freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] Problem accessing Supermicro X9DRT-HF+


From: Alastair Young
Subject: Re: [Freeipmi-users] Problem accessing Supermicro X9DRT-HF+
Date: Fri, 7 Sep 2012 18:21:38 -0700

We tried resets and power cycles already. And it doesn't work with admin
either.

However "-D lan20" works!

And that works on my old boxes too, so we'll just add that to our params.

many thanks!



Alastair N. Young | Senior Ground Control

Rocket Fuel Inc.
**
address@hidden
650.517.8834 p
925.784.0812 m
www.rocketfuel.com






On Fri, Sep 7, 2012 at 5:19 PM, Albert Chu <address@hidden> wrote:

> Hi Alistair,
>
> Everything seems to be configured correctly.  There certainly could be a
> bug/issue on the motherboard.  I have two guesses on the issue and ways
> to see if we can get things to work:
>
> 1) I've seen some motherboards that did not seem to "take" new
> configuration until the BMC was reset by a hard power cycle (i.e. button
> push) or a cold reset (/usr/sbin/bmc-device --cold-reset).  It's worth a
> try.
>
> 2) The BMC incorrectly expects a perfect combination of inputs to
> function.  Does user ADMIN work?  What happens if you change the
> privilege level (-l admin or -l operator) or authentication type (-a md2
> or -a straight_password_key) or using IPMI 2.0 (-D lan20).
>
> Unfortunately I've seen a number of motherboards where #2 happens to the
> case.  Despite a perfectly legal & correct combination of options given
> the configuration, the BMC just gets confused and won't allow a
> connection.
>
> Al
>
> On Fri, 2012-09-07 at 16:51 -0700, Alastair Young wrote:
> > I had forgotten bmc-config can run locally - I never do that normally.
> >
> > Here is the checkout
> >
> > address@hidden ~]$ sudo bmc-config -o
> > #
> > # Section UserX Comments
> > #
> > # In the following User sections, users should configure usernames,
> > passwords,
> > # and access rights for IPMI over LAN communication. Usernames can be
> > set to any
> > # string with the exception of User1, which is a fixed to the
> > "anonymous"
> > # username in IPMI.
> > #
> > # For IPMI over LAN access for a username, set "Enable_User" to "Yes",
> > # "Lan_Enable_IPMI_Msgs" to "Yes", and "Lan_Privilege_Limit" to a
> > privilege
> > # level. The privilege level is used to limit various IPMI operations
> > for
> > # individual usernames. It is recommened that atleast one username be
> > created
> > # with a privilege limit "Administrator", so all system functions are
> > available
> > # to atleast one username via IPMI over LAN. For security reasons, we
> > recommend
> > # not enabling the "anonymous" User1. For most users,
> > "Lan_Session_Limit" can be
> > # set to 0 (or ignored) to support an unlimited number of simultaneous
> > IPMI over
> > # LAN sessions.
> > #
> > # If your system supports IPMI 2.0 and Serial-over-LAN (SOL), a
> > "Password20" and
> > # "SOL_Payload_Access" field may be listed below. "Password20" may be
> > used to
> > # set up to a 20 byte password for the username rather than a maximum
> > 16 byte
> > # password. Its use is optional. Set the "SOL_Payload_Access" field to
> > "Yes" or
> > # "No" to enable or disable this username's ability to access SOL.
> > #
> > # Please do not forget to uncomment those fields, such as "Password",
> > that may
> > # be commented out during the checkout.
> > #
> > # Some motherboards may require a "Username" to be configured prior to
> > other
> > # fields being read/written. If this is the case, those fields will be
> > set to
> > # <username-not-set-yet>.
> > #
> > Section User1
> >         ## Give Username
> >         ## Username                                   NULL
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            Yes
> > EndSection
> > Section User2
> >         ## Give Username
> >         Username                                      ADMIN
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             Yes
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit                           Administrator
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            Yes
> > EndSection
> > Section User3
> >         ## Give Username
> >         Username                                      nagios
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          Yes
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit                           User
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User4
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            Yes
> > EndSection
> > Section User5
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User6
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User7
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User8
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User9
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > Section User10
> >         ## Give Username
> >         Username
> >         ## Give password or blank to clear. MAX 16 chars.
