > 
> > > > I've got a test tar.gz here:
> > > > 
> > > > http://**ftp.gluster.com/pub/freeipmi/qa-release/freeipmi-0.7.12.beta2.tar.gz
> > > > 
> > > > This makes it so the 'authcap' workaround should work for you.  Can you
> > > > give it a shot to make sure it works?
> > > > 
> > > > Thanks,
> > > > Al
> > > > 
> > > > On Fri, 2009-08-21 at 08:44 -0700, Al Chu wrote:
> > > > > Hi Werner,
> > > > > 
> > > > > > 192.168.1.211: [               0h] = authentication_type.none[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.md2[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.md5[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.reserved1[ 
> > > > > > 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_type.straight_password_key[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.oem_prop[ 
> > > > > > 1b]
> > > > > 
> > > > > This indicates that no authentication support is enabled, which is 
> > > > > very
> > > > > unlikely of being true (which we could verify via 'bmc-config 
> > > > > --checkout
> > > > > --section=lan_conf_auth').
> > > > > 
> > > > > I'll modify the 'authcap' workaround to also encompass this case and
> > > > > post a beta tar.gz for you to check out.
> > > > > 
> > > > > Al
> > > > > 
> > > > > On Fri, 2009-08-21 at 09:58 +0200, Werner Fischer wrote:
> > > > > > Hi Al,
> > > > > > 
> > > > > > thanks for your fast answer.
> > > > > > 
> > > > > > Below you find the requested debug output. I'm using version 
> > > > > > 0.7.11. The
> > > > > > "authcap" workaround does not fix the problem. After executing with
> > > > > > debug to the affected Intel S5000PAL system (IP 192.168.1.211) I 
> > > > > > again
> > > > > > verified the correct behavior of ipmimonitoring to the other system
> > > > > > (Supermicro) to IP 10.10.10.233.
> > > > > > 
> > > > > > address@hidden ~]# rpm -q freeipmi
> > > > > > freeipmi-0.7.11-1.fc9.i386
> > > > > > address@hidden ~]# ipmimonitoring -V
> > > > > > ipmimonitoring - 0.7.11
> > > > > > Copyright (C) 2007-2008 Lawrence Livermore National Security, LLC.
> > > > > > Copyright (C) 2006-2007 The Regents of the University of California.
> > > > > > This program is free software; you may redistribute it under the 
> > > > > > terms of
> > > > > > the GNU General Public License.  This program has absolutely no 
> > > > > > warranty.
> > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -u admin -p 
> > > > > > relation
> > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > privilege level
> > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="intel20" -u 
> > > > > > admin -p relation
> > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > privilege level
> > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="authcap" -u 
> > > > > > admin -p relation
> > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > privilege level
> > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 --debug -u admin 
> > > > > > -p relation
> > > > > > 192.168.1.211: =====================================================
> > > > > > 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities 
> > > > > > Request
> > > > > > 192.168.1.211: =====================================================
> > > > > > 192.168.1.211: RMCP Header:
> > > > > > 192.168.1.211: ------------
> > > > > > 192.168.1.211: [               6h] = version[ 8b]
> > > > > > 192.168.1.211: [               0h] = reserved[ 8b]
> > > > > > 192.168.1.211: [              FFh] = sequence_number[ 8b]
> > > > > > 192.168.1.211: [               7h] = message_class.class[ 5b]
> > > > > > 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> > > > > > 192.168.1.211: [               0h] = message_class.ack[ 1b]
> > > > > > 192.168.1.211: IPMI Session Header:
> > > > > > 192.168.1.211: --------------------
