freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] DELL C6100 Megarac - ipmi_ctx_open_outofband


From: Alexander Warschun
Subject: Re: [Freeipmi-users] DELL C6100 Megarac - ipmi_ctx_open_outofband
Date: Tue, 20 Dec 2011 11:55:55 +0100
User-agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.17) Gecko/20110424 Lightning/1.0b2 Thunderbird/3.1.10

Hi Al,
your last hint did the trick. The option "-D lan_2_0" works for me.

I've tried all the security options before but didn't recognize to try to force the IPMI version 2.0
Thx a lot.

Alex

--

Alexander Warschun
Systemadministration

*Idealo Internet GmbH*  | www.idealo.de <http://www.idealo.de>

schrieb Albert Chu:
Hi Alex,

ipmi_ctx_open_outofband: bad completion code: request data/parameter
invalid

Ugh, this really stinks.  It means that the motherboard is confused and
unwilling to accept some data.  The error code doesn't even provide us a
useful hint.

First off, I think a bug report should be filed to Dell.

Second, it'd be good to play around with some of the options.  Like try
alternate privilege levels (i.e. -l admin vs -l operator),
authentication mechanisms (i.e. -a md5 vs -a md2), and such.  It might
also be good to try the IPMI 2.0 protocol (-D lan_2_0) too.

Hopefully there will be a workaround of some sort that will work.

Al

Hello,
i'm new to freeipmi-tools and started to integrate this within our
Icinga monitoring system for about 200 manageable hosts.
All works fine for all that Supermicro stuff.

But i cannot get out of trouble with that Dell C6100 multinode
systems, getting the following error all the time:
     ipmi_ctx_open_outofband: bad completion code: request
data/parameter invalid

Request ist the same as it works for supermicro servers except that
there is another username.
     monitoring:/~# /usr/sbin/ipmimonitoring -h<ip-address>  -u root -P
This results in the error message mentioned above.

That is what ipmiping tells me:
     monitoring:/~# ipmiping -v -c 1 -I eth1<ip-address>
     response received from<ip-address>: rq_seq=63, auth: none=set
md2=set md5=set password=set oem=clear anon=clear null=clear
non-null=set user=clear permsg=clear