> >         ## Password
> >         ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
> >         ## Password20
> >         ## Possible values: Yes/No or blank to not set
> >         Enable_User                                   No
> >         ## Possible values: Yes/No
> >         Lan_Enable_IPMI_Msgs                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Link_Auth                          No
> >         ## Possible values: Yes/No
> >         Lan_Enable_Restricted_to_Callback             No
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
> >         Lan_Privilege_Limit
> >         ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if
> > not specified
> >         ## Lan_Session_Limit
> >         ## Possible values: Yes/No
> >         SOL_Payload_Access                            No
> > EndSection
> > #
> > # Section Lan_Channel Comments
> > #
> > # In the Lan_Channel section, general IPMI over LAN can be enabled for
> > disabled.
> > # In the below, "Volatile" configurations are immediately configured
> > onto the
> > # BMC and will have immediate effect on the system. "Non_Volatile"
> > # configurations are only available after the next system reset.
> > Generally, both
> > # the "Volatile" and "Non_Volatile" equivalent fields should be
> > configured
> > # identically.
> > #
> > # To enable IPMI over LAN, typically "Access_Mode" should be set to
> > # "Always_Available". "Channel_Privilege_Limit" should be set to the
> > highest
> > # privilege level any username was configured with. Typically, this is
> > set to
> > # "Administrator".
> > #
> > # "User_Level_Auth" and "Per_Message_Auth" are typically set to "Yes"
> > for
> > # additional security.
> > #
> > Section Lan_Channel
> >         ## Possible values:
> > Disabled/Pre_Boot_Only/Always_Available/Shared
> >         Volatile_Access_Mode                          Always_Available
> >         ## Possible values: Yes/No
> >         Volatile_Enable_User_Level_Auth               Yes
> >         ## Possible values: Yes/No
> >         Volatile_Enable_Per_Message_Auth              Yes
> >         ## Possible values: Yes/No
> >         Volatile_Enable_Pef_Alerting                  Yes
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary
> >         Volatile_Channel_Privilege_Limit              Administrator
> >         ## Possible values:
> > Disabled/Pre_Boot_Only/Always_Available/Shared
> >         Non_Volatile_Access_Mode                      Always_Available
> >         ## Possible values: Yes/No
> >         Non_Volatile_Enable_User_Level_Auth           Yes
> >         ## Possible values: Yes/No
> >         Non_Volatile_Enable_Per_Message_Auth          Yes
> >         ## Possible values: Yes/No
> >         Non_Volatile_Enable_Pef_Alerting              Yes
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary
> >         Non_Volatile_Channel_Privilege_Limit          Administrator
> > EndSection
> > #
> > # Section Lan_Conf Comments
> > #
> > # In the Lan_Conf section, typical networking configuration is setup.
> > Most users
> > # will choose to set "Static" for the "IP_Address_Source" and set the
> > # appropriate "IP_Address", "MAC_Address", "Subnet_Mask", etc. for the
> > machine.
> > #
> > Section Lan_Conf
> >         ## Possible values:
> > Unspecified/Static/Use_DHCP/Use_BIOS/Use_Others
> >         IP_Address_Source                             Static
> >         ## Give valid IP address
> >         IP_Address                                    172.22.6.249
> >         ## Give valid MAC address
> >         MAC_Address
> > 00:25:90:7D:8E:36
> >         ## Give valid Subnet Mask
> >         Subnet_Mask                                   255.255.255.0
> >         ## Give valid IP address
> >         Default_Gateway_IP_Address                    172.22.6.254
> >         ## Give valid MAC address
> >         Default_Gateway_MAC_Address
> > 00:25:90:1E:45:F4
> >         ## Give valid IP address
> >         Backup_Gateway_IP_Address                     0.0.0.0
> >         ## Give valid MAC address
> >         Backup_Gateway_MAC_Address
> > 00:00:00:00:00:00
> >         ## Give valid unsigned number
> >         Vlan_id                                       0
> >         ## Possible values: Yes/No
> >         Vlan_Id_Enable                                No
> >         ## Give valid unsigned number
> >         Vlan_Priority                                 0
> > EndSection
> > #
> > # Section Lan_Conf_Auth Comments
> > #
> > # In the Lan_Conf_Auth section, allowable authentication mechanisms
> > for IPMI 1.5
> > # is configured. Most users will want to set all "MD5" authentication
> > to "Yes"
> > # and the rest to "No". If you have configured a NULL username and a
> > NULL
> > # password, you will also want to configure some of the "None" fields
> > to "Yes"
> > # to allow "None" authentication to work. Some motherboards do not
> > allow you to
> > # enable OEM authentication, so you may wish to set all OEM related
> > fields to
> > # "No".
