Hi Alex,
ipmi_ctx_open_outofband: bad completion code: request data/parameter
invalid
Ugh, this really stinks. It means that the motherboard is confused and
unwilling to accept some data. The error code doesn't even provide us a
useful hint.
First off, I think a bug report should be filed to Dell.
Second, it'd be good to play around with some of the options. Like try
alternate privilege levels (i.e. -l admin vs -l operator),
authentication mechanisms (i.e. -a md5 vs -a md2), and such. It might
also be good to try the IPMI 2.0 protocol (-D lan_2_0) too.
Hopefully there will be a workaround of some sort that will work.
Al
Hello,
i'm new to freeipmi-tools and started to integrate this within our
Icinga monitoring system for about 200 manageable hosts.
All works fine for all that Supermicro stuff.
But i cannot get out of trouble with that Dell C6100 multinode
systems, getting the following error all the time:
ipmi_ctx_open_outofband: bad completion code: request
data/parameter invalid
Request ist the same as it works for supermicro servers except that
there is another username.
monitoring:/~# /usr/sbin/ipmimonitoring -h<ip-address> -u root -P
This results in the error message mentioned above.
That is what ipmiping tells me:
monitoring:/~# ipmiping -v -c 1 -I eth1<ip-address>
response received from<ip-address>: rq_seq=63, auth: none=set
md2=set md5=set password=set oem=clear anon=clear null=clear
non-null=set user=clear permsg=clear
Here is also the output of the debug request of ipmimonitoring
monitoring:/~# /usr/sbin/ipmimonitoring -h<ip-address> -u root -P
--debug
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
Request
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 0h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 0h] = session_id[32b]
<ip-address>: [ 9h] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 6h] = net_fn[ 6b]
<ip-address>: [ C8h] = checksum1[ 8b]
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 30h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 38h] = cmd[ 8b]
<ip-address>: [ Eh] = channel_number[ 4b]
<ip-address>: [ 0h] = reserved1[ 4b]
<ip-address>: [ 3h] = maximum_privilege_level[ 4b]
<ip-address>: [ 0h] = reserved2[ 4b]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ 76h] = checksum2[ 8b]
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
Response
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 0h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 0h] = session_id[32b]
<ip-address>: [ 10h] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 7h] = net_fn[ 6b]
<ip-address>: [ 63h] = checksum1[ 8b]
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 30h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 38h] = cmd[ 8b]
<ip-address>: [ 0h] = comp_code[ 8b]
<ip-address>: [ 1h] = channel_number[ 8b]
<ip-address>: [ 1h] = authentication_type.none[ 1b]
<ip-address>: [ 1h] = authentication_type.md2[ 1b]
<ip-address>: [ 1h] = authentication_type.md5[ 1b]
<ip-address>: [ 0h] =
authentication_type.reserved1[ 1b]
<ip-address>: [ 1h] =
authentication_type.straight_password_key[ 1b]
<ip-address>: [ 0h] =
authentication_type.oem_prop[ 1b]
<ip-address>: [ 0h] =
authentication_type.reserved2[ 2b]
<ip-address>: [ 0h] =
authentication_status.anonymous_login[ 1b]
<ip-address>: [ 0h] =
authentication_status.null_username[ 1b]
<ip-address>: [ 1h] =
authentication_status.non_null_username[ 1b]
<ip-address>: [ 0h] =
authentication_status.user_level_authentication[ 1b]
<ip-address>: [ 0h] =
authentication_status.per_message_authentication[ 1b]
<ip-address>: [ 0h] =
authentication_status.reserved[ 3b]
<ip-address>: [ 0h] = reserved1[ 8b]
<ip-address>: [ 0h] = oem_id[24b]
<ip-address>: [ 0h] = oem_auxiliary_data[ 8b]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ CCh] = checksum2[ 8b]
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Get Session Challenge Request
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 0h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 0h] = session_id[32b]
<ip-address>: [ 18h] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 6h] = net_fn[ 6b]
