[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325
From: |
Gerald Nowitzky |
Subject: |
Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325 |
Date: |
Tue, 8 Nov 2005 00:30:01 +0100 |
ok, I can try to build a different version of freeipmi. Should be no
problem. Where do I get it from?
Here is the ipmipower dump:
ipmipower -h 192.168.0.58 -u USERID -p bongo --on --debug --ipmidump
192.168.0.58: ============================================
192.168.0.58: = Get Authentication Capabilities Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 0h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 0h] = session_id[32b]
192.168.0.58: [ 9h] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 1h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 38h] = cmd[ 8b]
192.168.0.58: [ Eh] = channel_num[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 32h] = chksum2[ 8b]
192.168.0.58: ============================================
192.168.0.58: = Get Authentication Capabilities Response =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 0h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 0h] = session_id[32b]
192.168.0.58: [ 10h] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 81h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 7h] = net_fn[ 6b]
192.168.0.58: [ 63h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 1h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 38h] = cmd[ 8b]
192.168.0.58: [ 0h] = comp_code[ 8b]
192.168.0.58: [ 1h] = channel_num[ 8b]
192.168.0.58: [ 1h] = auth_type.none[ 1b]
192.168.0.58: [ 0h] = auth_type.md2[ 1b]
192.168.0.58: [ 1h] = auth_type.md5[ 1b]
192.168.0.58: [ 0h] = auth_type.reserved1[ 1b]
192.168.0.58: [ 1h] = auth_type.straight_passwd_key[ 1b]
192.168.0.58: [ 0h] = auth_type.oem_prop[ 1b]
192.168.0.58: [ 0h] = auth_type.reserved2[ 2b]
192.168.0.58: [ 1h] = auth_status.anonymous_login[ 1b]
192.168.0.58: [ 0h] = auth_status.null_username[ 1b]
192.168.0.58: [ 1h] = auth_status.non_null_username[ 1b]
192.168.0.58: [ 1h] = auth_status.user_level_auth[ 1b]
192.168.0.58: [ 1h] = auth_status.per_message_auth[ 1b]
192.168.0.58: [ 0h] = auth_status.reserved[ 3b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ 0h] = oem_id[24b]
192.168.0.58: [ 0h] = oem_aux[ 8b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 71h] = chksum2[ 8b]
192.168.0.58: ============================================
192.168.0.58: = Get Session Challenge Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 0h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 0h] = session_id[32b]
192.168.0.58: [ 18h] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 2h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 39h] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = username[16B]
192.168.0.58: [ 55h 53h 45h 52h 49h 44h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 6Eh] = chksum2[ 8b]
192.168.0.58: ============================================
192.168.0.58: = Get Session Challenge Response =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 0h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 0h] = session_id[32b]
192.168.0.58: [ 1Ch] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 81h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 7h] = net_fn[ 6b]
192.168.0.58: [ 63h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 2h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 39h] = cmd[ 8b]
192.168.0.58: [ 0h] = comp_code[ 8b]
192.168.0.58: [ 4DAF6E9Bh] = tmp_session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ A4h] = chksum2[ 8b]
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 3h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 3Bh] = chksum2[ 8b]
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 4h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 37h] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=1
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 5h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 33h] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=2
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 6h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 2Fh] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=3
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 7h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 2Bh] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=4
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 8h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 27h] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=5
192.168.0.58: ============================================
192.168.0.58: = Activate Session Request =
192.168.0.58: ============================================
192.168.0.58: RMCP Header:
192.168.0.58: ------------
192.168.0.58: [ 6h] = ver[ 8b]
192.168.0.58: [ 0h] = reserved1[ 8b]
192.168.0.58: [ FFh] = seq_num[ 8b]
192.168.0.58: [ 7h] = msg_class.class[ 5b]
192.168.0.58: [ 0h] = msg_class.reserved1[ 2b]
192.168.0.58: [ 0h] = msg_class.ack[ 1b]
192.168.0.58: IPMI Session Header:
192.168.0.58: --------------------
192.168.0.58: [ 4h] = auth_type[ 8b]
192.168.0.58: [ 0h] = session_seq_num[32b]
192.168.0.58: [ 4DAF6E9Bh] = session_id[32b]
192.168.0.58: [ BYTE ARRAY ... ] = auth_code[16B]
192.168.0.58: [ 62h 6Fh 6Eh 67h 6Fh 00h 00h 00h ]
192.168.0.58: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
192.168.0.58: [ 1Dh] = ipmi_msg_len[ 8b]
192.168.0.58: IPMI Message header:
192.168.0.58: --------------------
192.168.0.58: [ 20h] = rs_addr[ 8b]
192.168.0.58: [ 0h] = rs_lun[ 2b]
192.168.0.58: [ 6h] = net_fn[ 6b]
192.168.0.58: [ C8h] = chksum1[ 8b]
192.168.0.58: [ 81h] = rq_addr[ 8b]
192.168.0.58: [ 0h] = rq_lun[ 2b]
192.168.0.58: [ 9h] = rq_seq[ 6b]
192.168.0.58: IPMI Command Data:
192.168.0.58: ------------------
192.168.0.58: [ 3Ah] = cmd[ 8b]
192.168.0.58: [ 4h] = auth_type[ 4b]
192.168.0.58: [ 0h] = reserved1[ 4b]
192.168.0.58: [ 3h] = max_priv_level[ 4b]
192.168.0.58: [ 0h] = reserved2[ 4b]
192.168.0.58: [ BYTE ARRAY ... ] = challenge_str[16B]
192.168.0.58: [ 72h 25h 1Dh 5Fh CAh 2Bh 7Ch 3Eh ]
192.168.0.58: [ B2h 68h 91h 65h 05h 00h CDh 52h ]
192.168.0.58: [ 1h] = initial_outbound_seq_num[32b]
192.168.0.58: IPMI Trailer:
192.168.0.58: --------------
192.168.0.58: [ 23h] = chksum2[ 8b]
ipmipower: _retry_packets(192.168.0.58:3): Sending retry, retry count=6
- [Freeipmi-users] ipmipower over IP - IBM eServer 325, Gerald Nowitzky, 2005/11/07
- Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325, Albert Chu, 2005/11/07
- Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325, Albert Chu, 2005/11/07
- Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325, Albert Chu, 2005/11/07
- Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325, Gerald Nowitzky, 2005/11/07
- Re: [Freeipmi-users] ipmipower over IP - IBM eServer 325, Albert Chu, 2005/11/08