> > #
> > Section Lan_Conf_Auth
> >         ## Possible values: Yes/No
> >         Callback_Enable_Auth_Type_None                No
> >         ## Possible values: Yes/No
> >         Callback_Enable_Auth_Type_MD2                 Yes
> >         ## Possible values: Yes/No
> >         Callback_Enable_Auth_Type_MD5                 Yes
> >         ## Possible values: Yes/No
> >         Callback_Enable_Auth_Type_Straight_Password   Yes
> >         ## Possible values: Yes/No
> >         User_Enable_Auth_Type_None                    No
> >         ## Possible values: Yes/No
> >         User_Enable_Auth_Type_MD2                     Yes
> >         ## Possible values: Yes/No
> >         User_Enable_Auth_Type_MD5                     Yes
> >         ## Possible values: Yes/No
> >         User_Enable_Auth_Type_Straight_Password       Yes
> >         ## Possible values: Yes/No
> >         Operator_Enable_Auth_Type_None                No
> >         ## Possible values: Yes/No
> >         Operator_Enable_Auth_Type_MD2                 Yes
> >         ## Possible values: Yes/No
> >         Operator_Enable_Auth_Type_MD5                 Yes
> >         ## Possible values: Yes/No
> >         Operator_Enable_Auth_Type_Straight_Password   Yes
> >         ## Possible values: Yes/No
> >         Admin_Enable_Auth_Type_None                   No
> >         ## Possible values: Yes/No
> >         Admin_Enable_Auth_Type_MD2                    Yes
> >         ## Possible values: Yes/No
> >         Admin_Enable_Auth_Type_MD5                    Yes
> >         ## Possible values: Yes/No
> >         Admin_Enable_Auth_Type_Straight_Password      Yes
> >         ## Possible values: Yes/No
> >         OEM_Enable_Auth_Type_None                     No
> >         ## Possible values: Yes/No
> >         OEM_Enable_Auth_Type_MD2                      Yes
> >         ## Possible values: Yes/No
> >         OEM_Enable_Auth_Type_MD5                      Yes
> >         ## Possible values: Yes/No
> >         OEM_Enable_Auth_Type_Straight_Password        Yes
> > EndSection
> > #
> > # Section Lan_Conf_Security_Keys Comments
> > #
> > # If your system supports IPMI 2.0 and Serial-over-LAN (SOL), a K_g
> > BMC key may
> > # be configurable. The K_g key is an optional key that can be set for
> > two key
> > # authentication in IPMI 2.0. It is optionally configured. Most users
> > will want
> > # to set this to zero (or blank).
> > #
> > Section Lan_Conf_Security_Keys
> >         ## Give string or blank to clear. Max 20 chars
> >         K_R
> >         ## Give string or blank to clear. Max 20 bytes, prefix with 0x
> > to enter hex
> >         K_G
> > 0x0000000000000000000000000000000000000000
> > EndSection
> > #
> > # Section Lan_Conf_Misc Comments
> > #
> > # The following miscellaneous configuration options are optionally
> > implemented
> > # by the vendor. They may not be available your system and may not be
> > visible
> > # below.
