[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success!
From: |
Albert Chu |
Subject: |
Re: [Freeipmi-users] ipmi support with HP iLO2 servers initial success! |
Date: |
Fri, 17 Feb 2012 09:28:43 -0800 |
Hi John,
I assume this username works when using IPMI 1.5 (-D lan) vs. IPMI 2.0
(-D lan_2_0)?
I wonder if some of the workarounds like "-W opensesspriv" would help.
Or perhaps some other options like a different privilege level (-l
admin). If it works under IPMI 1.5 but not IPMI 2.0, I'm thinking
there's a subtle bug in HP's authentication mechanism.
Al
On Fri, 2012-02-17 at 00:28 -0800, john s. wrote:
>
> Hello Al Chu
>
>
> Here is the Debug file when the error says "username invalid":
>
>
>
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 1.5 Get Channel Authentication Capabilities Request
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI Session Header:
> xxx.xxx.xxx.xxx: --------------------
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 9h] = ipmi_msg_len[ 8b]
> xxx.xxx.xxx.xxx: IPMI Message Header:
> xxx.xxx.xxx.xxx: --------------------
> xxx.xxx.xxx.xxx: [ 20h] = rs_addr[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = rs_lun[ 2b]
> xxx.xxx.xxx.xxx: [ 6h] = net_fn[ 6b]
> xxx.xxx.xxx.xxx: [ C8h] = checksum1[ 8b]
> xxx.xxx.xxx.xxx: [ 81h] = rq_addr[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = rq_lun[ 2b]
> xxx.xxx.xxx.xxx: [ 5h] = rq_seq[ 6b]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 38h] = cmd[ 8b]
> xxx.xxx.xxx.xxx: [ Eh] = channel_number[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 3b]
> xxx.xxx.xxx.xxx: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
> xxx.xxx.xxx.xxx: [ 2h] = maximum_privilege_level[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 4b]
> xxx.xxx.xxx.xxx: IPMI Trailer:
> xxx.xxx.xxx.xxx: --------------
> xxx.xxx.xxx.xxx: [ A3h] = checksum2[ 8b]
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 1.5 Get Channel Authentication Capabilities Response
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI Session Header:
> xxx.xxx.xxx.xxx: --------------------
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 10h] = ipmi_msg_len[ 8b]
> xxx.xxx.xxx.xxx: IPMI Message Header:
> xxx.xxx.xxx.xxx: --------------------
> xxx.xxx.xxx.xxx: [ 81h] = rq_addr[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = rq_lun[ 2b]
> xxx.xxx.xxx.xxx: [ 7h] = net_fn[ 6b]
> xxx.xxx.xxx.xxx: [ 63h] = checksum1[ 8b]
> xxx.xxx.xxx.xxx: [ 20h] = rs_addr[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = rs_lun[ 2b]
> xxx.xxx.xxx.xxx: [ 5h] = rq_seq[ 6b]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 38h] = cmd[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = comp_code[ 8b]
> xxx.xxx.xxx.xxx: [ 2h] = channel_number[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.none[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.md2[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.md5[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.reserved1[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] =
> authentication_type.straight_password_key[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.oem_prop[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_type.reserved2[ 1b]
> xxx.xxx.xxx.xxx: [ 1h] =
> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] =
> authentication_status.anonymous_login[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_status.null_username[
> 1b]
> xxx.xxx.xxx.xxx: [ 1h] =
> authentication_status.non_null_username[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] =
> authentication_status.user_level_authentication[ 1b]
> xxx.xxx.xxx.xxx: [ 1h] =
> authentication_status.per_message_authentication[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_status.k_g[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_status.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] =
> channel_supports_ipmi_v1.5_connections[ 1b]
> xxx.xxx.xxx.xxx: [ 1h] =
> channel_supports_ipmi_v2.0_connections[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = oem_id[24b]
> xxx.xxx.xxx.xxx: [ 0h] = oem_auxiliary_data[ 8b]
> xxx.xxx.xxx.xxx: IPMI Trailer:
> xxx.xxx.xxx.xxx: --------------
> xxx.xxx.xxx.xxx: [ FCh] = checksum2[ 8b]
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 2.0 Open Session Request
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header:
> xxx.xxx.xxx.xxx: -----------------------------
> xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 10h] = payload_type[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 20h] = ipmi_payload_len[16b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload:
> xxx.xxx.xxx.xxx: ----------------------
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[32B]
> xxx.xxx.xxx.xxx: [ 5Dh 00h 00h 00h 39h C2h DCh 47h ]
> xxx.xxx.xxx.xxx: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
> xxx.xxx.xxx.xxx: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
> xxx.xxx.xxx.xxx: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 5Dh] = message_tag[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = requested_maximum_privilege_level[
> 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved2[16b]
> xxx.xxx.xxx.xxx: [ 47DCC239h] = remote_console_session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_payload.payload_type[
> 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b]
> xxx.xxx.xxx.xxx: [ 8h] =
> authentication_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> authentication_payload.authentication_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved4[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved5[24b]
> xxx.xxx.xxx.xxx: [ 1h] = integrity_payload.payload_type[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved6[16b]
> xxx.xxx.xxx.xxx: [ 8h] = integrity_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> integrity_payload.integrity_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved7[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved8[24b]
> xxx.xxx.xxx.xxx: [ 2h] = confidentiality_payload.payload_type[