> > > > > > 192.168.1.211: [               0h] = authentication_type[ 8b]
> > > > > > 192.168.1.211: [               0h] = session_sequence_number[32b]
> > > > > > 192.168.1.211: [               0h] = session_id[32b]
> > > > > > 192.168.1.211: [               9h] = ipmi_msg_len[ 8b]
> > > > > > 192.168.1.211: IPMI Message Header:
> > > > > > 192.168.1.211: --------------------
> > > > > > 192.168.1.211: [              20h] = rs_addr[ 8b]
> > > > > > 192.168.1.211: [               0h] = rs_lun[ 2b]
> > > > > > 192.168.1.211: [               6h] = net_fn[ 6b]
> > > > > > 192.168.1.211: [              C8h] = checksum1[ 8b]
> > > > > > 192.168.1.211: [              81h] = rq_addr[ 8b]
> > > > > > 192.168.1.211: [               0h] = rq_lun[ 2b]
> > > > > > 192.168.1.211: [               8h] = rq_seq[ 6b]
> > > > > > 192.168.1.211: IPMI Command Data:
> > > > > > 192.168.1.211: ------------------
> > > > > > 192.168.1.211: [              38h] = cmd[ 8b]
> > > > > > 192.168.1.211: [               Eh] = channel_number[ 4b]
> > > > > > 192.168.1.211: [               0h] = reserved1[ 4b]
> > > > > > 192.168.1.211: [               3h] = maximum_privilege_level[ 4b]
> > > > > > 192.168.1.211: [               0h] = reserved2[ 4b]
> > > > > > 192.168.1.211: IPMI Trailer:
> > > > > > 192.168.1.211: --------------
> > > > > > 192.168.1.211: [              16h] = checksum2[ 8b]
> > > > > > 192.168.1.211: =====================================================
> > > > > > 192.168.1.211: IPMI 1.5 Get Channel Authentication Capabilities 
> > > > > > Response
> > > > > > 192.168.1.211: =====================================================
> > > > > > 192.168.1.211: RMCP Header:
> > > > > > 192.168.1.211: ------------
> > > > > > 192.168.1.211: [               6h] = version[ 8b]
> > > > > > 192.168.1.211: [               0h] = reserved[ 8b]
> > > > > > 192.168.1.211: [              FFh] = sequence_number[ 8b]
> > > > > > 192.168.1.211: [               7h] = message_class.class[ 5b]
> > > > > > 192.168.1.211: [               0h] = message_class.reserved[ 2b]
> > > > > > 192.168.1.211: [               0h] = message_class.ack[ 1b]
> > > > > > 192.168.1.211: IPMI Session Header:
> > > > > > 192.168.1.211: --------------------
> > > > > > 192.168.1.211: [               0h] = authentication_type[ 8b]
> > > > > > 192.168.1.211: [               0h] = session_sequence_number[32b]
> > > > > > 192.168.1.211: [               0h] = session_id[32b]
> > > > > > 192.168.1.211: [              10h] = ipmi_msg_len[ 8b]
> > > > > > 192.168.1.211: IPMI Message Header:
> > > > > > 192.168.1.211: --------------------
> > > > > > 192.168.1.211: [              81h] = rq_addr[ 8b]
> > > > > > 192.168.1.211: [               0h] = rq_lun[ 2b]
> > > > > > 192.168.1.211: [               7h] = net_fn[ 6b]
> > > > > > 192.168.1.211: [              63h] = checksum1[ 8b]
> > > > > > 192.168.1.211: [              20h] = rs_addr[ 8b]
> > > > > > 192.168.1.211: [               0h] = rs_lun[ 2b]
> > > > > > 192.168.1.211: [               8h] = rq_seq[ 6b]
> > > > > > 192.168.1.211: IPMI Command Data:
> > > > > > 192.168.1.211: ------------------
> > > > > > 192.168.1.211: [              38h] = cmd[ 8b]
> > > > > > 192.168.1.211: [               0h] = comp_code[ 8b]
> > > > > > 192.168.1.211: [               1h] = channel_number[ 8b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.none[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.md2[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.md5[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.reserved1[ 
> > > > > > 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_type.straight_password_key[ 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.oem_prop[ 
> > > > > > 1b]