<ip-address>: [ C8h] = checksum1[ 8b]
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 31h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 39h] = cmd[ 8b]
<ip-address>: [ 2h] = authentication_type[ 4b]
<ip-address>: [ 0h] = reserved[ 4b]
<ip-address>: [ BYTE ARRAY ... ] = user_name[16B]
<ip-address>: [ 72h 6Fh 6Fh 74h 00h 00h 00h 00h ]
<ip-address>: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ BCh] = checksum2[ 8b]
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Get Session Challenge Response
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 0h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 0h] = session_id[32b]
<ip-address>: [ 1Ch] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 7h] = net_fn[ 6b]
<ip-address>: [ 63h] = checksum1[ 8b]
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 31h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 39h] = cmd[ 8b]
<ip-address>: [ 0h] = comp_code[ 8b]
<ip-address>: [ 4DF527F8h] = temp_session_id[32b]
<ip-address>: [ BYTE ARRAY ... ] = challenge_string[16B]
<ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
<ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ 19h] = checksum2[ 8b]
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Activiate Session Request
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 2h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 4DF527F8h] = session_id[32b]
<ip-address>: [ BYTE ARRAY ... ] = authentication_code[16B]
<ip-address>: [ 1Eh FCh 53h 98h 70h 2Eh 25h 99h ]
<ip-address>: [ 6Eh EBh 3Eh FFh ADh 95h E6h 66h ]
<ip-address>: [ 1Dh] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 6h] = net_fn[ 6b]
<ip-address>: [ C8h] = checksum1[ 8b]
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 32h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 3Ah] = cmd[ 8b]
<ip-address>: [ 2h] = authentication_type[ 4b]
<ip-address>: [ 0h] = reserved1[ 4b]
<ip-address>: [ 3h] = maximum_privilege_level[ 4b]
<ip-address>: [ 0h] = reserved2[ 4b]
<ip-address>: [ BYTE ARRAY ... ] = challenge_string[16B]
<ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
<ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
<ip-address>: [ 6A5AC49h] =
initial_outbound_sequence_number[32b]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ 6Fh] = checksum2[ 8b]
<ip-address>:
=====================================================
<ip-address>: IPMI 1.5 Activiate Session Response
<ip-address>:
=====================================================
<ip-address>: RMCP Header:
<ip-address>: ------------
<ip-address>: [ 6h] = version[ 8b]
<ip-address>: [ 0h] = reserved[ 8b]
<ip-address>: [ FFh] = sequence_number[ 8b]
<ip-address>: [ 7h] = message_class.class[ 5b]
<ip-address>: [ 0h] = message_class.reserved[ 2b]
<ip-address>: [ 0h] = message_class.ack[ 1b]
<ip-address>: IPMI Session Header:
<ip-address>: --------------------
<ip-address>: [ 2h] = authentication_type[ 8b]
<ip-address>: [ 0h] = session_sequence_number[32b]
<ip-address>: [ 4DF527F8h] = session_id[32b]
<ip-address>: [ BYTE ARRAY ... ] = authentication_code[16B]
<ip-address>: [ 51h C6h 11h 08h 55h 50h B1h 12h ]
<ip-address>: [ C2h 42h 9Eh 06h 9Dh 9Ch ADh 61h ]
<ip-address>: [ 8h] = ipmi_msg_len[ 8b]
<ip-address>: IPMI Message Header:
<ip-address>: --------------------
<ip-address>: [ 81h] = rq_addr[ 8b]
<ip-address>: [ 0h] = rq_lun[ 2b]
<ip-address>: [ 7h] = net_fn[ 6b]
<ip-address>: [ 63h] = checksum1[ 8b]
<ip-address>: [ 20h] = rs_addr[ 8b]
<ip-address>: [ 0h] = rs_lun[ 2b]
<ip-address>: [ 32h] = rq_seq[ 6b]
<ip-address>: IPMI Command Data:
<ip-address>: ------------------
<ip-address>: [ 3Ah] = cmd[ 8b]
<ip-address>: [ CCh] = comp_code[ 8b]
<ip-address>: IPMI Trailer:
<ip-address>: --------------
<ip-address>: [ 12h] = checksum2[ 8b]
ipmi_ctx_open_outofband: bad completion code: request
data/parameter invalid
I tried different workaround settings or authorization methods but
can't get any working config. Web-access of these IPMI interfaces
works as expected.
Thanks for any advice on this problem.
Alex -- Alexander Warschun
Systemadministration