> > #
> > # If set to "Yes", "Enable_Gratuitous_ARPs" will inform the BMC to
> > regularly
> > # send out Gratuitous ARPs to allow other machines on a network
> > resolve the
> > # BMC's MAC Address. Many users will want to set this to "Yes" because
> > it offers
> > # the easiest way to support BMC IP Address resolution. However, it
> > will
> > # increase traffic on your network. The "Gratuitous_ARP_Interval" can
> > be used to
> > # set the period a Gratuitous ARP is always sent.
> > #
> > # If set to "Yes", "Enable_ARP_Response" will inform the BMC torespond
> > to ARP
> > # requests from other machines.
> > #
> > Section Lan_Conf_Misc
> >         ## Possible values: Yes/No
> >         Enable_Gratuitous_ARPs                        No
> >         ## Possible values: Yes/No
> >         Enable_ARP_Response                           Yes
> > EndSection
> > #
> > # Section Rmcpplus_Conf_Privilege Comments
> > #
> > # If your system supports IPMI 2.0 and Serial-over-LAN (SOL),cipher
> > suite IDs
> > # may be configurable below. In the Rmcpplus_Conf_Privilege section,
> > maximum
> > # user privilege levels allowed for authentication under IPMI 2.0
> > (including
> > # Serial-over-LAN) are set for each supported cipher suite ID. Each
> > cipher suite
> > # ID supports different sets of authentication, integrity, and
> > encryption
> > # algorithms for IPMI 2.0. Typically, the highest privilege level any
> > username
> > # configured should set for support under a cipher suite ID. This is
> > typically
> > # "Administrator".
> > #
> > Section Rmcpplus_Conf_Privilege
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_1           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_2           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_3           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_6           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_7           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_8           Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_11          Administrator
> >         ## Possible values:
> > Unused/User/Operator/Administrator/OEM_Proprietary
> >         Maximum_Privilege_Cipher_Suite_Id_12          Administrator
> > EndSection
> > #
> > # Section SOL_Conf Comments
> > #
> > # If your system supports IPMI 2.0 and Serial-over-LAN (SOL), the
> > following
> > # configuration options will allow SOL configuration.
> > #
> > # For most users that want to enable SOL, minimally "Enable_SOL"
> > should be set
> > # to "Yes" and "SOL_Privilege_Level" should be set to the highest
> > privilege
> > # level any username configured can authenticate with (typically
> > # "Administrator"). For security purposes,
> > "Force_SOL_Payload_Authentication"
> > # and "Force_SOL_Payload_Encryption" should be set to "Yes", however
> > forced
> > # authentication and/or encryption depends on the cipher suite IDs
> > supported.
> > # The "Non_Volatile_Bit_Rate" and "Volatile_Bit_Rate" should both be
> > set to the
> > # appropriate baud rate for your system. This is typically the same
> > baud rate
> > # configured in the BIOS and/or operating system.
> > #
> > Section SOL_Conf
> >         ## Possible values: Yes/No
> >         Enable_SOL                                    Yes
> >         ## Possible values:
> > Callback/User/Operator/Administrator/OEM_Proprietary
> >         SOL_Privilege_Level                           User
> >         ## Possible values: Yes/No
> >         Force_SOL_Payload_Authentication              Yes
> >         ## Possible values: Yes/No
> >         Force_SOL_Payload_Encryption                  Yes
> >         ## Give a non-zero valid integer. Each unit is 5ms
> >         Character_Accumulate_Interval                 0
> >         ## Give a valid number
> >         Character_Send_Threshold                      0
> >         ## Give a valid integer
> >         SOL_Retry_Count                               0
> >         ## Give a valid integer. Interval unit is 10ms
> >         SOL_Retry_Interval                            0
> >         ## Possible values: Serial/9600/19200/38400/57600/115200
> >         Non_Volatile_Bit_Rate                         115200
> >         ## Possible values: Serial/9600/19200/38400/57600/115200
> >         Volatile_Bit_Rate                             115200
> >         ## Give a valid port number
> >         ## SOL_Payload_Port_Number                    623
> > EndSection
> >
> >
> >
> > Alastair N. Young | Senior Ground Control
> >
> > Rocket Fuel Inc.