> > > > > > 192.168.1.211: [               0h] = authentication_type.reserved2[ 
> > > > > > 2b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_status.anonymous_login[ 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_status.null_username[ 1b]
> > > > > > 192.168.1.211: [               1h] = 
> > > > > > authentication_status.non_null_username[ 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_status.user_level_authentication[ 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_status.per_message_authentication[ 1b]
> > > > > > 192.168.1.211: [               0h] = 
> > > > > > authentication_status.reserved[ 3b]
> > > > > > 192.168.1.211: [               0h] = reserved1[ 8b]
> > > > > > 192.168.1.211: [               0h] = oem_id[24b]
> > > > > > 192.168.1.211: [               0h] = oem_auxiliary_data[ 8b]
> > > > > > 192.168.1.211: IPMI Trailer:
> > > > > > 192.168.1.211: --------------
> > > > > > 192.168.1.211: [              83h] = checksum2[ 8b]
> > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > privilege level
> > > > > > address@hidden ~]# 
> > > > > > address@hidden ~]# 
> > > > > > address@hidden ~]# 
> > > > > > address@hidden ~]# ipmimonitoring -h 10.10.10.233 -u ADMIN -p ADMIN
> > > > > > Record_ID | Sensor Name | Sensor Group | Monitoring Status| Sensor 
> > > > > > Units | Sensor Reading
> > > > > > 4 | System Temp | Temperature | Nominal | C | 41.000000 
> > > > > > 5 | CPU1 Vcore | Voltage | Nominal | V | 0.976000 
> > > > > > 7 | CPU1 DIMM | Voltage | Nominal | V | 1.512000 
> > > > > > 9 | +1.5V | Voltage | Nominal | V | 1.504000 
> > > > > > 10 | +3.3V | Voltage | Nominal | V | 3.240000 
> > > > > > 11 | +3.3VSB | Voltage | Nominal | V | 3.240000 
> > > > > > 12 | +5V | Voltage | Nominal | V | 5.120000 
> > > > > > 13 | +12V | Voltage | Nominal | V | 12.190000 
> > > > > > 14 | VBAT | Voltage | Nominal | V | 3.216000 
> > > > > > 15 | Fan1 | Fan | Nominal | RPM | 3264.000000 
> > > > > > 16 | Fan2 | Fan | Nominal | RPM | 3536.000000 
> > > > > > 19 | Fan5 | Fan | Nominal | RPM | 2788.000000 
> > > > > > 20 | Fan6 | Fan | Nominal | RPM | 2652.000000 
> > > > > > 21 | Fan7 | Fan | Nominal | RPM | 3536.000000 
> > > > > > 23 | Intrusion | Physical Security | Nominal | N/A | 'OK'
> > > > > > 24 | PS Failure | Power Supply | Nominal | N/A | 'OK'
> > > > > > address@hidden ~]# 
> > > > > > 
> > > > > > Werner
> > > > > > 
> > > > > > On Wed, 2009-08-19 at 08:58 -0700, Al Chu wrote:
> > > > > > > Hi Werner,
> > > > > > > 
> > > > > > > It's possible the motherboard is not reporting supported 
> > > > > > > authentication
> > > > > > > types correctly.  You could give the "authcap" workaround a shot.
> > > > > > > However, if this is being non-compliant in the way that I think 
> > > > > > > it is,
> > > > > > > the "authcap" workaround won't work (b/c it currently handles a
> > > > > > > different non-compliance bug).  Could you send me the output from
> > > > > > > --debug?  If we can verify the issue, I'll implement a new 
> > > > > > > workaround
> > > > > > > for you.
> > > > > > > 
> > > > > > > BTW, if you need the intel20 workarounds for IPMI 2.0, you may 
> > > > > > > need to
> > > > > > > upgrade.  There were some bugs found a few releases ago.
> > > > > > > 
> > > > > > > 0.7.4 - 12/15/08
> > > > > > > ----------------
> > > > > > > <snip>
> > > > > > > o Fix Intel IPMI 2.0 workarounds in all tools/libraries.
> > > > > > > <snip>
> > > > > > > 
> > > > > > > Al
> > > > > > > 
> > > > > > > On Wed, 2009-08-19 at 14:16 +0200, Werner Fischer wrote:
> > > > > > > > Dear freeipmi users/developers,
> > > > > > > > 
> > > > > > > > I'm trying to monitor an Intel SR2500 server (this server has 
> > > > > > > > the Intel
> > > > > > > > S5000PAL mainboard in it).
