Open xiong12356 opened 1 year ago
when try to run ipmitool -I lan -H 127.0.0.1 -U admin -P Password raw 6 1 -vvv, it shows:
i rewrite the command 0x06 0x39 and 0x06 0x3a. Is there any idea to solve this problem. It seems "-I lan" on openbmc doesn't work.
Sending IPMI/RMCP presence ping packet send_packet (12 bytes) 06 00 ff 06 00 00 11 be 80 00 00 00 recv_packet (28 bytes) 06 00 ff 06 be 11 00 00 40 00 00 10 be 11 00 00 00 00 00 00 81 00 00 00 00 00 00 00 Received IPMI/RMCP response packet: IPMI Supported ASF Version 1.0 RMCP Version 1.0 RMCP Sequence 255 IANA Enterprise -1106182144
ipmi_lan_send_cmd:opened=[1], open=[475248]
IPMI Request Session Header (level 0) Authtype : NONE Sequence : 0x00000000 Session ID : 0x00000000 IPMI Request Message Header Rs Addr : 20 NetFn : 06 Rs LUN : 0 Rq Addr : 81 Rq Seq : 01 Rq Lun : 0 Command : 38 send_packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 04 38 0e 04 31 recv_packet (31 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 09 04 1c 03 00 00 00 00 78 00 ipmi message header (31 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 04 38 00 09 04 1c 03 00 00 00 00 78 00 << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 get_auth_capabilities (9 bytes) 09 04 1c 03 00 00 00 00 78 Channel 09 Authentication Capabilities: Privilege Level : ADMINISTRATOR Auth Types : MD5 Per-msg auth : disabled User level auth : disabled Non-null users : enabled Null users : disabled Anonymous login : disabled
Proceeding with AuthType MD5 ipmi_lan_send_cmd:opened=[1], open=[475248]
IPMI Request Session Header (level 0) Authtype : MD5 Sequence : 0x00000000 Session ID : 0x00000000 IPMI Request Message Header Rs Addr : 20 NetFn : 06 Rs LUN : 0 Rq Addr : 81 Rq Seq : 02 Rq Lun : 0 Command : 39 send_packet (38 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18 c8 81 08 39 02 61 64 6d 69 6e 00 00 00 00 00 00 00 00 00 00 00 33 recv_packet (43 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 35 ac a3 c7 56 fa 0a 00 01 fd 56 a5 dc 04 20 e0 56 62 3d 45 e7 00 ipmi message header (43 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 08 39 00 35 ac a3 c7 56 fa 0a 00 01 fd 56 a5 dc 04 20 e0 56 62 3d 45 e7 00 << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 39 << Compl Code : 0x00 get_session_challenge (21 bytes) 35 ac a3 c7 56 fa 0a 00 01 fd 56 a5 dc 04 20 e0 56 62 3d 45 e7 Opening Session Session ID : c7a3ac35 Challenge : 56fa0a0001fd56a5dc0420e056623d45 Privilege Level : ADMINISTRATOR Auth Type : MD5 ipmi_lan_send_cmd:opened=[1], open=[475248] IPMI Request Session Header (level 0) Authtype : MD5 Sequence : 0x00000000 Session ID : 0xc7a3ac35 IPMI Request Message Header Rs Addr : 20 NetFn : 06 Rs LUN : 0 Rq Addr : 81 Rq Seq : 03 Rq Lun : 0 Command : 3a send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 35 ac a3 c7 03 75 b2 3c 47 ec 59 12 c4 4c 78 74 85 90 05 3f 1d 20 18 c8 81 0c 3a 02 04 56 fa 0a 00 01 fd 56 a5 dc 04 20 e0 56 62 3d 45 d7 aa be 54 33 recv_packet (23 bytes) 06 00 ff 07 00 00 00 00 00 75 b0 1d 7b 08 75 b6 d5 75 fb be d4 fe 00 ipmi message header (23 bytes) 06 00 ff 07 00 00 00 00 00 75 b0 1d 7b 08 75 b6 d5 75 fb be d4 fe 00 << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x7b1db075 << IPMI Response Message Header << Rq Addr : 00 << NetFn : 00 << Rq LUN : 0 << Rs Addr : 00 << Rq Seq : 00 << Rs Lun : 0 << Command : 00 << Compl Code : 0x00 IPMI Request Match NOT FOUND
when try to run ipmitool -I lan -H 127.0.0.1 -U admin -P Password raw 6 1 -vvv, it shows:
i rewrite the command 0x06 0x39 and 0x06 0x3a. Is there any idea to solve this problem. It seems "-I lan" on openbmc doesn't work.
Sending IPMI/RMCP presence ping packet send_packet (12 bytes) 06 00 ff 06 00 00 11 be 80 00 00 00 recv_packet (28 bytes) 06 00 ff 06 be 11 00 00 40 00 00 10 be 11 00 00 00 00 00 00 81 00 00 00 00 00 00 00 Received IPMI/RMCP response packet: IPMI Supported ASF Version 1.0 RMCP Version 1.0 RMCP Sequence 255 IANA Enterprise -1106182144
ipmi_lan_send_cmd:opened=[1], open=[475248]
Proceeding with AuthType MD5 ipmi_lan_send_cmd:opened=[1], open=[475248]