freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] freeipmi to X4150/X4450


From: Al Chu
Subject: Re: [Freeipmi-users] freeipmi to X4150/X4450
Date: Fri, 23 May 2008 07:51:17 -0400

Hey Ihara,

It seems the return values from the "get authentication capabilities
command" indicate a non-null username is invalid.  

10.173.69.39: [               0h] =
authentication_status.non_null_username[ 1b]

Thus the 'username invalid' error message is output.  Maybe this is a
bug on the eLOM?

Could you confirm by trying out the "authcap" workaround?  If it works,
can you please tell me the hardware details for that motherboard?  I can
then add it to the workaround documentation.

Thanks,
Al

On Fri, 2008-05-23 at 23:28 +0900, Shuichi Ihara wrote:
> Hi
> 
> I'm attempting to use the freeipmi to X4150/X4450 which are Sun's
> new Intel server. Those serves have eLOM (no ILOM which is used to
> AMD server). I just tried to run ipmipower below, but it didn't work.
> The ipmitool works well.
> 
> # ipmitool -H 10.173.69.39 -U root -P changeme power status
> Chassis Power is on
> # ipmipower -h 10.173.69.39 -u root -p changeme  -s
> 10.173.69.39: username invalid
> # ipmipower -h 10.173.69.39  -u root -p changeme -W "endianseq" -s
> 10.173.69.39: username invalid
> 
> An attached is dump with "--debug". It would be appreciated if someone could 
> help for this.
> 
> Thanks,
> 
> -Ihara
> plain text document attachment (ipmipower_elom.log)
> 10.173.69.39: =====================================================
> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Request
> 10.173.69.39: =====================================================
> 10.173.69.39: RMCP Header:
> 10.173.69.39: ------------
> 10.173.69.39: [               6h] = version[ 8b]
> 10.173.69.39: [               0h] = reserved[ 8b]
> 10.173.69.39: [              FFh] = sequence_number[ 8b]
> 10.173.69.39: [               7h] = message_class.class[ 5b]
> 10.173.69.39: [               0h] = message_class.reserved[ 2b]
> 10.173.69.39: [               0h] = message_class.ack[ 1b]
> 10.173.69.39: IPMI Session Header:
> 10.173.69.39: --------------------
> 10.173.69.39: [               0h] = authentication_type[ 8b]
> 10.173.69.39: [               0h] = session_sequence_number[32b]
> 10.173.69.39: [               0h] = session_id[32b]
> 10.173.69.39: [               9h] = ipmi_msg_len[ 8b]
> 10.173.69.39: IPMI Message Header:
> 10.173.69.39: --------------------
> 10.173.69.39: [              20h] = rs_addr[ 8b]
> 10.173.69.39: [               0h] = rs_lun[ 2b]
> 10.173.69.39: [               6h] = net_fn[ 6b]
> 10.173.69.39: [              C8h] = checksum1[ 8b]
> 10.173.69.39: [              81h] = rq_addr[ 8b]
> 10.173.69.39: [               0h] = rq_lun[ 2b]
> 10.173.69.39: [              18h] = rq_seq[ 6b]
> 10.173.69.39: IPMI Command Data:
> 10.173.69.39: ------------------
> 10.173.69.39: [              38h] = cmd[ 8b]
> 10.173.69.39: [               Eh] = channel_number[ 4b]
> 10.173.69.39: [               0h] = reserved1[ 3b]
> 10.173.69.39: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
> 10.173.69.39: [               2h] = maximum_privilege_level[ 4b]
> 10.173.69.39: [               0h] = reserved2[ 4b]
> 10.173.69.39: IPMI Trailer:
> 10.173.69.39: --------------
> 10.173.69.39: [              57h] = checksum2[ 8b]
> 10.173.69.39: =====================================================
> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Response
> 10.173.69.39: =====================================================
> 10.173.69.39: RMCP Header:
> 10.173.69.39: ------------
> 10.173.69.39: [               6h] = version[ 8b]
> 10.173.69.39: [               0h] = reserved[ 8b]
> 10.173.69.39: [              FFh] = sequence_number[ 8b]
> 10.173.69.39: [               7h] = message_class.class[ 5b]
> 10.173.69.39: [               0h] = message_class.reserved[ 2b]
> 10.173.69.39: [               0h] = message_class.ack[ 1b]
> 10.173.69.39: IPMI Session Header:
> 10.173.69.39: --------------------
> 10.173.69.39: [               0h] = authentication_type[ 8b]
> 10.173.69.39: [               0h] = session_sequence_number[32b]
> 10.173.69.39: [               0h] = session_id[32b]
> 10.173.69.39: [              10h] = ipmi_msg_len[ 8b]
> 10.173.69.39: IPMI Message Header:
> 10.173.69.39: --------------------
> 10.173.69.39: [              81h] = rq_addr[ 8b]
> 10.173.69.39: [               0h] = rq_lun[ 2b]
> 10.173.69.39: [               7h] = net_fn[ 6b]
> 10.173.69.39: [              63h] = checksum1[ 8b]
> 10.173.69.39: [              20h] = rs_addr[ 8b]
> 10.173.69.39: [               0h] = rs_lun[ 2b]
> 10.173.69.39: [              18h] = rq_seq[ 6b]
> 10.173.69.39: IPMI Command Data:
> 10.173.69.39: ------------------
> 10.173.69.39: [              38h] = cmd[ 8b]
> 10.173.69.39: [               0h] = comp_code[ 8b]
> 10.173.69.39: [               1h] = channel_number[ 8b]
> 10.173.69.39: [               0h] = authentication_type.none[ 1b]
> 10.173.69.39: [               1h] = authentication_type.md2[ 1b]
> 10.173.69.39: [               1h] = authentication_type.md5[ 1b]
> 10.173.69.39: [               0h] = authentication_type.reserved1[ 1b]
> 10.173.69.39: [               1h] = 
> authentication_type.straight_password_key[ 1b]
> 10.173.69.39: [               0h] = authentication_type.oem_prop[ 1b]
> 10.173.69.39: [               0h] = authentication_type.reserved2[ 1b]
> 10.173.69.39: [               1h] = 
> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> 10.173.69.39: [               0h] = authentication_status.anonymous_login[ 1b]
> 10.173.69.39: [               1h] = authentication_status.null_username[ 1b]
> 10.173.69.39: [               0h] = authentication_status.non_null_username[ 
> 1b]
> 10.173.69.39: [               0h] = 
> authentication_status.user_level_authentication[ 1b]
> 10.173.69.39: [               0h] = 
> authentication_status.per_message_authentication[ 1b]
> 10.173.69.39: [               0h] = authentication_status.k_g[ 1b]
> 10.173.69.39: [               0h] = authentication_status.reserved[ 2b]
> 10.173.69.39: [               1h] = channel_supports_ipmi_v1.5_connections[ 
> 1b]
> 10.173.69.39: [               1h] = channel_supports_ipmi_v2.0_connections[ 
> 1b]
> 10.173.69.39: [               0h] = reserved[ 6b]
> 10.173.69.39: [               0h] = oem_id[24b]
> 10.173.69.39: [               0h] = oem_auxiliary_data[ 8b]
> 10.173.69.39: IPMI Trailer:
> 10.173.69.39: --------------
> 10.173.69.39: [              ACh] = checksum2[ 8b]
> 10.173.69.39: username invalid
> _______________________________________________
> Freeipmi-users mailing list
> address@hidden
> http://lists.gnu.org/mailman/listinfo/freeipmi-users
-- 
Albert Chu
address@hidden
925-422-5311
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]