> > > > > > > > 
> > > > > > > > While I can monitor it using ipmitool, I keep getting errors 
> > > > > > > > with
> > > > > > > > ipmimonitoring from freeipmi. Also using the "-W" parameter for
> > > > > > > > workarounds (as described in the manpage of ipmimonitoring) 
> > > > > > > > doesn't
> > > > > > > > help:
> > > > > > > > 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > address@hidden ~]# ipmitool -I lan -H 192.168.1.211 -U admin -P 
> > > > > > > > relation sdr
> > > > > > > > BB +1.2V Vtt     | 1.20 Volts        | ok
> > > > > > > > BB +1.5V AUX     | 1.47 Volts        | ok
> > > > > > > > BB +1.5V         | 1.48 Volts        | ok
> > > > > > > > BB +1.8V         | 1.79 Volts        | ok
> > > > > > > > BB +3.3V         | 3.35 Volts        | ok
> > > > > > > > BB +3.3V STB     | 3.35 Volts        | ok
> > > > > > > > ^C
> > > > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -u admin -p 
> > > > > > > > relation
> > > > > > > > ipmi_monitoring_sensor_readings_by_record_id: authentication 
> > > > > > > > type unavailable for attempted privilege level
> > > > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="intel20" 
> > > > > > > > -u admin -p relation
> > > > > > > > ipmi_monitoring_sensor_readings_by_record_id: authentication 
> > > > > > > > type unavailable for attempted privilege level
> > > > > > > > address@hidden ~]# rpm -q freeipmi
> > > > > > > > freeipmi-0.5.1-3.fc9.i386
> > > > > > > > address@hidden ~]# 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > 
> > > > > > > > I checked the manpage:
> > > > > > > >        "authentication type unavailable for attempted privilege 
> > > > > > > > level" - The authentication type you wish
> > > > > > > >        to authenticate with is not available for this privilege 
> > > > > > > > level. Please try again with an alternate
> > > > > > > >        authentication  type or alternate privilege level. It 
> > > > > > > > may also be possible the available authenti-
> > > > > > > >        cation types you can authenticate with are not correctly 
> > > > > > > > configured on the remote BMC.
> > > > > > > > But the settings at the BMC side seem to be ok:
> > > > > > > > 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > address@hidden ~]# ipmitool -I lan -H 192.168.1.211 -U admin -P 
> > > > > > > > relation lan print 1
> > > > > > > > Set in Progress         : Set Complete
> > > > > > > > Auth Type Support       : NONE MD5 PASSWORD 
> > > > > > > > Auth Type Enable        : Callback : 
> > > > > > > >                         : User     : 
> > > > > > > >                         : Operator : 
> > > > > > > >                         : Admin    : MD5 PASSWORD 
> > > > > > > >                         : OEM      : 
> > > > > > > > IP Address Source       : Static Address
> > > > > > > > IP Address              : 192.168.1.211
> > > > > > > > Subnet Mask             : 255.255.255.0
> > > > > > > > MAC Address             : 00:0e:0c:ea:92:a2
> > > > > > > > [...]
> > > > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -a MD5 -u 
> > > > > > > > admin -p relation
> > > > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > > > privilege level
> > > > > > > > address@hidden ~]# 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > 
> > > > > > > > Also compiling the newest version and using it does not help:
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -u admin -p 
> > > > > > > > relation
> > > > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > > > privilege level
> > > > > > > > address@hidden ~]# ipmimonitoring -h 192.168.1.211 -W="intel20" 
> > > > > > > > -u admin -p relation
> > > > > > > > ipmimonitoring: authentication type unavailable for attempted 
> > > > > > > > privilege level
> > > > > > > > address@hidden ~]# rpm -q freeipmi
> > > > > > > > freeipmi-0.7.11-1.fc9.i386
> > > > > > > > address@hidden ~]# 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > 
> > > > > > > > In contrast, monitoring a system with a new Supermicro X8DT3-F 
> > > > > > > > mainboard
> > > > > > > > works fine with freeipmi-0.5.1-3.fc9.i386 and also with
> > > > > > > > freeipmi-0.7.11-1.fc9.i386:
> > > > > > > > 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > address@hidden ~]# ipmitool -I lan -H 10.10.10.233 -U ADMIN -P 
> > > > > > > > ADMIN sdr
> > > > > > > > CPU1 Temp        | 0 unspecified     | ok
> > > > > > > > CPU2 Temp        | no reading        | ns
> > > > > > > > System Temp      | 45 degrees C      | ok
> > > > > > > > CPU1 Vcore       | 0.98 Volts        | ok
> > > > > > > > CPU2 Vcore       | no reading        | ns
> > > > > > > > CPU1 DIMM        | 1.51 Volts        | ok
> > > > > > > > CPU2 DIMM        | no reading        | ns
> > > > > > > > ^C
> > > > > > > > address@hidden ~]# ipmimonitoring -h 10.10.10.233 -u ADMIN -p 
> > > > > > > > ADMIN
> > > > > > > > Record_ID | Sensor Name | Sensor Group | Monitoring Status| 
> > > > > > > > Sensor Units | Sensor Reading
> > > > > > > > 4 | System Temp | Temperature | Nominal | C | 45.000000 
> > > > > > > > 5 | CPU1 Vcore | Voltage | Nominal | V | 0.976000 
> > > > > > > > 6 | CPU2 Vcore | Voltage | Nominal | V | 0.000000 
> > > > > > > > 7 | CPU1 DIMM | Voltage | Nominal | V | 1.512000 
> > > > > > > > 8 | CPU2 DIMM | Voltage | Nominal | V | 0.000000 
> > > > > > > > 9 | +1.5V | Voltage | Nominal | V | 1.504000 
> > > > > > > > 10 | +3.3V | Voltage | Nominal | V | 3.240000 
> > > > > > > > 11 | +3.3VSB | Voltage | Nominal | V | 3.240000 
> > > > > > > > 12 | +5V | Voltage | Nominal | V | 5.120000 
> > > > > > > > 13 | +12V | Voltage | Nominal | V | 12.190000 
> > > > > > > > 14 | VBAT | Voltage | Nominal | V | 3.240000 
> > > > > > > > 15 | Fan1 | Fan | Nominal | RPM | 6528.000000 
> > > > > > > > 16 | Fan2 | Fan | Nominal | RPM | 7072.000000 
> > > > > > > > 17 | Fan3 | Fan | Nominal | RPM | 0.000000 
> > > > > > > > 18 | Fan4 | Fan | Nominal | RPM | 0.000000 
> > > > > > > > 19 | Fan5 | Fan | Nominal | RPM | 5644.000000 
> > > > > > > > 20 | Fan6 | Fan | Nominal | RPM | 5304.000000 
> > > > > > > > 21 | Fan7 | Fan | Nominal | RPM | 7072.000000 
> > > > > > > > 22 | Fan8 | Fan | Nominal | RPM | 0.000000 
> > > > > > > > 23 | Intrusion | Physical Security | Nominal | N/A | '' 
> > > > > > > > 24 | PS Failure | Power Supply | Nominal | N/A | '' 
> > > > > > > > address@hidden ~]# 
> > > > > > > > --------------------------------------------------------------------------
> > > > > > > > 
> > > > > > > > Does anybody have an idea how this problem could be fixed?
> > > > > > > > 
> > > > > > > > best regards,
> > > > > > > > Werner
> > > > > > > > 
> > > > > > > > 
> > > > > > > > 
> > > > > > > > _______________________________________________
> > > > > > > > Freeipmi-users mailing list
> > > > > > > > address@hidden
> > > > > > > > http://****lists.gnu.org/mailman/listinfo/freeipmi-users
> > > > > > > > 
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > _______________________________________________
> > > > > > Freeipmi-users mailing list
> > > > > > address@hidden
> > > > > > http://***lists.gnu.org/mailman/listinfo/freeipmi-users
> > > > > > 
> > > 
> > > 
> > > 
> > > _______________________________________________
> > > Freeipmi-users mailing list
> > > address@hidden
> > > http://**lists.gnu.org/mailman/listinfo/freeipmi-users
> > > 
> 
> 
> 
> _______________________________________________
> Freeipmi-users mailing list
> address@hidden
> http://*lists.gnu.org/mailman/listinfo/freeipmi-users
> 
-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]