> >
> > address@hidden
> > 650.517.8834 p
> > 925.784.0812 m
> > www.rocketfuel.com
> >
> >
> >
> >
> >
> >
> > On Fri, Sep 7, 2012 at 2:44 PM, Albert Chu <address@hidden> wrote:
> >         Hi Alastair,
> >
> >         It's hard to say with this amount of information.  It could
> >         simply be a
> >         BMC configuration problem, perhaps the evaluation boards are
> >         not
> >         "auto-configured" like previous boards.
> >
> >         What does your BMC configuration look like?  You can get it
> >         via
> >         bmc-config --checkout.
> >
> >         Al
> >
> >         On Fri, 2012-09-07 at 14:25 -0700, Alastair Young wrote:
> >         > Firmware Revision : 01.65
> >         >  Firmware Build Time : 2012-05-16
> >         >
> >         > Whatever we do, we get "username invalid". All our other
> >         supermicro boxes
> >         > are fine.These X9DRT-HF+ are new evaluation boxes.
> >         > I compiled up the latest freeipmi - it did not help. Also
> >         tried all the
> >         > workaround flags.
> >         >
> >         > Here is the debug output (credentials obscured). Is this
> >         new? Suggestions?
> >         >
> >         > address@hidden freeipmi-1.2.1]$ ./ipmi-sensors/ipmi-sensors
> >          -h
> >         > 172.22.6.248 -u OBSCURED -p OBSCURED -l User --debug
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: IPMI 1.5 Get Channel Authentication
> >         Capabilities Request
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: RMCP Header:
> >         > 172.22.6.248: ------------
> >         > 172.22.6.248: [               6h] = version[ 8b]
> >         > 172.22.6.248: [               0h] = reserved[ 8b]
> >         > 172.22.6.248: [              FFh] = sequence_number[ 8b]
> >         > 172.22.6.248: [               7h] = message_class.class[ 5b]
> >         > 172.22.6.248: [               0h] =
> >         message_class.reserved[ 2b]
> >         > 172.22.6.248: [               0h] = message_class.ack[ 1b]
> >         > 172.22.6.248: IPMI Session Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [               0h] = authentication_type[ 8b]
> >         > 172.22.6.248: [               0h] =
> >         session_sequence_number[32b]
> >         > 172.22.6.248: [               0h] = session_id[32b]
> >         > 172.22.6.248: [               9h] = ipmi_msg_len[ 8b]
> >         > 172.22.6.248: IPMI Message Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [              20h] = rs_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rs_lun[ 2b]
> >         > 172.22.6.248: [               6h] = net_fn[ 6b]
> >         > 172.22.6.248: [              C8h] = checksum1[ 8b]
> >         > 172.22.6.248: [              81h] = rq_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rq_lun[ 2b]
> >         > 172.22.6.248: [               Dh] = rq_seq[ 6b]
> >         > 172.22.6.248: IPMI Command Data:
> >         > 172.22.6.248: ------------------
> >         > 172.22.6.248: [              38h] = cmd[ 8b]
> >         > 172.22.6.248: [               Eh] = channel_number[ 4b]
> >         > 172.22.6.248: [               0h] = reserved1[ 3b]
> >         > 172.22.6.248: [               0h] =
> >         get_ipmi_v2.0_extended_data[ 1b]
> >         > 172.22.6.248: [               2h] =
> >         maximum_privilege_level[ 4b]
> >         > 172.22.6.248: [               0h] = reserved2[ 4b]
> >         > 172.22.6.248: IPMI Trailer:
> >         > 172.22.6.248: --------------
> >         > 172.22.6.248: [               3h] = checksum2[ 8b]
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: IPMI 1.5 Get Channel Authentication
> >         Capabilities Response
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: RMCP Header:
> >         > 172.22.6.248: ------------
> >         > 172.22.6.248: [               6h] = version[ 8b]
> >         > 172.22.6.248: [               0h] = reserved[ 8b]
> >         > 172.22.6.248: [              FFh] = sequence_number[ 8b]
> >         > 172.22.6.248: [               7h] = message_class.class[ 5b]
> >         > 172.22.6.248: [               0h] =
> >         message_class.reserved[ 2b]
> >         > 172.22.6.248: [               0h] = message_class.ack[ 1b]
> >         > 172.22.6.248: IPMI Session Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [               0h] = authentication_type[ 8b]
> >         > 172.22.6.248: [               0h] =
> >         session_sequence_number[32b]
> >         > 172.22.6.248: [               0h] = session_id[32b]
> >         > 172.22.6.248: [              10h] = ipmi_msg_len[ 8b]
> >         > 172.22.6.248: IPMI Message Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [              81h] = rq_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rq_lun[ 2b]
> >         > 172.22.6.248: [               7h] = net_fn[ 6b]
> >         > 172.22.6.248: [              63h] = checksum1[ 8b]
> >         > 172.22.6.248: [              20h] = rs_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rs_lun[ 2b]
> >         > 172.22.6.248: [               Dh] = rq_seq[ 6b]
> >         > 172.22.6.248: IPMI Command Data:
> >         > 172.22.6.248: ------------------
> >         > 172.22.6.248: [              38h] = cmd[ 8b]
> >         > 172.22.6.248: [               0h] = comp_code[ 8b]
> >         > 172.22.6.248: [               1h] = channel_number[ 8b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_type.none[ 1b]
> >         > 172.22.6.248: [               1h] =
> >         authentication_type.md2[ 1b]
> >         > 172.22.6.248: [               1h] =
> >         authentication_type.md5[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_type.reserved1[ 1b]
> >         > 172.22.6.248: [               1h] =
> >         > authentication_type.straight_password_key[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_type.oem_prop[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_type.reserved2[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         >
> >         authentication_type.ipmi_v2.0_extended_capabilities_available[
> 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_status.anonymous_login[
> >         > 1b]
> >         > 172.22.6.248: [               1h] =
> >         authentication_status.null_username[ 1b]
> >         > 172.22.6.248: [               1h] =
> >         > authentication_status.non_null_username[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         > authentication_status.user_level_authentication[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         > authentication_status.per_message_authentication[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_status.k_g[ 1b]
> >         > 172.22.6.248: [               0h] =
> >         authentication_status.reserved[ 2b]
> >         > 172.22.6.248: [               0h] =
> >         channel_supports_ipmi_v1.5_connections[
> >         > 1b]
> >         > 172.22.6.248: [               0h] =
> >         channel_supports_ipmi_v2.0_connections[
> >         > 1b]
> >         > 172.22.6.248: [               0h] = reserved[ 6b]
> >         > 172.22.6.248: [            5345h] = oem_id[24b]
> >         > 172.22.6.248: [               0h] = oem_auxiliary_data[ 8b]
> >         > 172.22.6.248: IPMI Trailer:
> >         > 172.22.6.248: --------------
> >         > 172.22.6.248: [              BFh] = checksum2[ 8b]
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: IPMI 1.5 Get Session Challenge Request
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: RMCP Header:
> >         > 172.22.6.248: ------------
> >         > 172.22.6.248: [               6h] = version[ 8b]
> >         > 172.22.6.248: [               0h] = reserved[ 8b]
> >         > 172.22.6.248: [              FFh] = sequence_number[ 8b]
> >         > 172.22.6.248: [               7h] = message_class.class[ 5b]
> >         > 172.22.6.248: [               0h] =
> >         message_class.reserved[ 2b]
> >         > 172.22.6.248: [               0h] = message_class.ack[ 1b]
> >         > 172.22.6.248: IPMI Session Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [               0h] = authentication_type[ 8b]
> >         > 172.22.6.248: [               0h] =
> >         session_sequence_number[32b]
> >         > 172.22.6.248: [               0h] = session_id[32b]