> 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved9[16b]
> xxx.xxx.xxx.xxx: [ 8h] =
> confidentiality_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> confidentiality_payload.confidentiality_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved10[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved11[24b]
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 2.0 Open Session Response
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header:
> xxx.xxx.xxx.xxx: -----------------------------
> xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 11h] = payload_type[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload:
> xxx.xxx.xxx.xxx: ----------------------
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B]
> xxx.xxx.xxx.xxx: [ 5Dh 00h 04h 00h 39h C2h DCh 47h ]
> xxx.xxx.xxx.xxx: [ 80h 1Dh 86h 00h 00h 00h 00h 08h ]
> xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
> xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
> xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h ]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 5Dh] = message_tag[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = rmcpplus_status_code[ 8b]
> xxx.xxx.xxx.xxx: [ 4h] = maximum_privilege_level[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 8b]
> xxx.xxx.xxx.xxx: [ 47DCC239h] = remote_console_session_id[32b]
> xxx.xxx.xxx.xxx: [ 861D80h] = managed_system_session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = authentication_payload.payload_type[
> 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b]
> xxx.xxx.xxx.xxx: [ 8h] =
> authentication_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> authentication_payload.authentication_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved4[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved5[24b]
> xxx.xxx.xxx.xxx: [ 1h] = integrity_payload.payload_type[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved6[16b]
> xxx.xxx.xxx.xxx: [ 8h] = integrity_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> integrity_payload.integrity_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved7[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved8[24b]
> xxx.xxx.xxx.xxx: [ 2h] = confidentiality_payload.payload_type[
> 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved9[16b]
> xxx.xxx.xxx.xxx: [ 8h] =
> confidentiality_payload.payload_length[ 8b]
> xxx.xxx.xxx.xxx: [ 1h] =
> confidentiality_payload.confidentiality_algorithm[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved10[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved11[24b]
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 2.0 RAKP Message 1 Request
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header:
> xxx.xxx.xxx.xxx: -----------------------------
> xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 12h] = payload_type[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload:
> xxx.xxx.xxx.xxx: ----------------------
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B]
> xxx.xxx.xxx.xxx: [ 5Eh 00h 00h 00h 80h 1Dh 86h 00h ]
> xxx.xxx.xxx.xxx: [ CBh ECh 7Dh 47h C8h 07h F5h 53h ]
> xxx.xxx.xxx.xxx: [ 7Ah A2h A3h 45h 76h AFh 78h D2h ]
> xxx.xxx.xxx.xxx: [ 12h 00h 00h 08h 69h 6Ch 6Fh 61h ]
> xxx.xxx.xxx.xxx: [ 64h 6Dh 69h 6Eh ]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 5Eh] = message_tag[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[24b]
> xxx.xxx.xxx.xxx: [ 861D80h] = managed_system_session_id[32b]
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
> xxx.xxx.xxx.xxx: [ CBh ECh 7Dh 47h C8h 07h F5h 53h ]
> xxx.xxx.xxx.xxx: [ 7Ah A2h A3h 45h 76h AFh 78h D2h ]
> xxx.xxx.xxx.xxx: [ 2h] = requested_maximum_privilege_level[
> 4b]
> xxx.xxx.xxx.xxx: [ 1h] = name_only_lookup[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 3b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b]
> xxx.xxx.xxx.xxx: [ 8h] = user_name_length[ 8b]
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = user_name[ 8B]
> xxx.xxx.xxx.xxx: [ 69h 6Ch 6Fh 61h 64h 6Dh 69h 6Eh ]
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: IPMI 2.0 RAKP Message 2 Response
> xxx.xxx.xxx.xxx: =====================================================
> xxx.xxx.xxx.xxx: RMCP Header:
> xxx.xxx.xxx.xxx: ------------
> xxx.xxx.xxx.xxx: [ 6h] = version[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b]
> xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b]
> xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b]
> xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header:
> xxx.xxx.xxx.xxx: -----------------------------
> xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b]
> xxx.xxx.xxx.xxx: [ 13h] = payload_type[ 6b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b]
> xxx.xxx.xxx.xxx: [ 0h] = session_id[32b]
> xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b]
> xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b]
> xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload:
> xxx.xxx.xxx.xxx: ----------------------
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B]
> xxx.xxx.xxx.xxx: [ 5Eh 0Dh 00h 00h 80h 1Dh 86h 00h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: IPMI Command Data:
> xxx.xxx.xxx.xxx: ------------------
> xxx.xxx.xxx.xxx: [ 5Eh] = message_tag[ 8b]
> xxx.xxx.xxx.xxx: [ Dh] = rmcpplus_status_code[ 8b]
> xxx.xxx.xxx.xxx: [ 0h] = reserved1[16b]
> xxx.xxx.xxx.xxx: [ 861D80h] = remote_console_session_id[32b]
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = managed_system_guid[12B]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ]
> xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h ]
>
>
> best regards john s.
>
>
> --
> View this message in context:
> http://old.nabble.com/ipmi-support-with-HP-iLO2-servers-initial-success%21-tp29527071p33341216.html
> Sent from the FreeIPMI - Users mailing list archive at Nabble.com.
>
>
> _______________________________________________
> Freeipmi-users mailing list
> address@hidden
> https://lists.gnu.org/mailman/listinfo/freeipmi-users
--
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory