Hey Ihara, It seems the return values from the "get authentication capabilities command" indicate a non-null username is invalid.
10.173.69.39: [ 0h] = authentication_status.non_null_username[ 1b] Thus the 'username invalid' error message is output. Maybe this is a bug on the eLOM? Could you confirm by trying out the "authcap" workaround? If it works, can you please tell me the hardware details for that motherboard? I can then add it to the workaround documentation. Thanks, Al On Fri, 2008-05-23 at 23:28 +0900, Shuichi Ihara wrote: > Hi > > I'm attempting to use the freeipmi to X4150/X4450 which are Sun's > new Intel server. Those serves have eLOM (no ILOM which is used to > AMD server). I just tried to run ipmipower below, but it didn't work. > The ipmitool works well. > > # ipmitool -H 10.173.69.39 -U root -P changeme power status > Chassis Power is on > # ipmipower -h 10.173.69.39 -u root -p changeme -s > 10.173.69.39: username invalid > # ipmipower -h 10.173.69.39 -u root -p changeme -W "endianseq" -s > 10.173.69.39: username invalid > > An attached is dump with "--debug". It would be appreciated if someone could > help for this. > > Thanks, > > -Ihara > plain text document attachment (ipmipower_elom.log) > 10.173.69.39: ===================================================== > 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Request > 10.173.69.39: ===================================================== > 10.173.69.39: RMCP Header: > 10.173.69.39: ------------ > 10.173.69.39: [ 6h] = version[ 8b] > 10.173.69.39: [ 0h] = reserved[ 8b] > 10.173.69.39: [ FFh] = sequence_number[ 8b] > 10.173.69.39: [ 7h] = message_class.class[ 5b] > 10.173.69.39: [ 0h] = message_class.reserved[ 2b] > 10.173.69.39: [ 0h] = message_class.ack[ 1b] > 10.173.69.39: IPMI Session Header: > 10.173.69.39: -------------------- > 10.173.69.39: [ 0h] = authentication_type[ 8b] > 10.173.69.39: [ 0h] = session_sequence_number[32b] > 10.173.69.39: [ 0h] = session_id[32b] > 10.173.69.39: [ 9h] = ipmi_msg_len[ 8b] > 10.173.69.39: IPMI Message Header: > 10.173.69.39: -------------------- > 10.173.69.39: [ 20h] = rs_addr[ 8b] > 10.173.69.39: [ 0h] = rs_lun[ 2b] > 10.173.69.39: [ 6h] = net_fn[ 6b] > 10.173.69.39: [ C8h] = checksum1[ 8b] > 10.173.69.39: [ 81h] = rq_addr[ 8b] > 10.173.69.39: [ 0h] = rq_lun[ 2b] > 10.173.69.39: [ 18h] = rq_seq[ 6b] > 10.173.69.39: IPMI Command Data: > 10.173.69.39: ------------------ > 10.173.69.39: [ 38h] = cmd[ 8b] > 10.173.69.39: [ Eh] = channel_number[ 4b] > 10.173.69.39: [ 0h] = reserved1[ 3b] > 10.173.69.39: [ 1h] = get_ipmi_v2.0_extended_data[ 1b] > 10.173.69.39: [ 2h] = maximum_privilege_level[ 4b] > 10.173.69.39: [ 0h] = reserved2[ 4b] > 10.173.69.39: IPMI Trailer: > 10.173.69.39: -------------- > 10.173.69.39: [ 57h] = checksum2[ 8b] > 10.173.69.39: ===================================================== > 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Response > 10.173.69.39: ===================================================== > 10.173.69.39: RMCP Header: > 10.173.69.39: ------------ > 10.173.69.39: [ 6h] = version[ 8b] > 10.173.69.39: [ 0h] = reserved[ 8b] > 10.173.69.39: [ FFh] = sequence_number[ 8b] > 10.173.69.39: [ 7h] = message_class.class[ 5b] > 10.173.69.39: [ 0h] = message_class.reserved[ 2b] > 10.173.69.39: [ 0h] = message_class.ack[ 1b] > 10.173.69.39: IPMI Session Header: > 10.173.69.39: -------------------- > 10.173.69.39: [ 0h] = authentication_type[ 8b] > 10.173.69.39: [ 0h] = session_sequence_number[32b] > 10.173.69.39: [ 0h] = session_id[32b] > 10.173.69.39: [ 10h] = ipmi_msg_len[ 8b] > 10.173.69.39: IPMI Message Header: > 10.173.69.39: -------------------- > 10.173.69.39: [ 81h] = rq_addr[ 8b] > 10.173.69.39: [ 0h] = rq_lun[ 2b] > 10.173.69.39: [ 7h] = net_fn[ 6b] > 10.173.69.39: [ 63h] = checksum1[ 8b] > 10.173.69.39: [ 20h] = rs_addr[ 8b] > 10.173.69.39: [ 0h] = rs_lun[ 2b] > 10.173.69.39: [ 18h] = rq_seq[ 6b] > 10.173.69.39: IPMI Command Data: > 10.173.69.39: ------------------ > 10.173.69.39: [ 38h] = cmd[ 8b] > 10.173.69.39: [ 0h] = comp_code[ 8b] > 10.173.69.39: [ 1h] = channel_number[ 8b] > 10.173.69.39: [ 0h] = authentication_type.none[ 1b] > 10.173.69.39: [ 1h] = authentication_type.md2[ 1b] > 10.173.69.39: [ 1h] = authentication_type.md5[ 1b] > 10.173.69.39: [ 0h] = authentication_type.reserved1[ 1b] > 10.173.69.39: [ 1h] = > authentication_type.straight_password_key[ 1b] > 10.173.69.39: [ 0h] = authentication_type.oem_prop[ 1b] > 10.173.69.39: [ 0h] = authentication_type.reserved2[ 1b] > 10.173.69.39: [ 1h] = > authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] > 10.173.69.39: [ 0h] = authentication_status.anonymous_login[ 1b] > 10.173.69.39: [ 1h] = authentication_status.null_username[ 1b] > 10.173.69.39: [ 0h] = authentication_status.non_null_username[ > 1b] > 10.173.69.39: [ 0h] = > authentication_status.user_level_authentication[ 1b] > 10.173.69.39: [ 0h] = > authentication_status.per_message_authentication[ 1b] > 10.173.69.39: [ 0h] = authentication_status.k_g[ 1b] > 10.173.69.39: [ 0h] = authentication_status.reserved[ 2b] > 10.173.69.39: [ 1h] = channel_supports_ipmi_v1.5_connections[ > 1b] > 10.173.69.39: [ 1h] = channel_supports_ipmi_v2.0_connections[ > 1b] > 10.173.69.39: [ 0h] = reserved[ 6b] > 10.173.69.39: [ 0h] = oem_id[24b] > 10.173.69.39: [ 0h] = oem_auxiliary_data[ 8b] > 10.173.69.39: IPMI Trailer: > 10.173.69.39: -------------- > 10.173.69.39: [ ACh] = checksum2[ 8b] > 10.173.69.39: username invalid > _______________________________________________ > Freeipmi-users mailing list > [email protected] > http://lists.gnu.org/mailman/listinfo/freeipmi-users -- Albert Chu [EMAIL PROTECTED] 925-422-5311 Computer Scientist High Performance Systems Division Lawrence Livermore National Laboratory _______________________________________________ Freeipmi-users mailing list [email protected] http://lists.gnu.org/mailman/listinfo/freeipmi-users