> >         > 172.22.6.248: [              18h] = ipmi_msg_len[ 8b]
> >         > 172.22.6.248: IPMI Message Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [              20h] = rs_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rs_lun[ 2b]
> >         > 172.22.6.248: [               6h] = net_fn[ 6b]
> >         > 172.22.6.248: [              C8h] = checksum1[ 8b]
> >         > 172.22.6.248: [              81h] = rq_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rq_lun[ 2b]
> >         > 172.22.6.248: [               Eh] = rq_seq[ 6b]
> >         > 172.22.6.248: IPMI Command Data:
> >         > 172.22.6.248: ------------------
> >         > 172.22.6.248: [              39h] = cmd[ 8b]
> >         > 172.22.6.248: [               2h] = authentication_type[ 4b]
> >         > 172.22.6.248: [               0h] = reserved[ 4b]
> >         > 172.22.6.248: [  BYTE ARRAY ... ] = user_name[16B]
> >         > 172.22.6.248: [ 6Eh 61h 67h 69h 6Fh 73h 00h 00h ]
> >         > 172.22.6.248: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> >         > 172.22.6.248: IPMI Trailer:
> >         > 172.22.6.248: --------------
> >         > 172.22.6.248: [              8Bh] = checksum2[ 8b]
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: IPMI 1.5 Get Session Challenge Response
> >         > 172.22.6.248:
> >         =====================================================
> >         > 172.22.6.248: RMCP Header:
> >         > 172.22.6.248: ------------
> >         > 172.22.6.248: [               6h] = version[ 8b]
> >         > 172.22.6.248: [               0h] = reserved[ 8b]
> >         > 172.22.6.248: [              FFh] = sequence_number[ 8b]
> >         > 172.22.6.248: [               7h] = message_class.class[ 5b]
> >         > 172.22.6.248: [               0h] =
> >         message_class.reserved[ 2b]
> >         > 172.22.6.248: [               0h] = message_class.ack[ 1b]
> >         > 172.22.6.248: IPMI Session Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [               0h] = authentication_type[ 8b]
> >         > 172.22.6.248: [               0h] =
> >         session_sequence_number[32b]
> >         > 172.22.6.248: [               0h] = session_id[32b]
> >         > 172.22.6.248: [               8h] = ipmi_msg_len[ 8b]
> >         > 172.22.6.248: IPMI Message Header:
> >         > 172.22.6.248: --------------------
> >         > 172.22.6.248: [              81h] = rq_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rq_lun[ 2b]
> >         > 172.22.6.248: [               7h] = net_fn[ 6b]
> >         > 172.22.6.248: [              63h] = checksum1[ 8b]
> >         > 172.22.6.248: [              20h] = rs_addr[ 8b]
> >         > 172.22.6.248: [               0h] = rs_lun[ 2b]
> >         > 172.22.6.248: [               Eh] = rq_seq[ 6b]
> >         > 172.22.6.248: IPMI Command Data:
> >         > 172.22.6.248: ------------------
> >         > 172.22.6.248: [              39h] = cmd[ 8b]
> >         > 172.22.6.248: [              81h] = comp_code[ 8b]
> >         > 172.22.6.248: IPMI Trailer:
> >         > 172.22.6.248: --------------
> >         > 172.22.6.248: [              EEh] = checksum2[ 8b]
> >         >
> /home/ayoung/freeipmi-1.2.1/ipmi-sensors/.libs/lt-ipmi-sensors: username
> >         > invalid
> >         >
> >         >
> >         >
> >         > Alastair N. Young | Senior Ground Control
> >         >
> >         > Rocket Fuel Inc.
> >
> >         > **
> >         > address@hidden
> >         > 650.517.8834 p
> >         > 925.784.0812 m
> >         > www.rocketfuel.com
> >
> >         > _______________________________________________
> >         > Freeipmi-users mailing list
> >         > address@hidden
> >         > https://lists.gnu.org/mailman/listinfo/freeipmi-users
> >         --
> >         Albert Chu
> >         address@hidden
> >         Computer Scientist
> >         High Performance Systems Division
> >         Lawrence Livermore National Laboratory
> >
> >
> >
> --
> Albert Chu
> address@hidden
> Computer Scientist
> High Performance Systems Division
> Lawrence Livermore National Laboratory
>
>
>


reply via email to

[Prev in Thread] Current Thread [Next in Thread]