Here is also the output of the debug request of ipmimonitoring
     monitoring:/~# /usr/sbin/ipmimonitoring -h<ip-address>  -u root -P
--debug
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
Request
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               0h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [               0h] = session_id[32b]
     <ip-address>: [               9h] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [               6h] = net_fn[ 6b]
     <ip-address>: [              C8h] = checksum1[ 8b]
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [              30h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              38h] = cmd[ 8b]
     <ip-address>: [               Eh] = channel_number[ 4b]
     <ip-address>: [               0h] = reserved1[ 4b]
     <ip-address>: [               3h] = maximum_privilege_level[ 4b]
     <ip-address>: [               0h] = reserved2[ 4b]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              76h] = checksum2[ 8b]
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
Response
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               0h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [               0h] = session_id[32b]
     <ip-address>: [              10h] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [               7h] = net_fn[ 6b]
     <ip-address>: [              63h] = checksum1[ 8b]
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [              30h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              38h] = cmd[ 8b]
     <ip-address>: [               0h] = comp_code[ 8b]
     <ip-address>: [               1h] = channel_number[ 8b]
     <ip-address>: [               1h] = authentication_type.none[ 1b]
     <ip-address>: [               1h] = authentication_type.md2[ 1b]
     <ip-address>: [               1h] = authentication_type.md5[ 1b]
     <ip-address>: [               0h] =
authentication_type.reserved1[ 1b]
     <ip-address>: [               1h] =
authentication_type.straight_password_key[ 1b]
     <ip-address>: [               0h] =
authentication_type.oem_prop[ 1b]
     <ip-address>: [               0h] =
authentication_type.reserved2[ 2b]
     <ip-address>: [               0h] =
authentication_status.anonymous_login[ 1b]
     <ip-address>: [               0h] =
authentication_status.null_username[ 1b]
     <ip-address>: [               1h] =
authentication_status.non_null_username[ 1b]
     <ip-address>: [               0h] =
authentication_status.user_level_authentication[ 1b]
     <ip-address>: [               0h] =
authentication_status.per_message_authentication[ 1b]
     <ip-address>: [               0h] =
authentication_status.reserved[ 3b]
     <ip-address>: [               0h] = reserved1[ 8b]
     <ip-address>: [               0h] = oem_id[24b]
     <ip-address>: [               0h] = oem_auxiliary_data[ 8b]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              CCh] = checksum2[ 8b]
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Get Session Challenge Request
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               0h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [               0h] = session_id[32b]
     <ip-address>: [              18h] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [               6h] = net_fn[ 6b]
     <ip-address>: [              C8h] = checksum1[ 8b]
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [              31h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              39h] = cmd[ 8b]
     <ip-address>: [               2h] = authentication_type[ 4b]
     <ip-address>: [               0h] = reserved[ 4b]
     <ip-address>: [  BYTE ARRAY ... ] = user_name[16B]
     <ip-address>: [ 72h 6Fh 6Fh 74h 00h 00h 00h 00h ]
     <ip-address>: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              BCh] = checksum2[ 8b]
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Get Session Challenge Response
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               0h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [               0h] = session_id[32b]
     <ip-address>: [              1Ch] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [               7h] = net_fn[ 6b]
     <ip-address>: [              63h] = checksum1[ 8b]
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [              31h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              39h] = cmd[ 8b]
     <ip-address>: [               0h] = comp_code[ 8b]
     <ip-address>: [        4DF527F8h] = temp_session_id[32b]
     <ip-address>: [  BYTE ARRAY ... ] = challenge_string[16B]
     <ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
     <ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              19h] = checksum2[ 8b]
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Activiate Session Request
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               2h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [        4DF527F8h] = session_id[32b]
     <ip-address>: [  BYTE ARRAY ... ] = authentication_code[16B]
     <ip-address>: [ 1Eh FCh 53h 98h 70h 2Eh 25h 99h ]
     <ip-address>: [ 6Eh EBh 3Eh FFh ADh 95h E6h 66h ]
     <ip-address>: [              1Dh] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [               6h] = net_fn[ 6b]
     <ip-address>: [              C8h] = checksum1[ 8b]
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [              32h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              3Ah] = cmd[ 8b]
     <ip-address>: [               2h] = authentication_type[ 4b]
     <ip-address>: [               0h] = reserved1[ 4b]
     <ip-address>: [               3h] = maximum_privilege_level[ 4b]
     <ip-address>: [               0h] = reserved2[ 4b]
     <ip-address>: [  BYTE ARRAY ... ] = challenge_string[16B]
     <ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
     <ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
     <ip-address>: [         6A5AC49h] =
initial_outbound_sequence_number[32b]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              6Fh] = checksum2[ 8b]
     <ip-address>:
=====================================================
     <ip-address>: IPMI 1.5 Activiate Session Response
     <ip-address>:
=====================================================
     <ip-address>: RMCP Header:
     <ip-address>: ------------
     <ip-address>: [               6h] = version[ 8b]
     <ip-address>: [               0h] = reserved[ 8b]
     <ip-address>: [              FFh] = sequence_number[ 8b]
     <ip-address>: [               7h] = message_class.class[ 5b]
     <ip-address>: [               0h] = message_class.reserved[ 2b]
     <ip-address>: [               0h] = message_class.ack[ 1b]
     <ip-address>: IPMI Session Header:
     <ip-address>: --------------------
     <ip-address>: [               2h] = authentication_type[ 8b]
     <ip-address>: [               0h] = session_sequence_number[32b]
     <ip-address>: [        4DF527F8h] = session_id[32b]
     <ip-address>: [  BYTE ARRAY ... ] = authentication_code[16B]
     <ip-address>: [ 51h C6h 11h 08h 55h 50h B1h 12h ]
     <ip-address>: [ C2h 42h 9Eh 06h 9Dh 9Ch ADh 61h ]
     <ip-address>: [               8h] = ipmi_msg_len[ 8b]
     <ip-address>: IPMI Message Header:
     <ip-address>: --------------------
     <ip-address>: [              81h] = rq_addr[ 8b]
     <ip-address>: [               0h] = rq_lun[ 2b]
     <ip-address>: [               7h] = net_fn[ 6b]
     <ip-address>: [              63h] = checksum1[ 8b]
     <ip-address>: [              20h] = rs_addr[ 8b]
     <ip-address>: [               0h] = rs_lun[ 2b]
     <ip-address>: [              32h] = rq_seq[ 6b]
     <ip-address>: IPMI Command Data:
     <ip-address>: ------------------
     <ip-address>: [              3Ah] = cmd[ 8b]
     <ip-address>: [              CCh] = comp_code[ 8b]
     <ip-address>: IPMI Trailer:
     <ip-address>: --------------
     <ip-address>: [              12h] = checksum2[ 8b]
     ipmi_ctx_open_outofband: bad completion code: request
data/parameter invalid

I tried different workaround settings or authorization methods but
can't get any working config. Web-access of these IPMI interfaces
works as expected.
Thanks for any advice on this problem.

Alex -- Alexander Warschun
Systemadministration


reply via email to

[Prev in Thread] Current Thread [Next in Thread]