Hi Al, Thanks, I just tried with "authcap" and it worked. # ipmipower -h 10.173.69.39 -u root -p changeme -W "authcap" -s 10.173.69.39: on
Here is a write paper of X4150/X4450. http://www.sun.com/servers/x64/x4150/wp.pdf One question: If we have a cluster and that consists of Intel and AMD servers, how we can use "two" workaround word for each servers in /etc/ipmipower.conf? BTW, ipmi-fru still failing and can't dump all of fru information. It seems different issue. # ipmi-fru -h 10.173.69.39 -u root -p changeme -W "authcap" -snip- FRU Get FRU Inventory Area Failure: bad completion code: request data/parameter invalid FRU Get FRU Inventory Area Failure: bad completion code: request data/parameter invalid -snip- Please see attached dump file with "--debug" option. Thanks in advance. -Ihara Al Chu wrote: > Hey Ihara, > > It seems the return values from the "get authentication capabilities > command" indicate a non-null username is invalid. > > 10.173.69.39: [ 0h] = > authentication_status.non_null_username[ 1b] > > Thus the 'username invalid' error message is output. Maybe this is a > bug on the eLOM? > > Could you confirm by trying out the "authcap" workaround? If it works, > can you please tell me the hardware details for that motherboard? I can > then add it to the workaround documentation. > > Thanks, > Al > > On Fri, 2008-05-23 at 23:28 +0900, Shuichi Ihara wrote: >> Hi >> >> I'm attempting to use the freeipmi to X4150/X4450 which are Sun's >> new Intel server. Those serves have eLOM (no ILOM which is used to >> AMD server). I just tried to run ipmipower below, but it didn't work. >> The ipmitool works well. >> >> # ipmitool -H 10.173.69.39 -U root -P changeme power status >> Chassis Power is on >> # ipmipower -h 10.173.69.39 -u root -p changeme -s >> 10.173.69.39: username invalid >> # ipmipower -h 10.173.69.39 -u root -p changeme -W "endianseq" -s >> 10.173.69.39: username invalid >> >> An attached is dump with "--debug". It would be appreciated if someone could >> help for this. >> >> Thanks, >> >> -Ihara >> plain text document attachment (ipmipower_elom.log) >> 10.173.69.39: ===================================================== >> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Request >> 10.173.69.39: ===================================================== >> 10.173.69.39: RMCP Header: >> 10.173.69.39: ------------ >> 10.173.69.39: [ 6h] = version[ 8b] >> 10.173.69.39: [ 0h] = reserved[ 8b] >> 10.173.69.39: [ FFh] = sequence_number[ 8b] >> 10.173.69.39: [ 7h] = message_class.class[ 5b] >> 10.173.69.39: [ 0h] = message_class.reserved[ 2b] >> 10.173.69.39: [ 0h] = message_class.ack[ 1b] >> 10.173.69.39: IPMI Session Header: >> 10.173.69.39: -------------------- >> 10.173.69.39: [ 0h] = authentication_type[ 8b] >> 10.173.69.39: [ 0h] = session_sequence_number[32b] >> 10.173.69.39: [ 0h] = session_id[32b] >> 10.173.69.39: [ 9h] = ipmi_msg_len[ 8b] >> 10.173.69.39: IPMI Message Header: >> 10.173.69.39: -------------------- >> 10.173.69.39: [ 20h] = rs_addr[ 8b] >> 10.173.69.39: [ 0h] = rs_lun[ 2b] >> 10.173.69.39: [ 6h] = net_fn[ 6b] >> 10.173.69.39: [ C8h] = checksum1[ 8b] >> 10.173.69.39: [ 81h] = rq_addr[ 8b] >> 10.173.69.39: [ 0h] = rq_lun[ 2b] >> 10.173.69.39: [ 18h] = rq_seq[ 6b] >> 10.173.69.39: IPMI Command Data: >> 10.173.69.39: ------------------ >> 10.173.69.39: [ 38h] = cmd[ 8b] >> 10.173.69.39: [ Eh] = channel_number[ 4b] >> 10.173.69.39: [ 0h] = reserved1[ 3b] >> 10.173.69.39: [ 1h] = get_ipmi_v2.0_extended_data[ 1b] >> 10.173.69.39: [ 2h] = maximum_privilege_level[ 4b] >> 10.173.69.39: [ 0h] = reserved2[ 4b] >> 10.173.69.39: IPMI Trailer: >> 10.173.69.39: -------------- >> 10.173.69.39: [ 57h] = checksum2[ 8b] >> 10.173.69.39: ===================================================== >> 10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Response >> 10.173.69.39: ===================================================== >> 10.173.69.39: RMCP Header: >> 10.173.69.39: ------------ >> 10.173.69.39: [ 6h] = version[ 8b] >> 10.173.69.39: [ 0h] = reserved[ 8b] >> 10.173.69.39: [ FFh] = sequence_number[ 8b] >> 10.173.69.39: [ 7h] = message_class.class[ 5b] >> 10.173.69.39: [ 0h] = message_class.reserved[ 2b] >> 10.173.69.39: [ 0h] = message_class.ack[ 1b] >> 10.173.69.39: IPMI Session Header: >> 10.173.69.39: -------------------- >> 10.173.69.39: [ 0h] = authentication_type[ 8b] >> 10.173.69.39: [ 0h] = session_sequence_number[32b] >> 10.173.69.39: [ 0h] = session_id[32b] >> 10.173.69.39: [ 10h] = ipmi_msg_len[ 8b] >> 10.173.69.39: IPMI Message Header: >> 10.173.69.39: -------------------- >> 10.173.69.39: [ 81h] = rq_addr[ 8b] >> 10.173.69.39: [ 0h] = rq_lun[ 2b] >> 10.173.69.39: [ 7h] = net_fn[ 6b] >> 10.173.69.39: [ 63h] = checksum1[ 8b] >> 10.173.69.39: [ 20h] = rs_addr[ 8b] >> 10.173.69.39: [ 0h] = rs_lun[ 2b] >> 10.173.69.39: [ 18h] = rq_seq[ 6b] >> 10.173.69.39: IPMI Command Data: >> 10.173.69.39: ------------------ >> 10.173.69.39: [ 38h] = cmd[ 8b] >> 10.173.69.39: [ 0h] = comp_code[ 8b] >> 10.173.69.39: [ 1h] = channel_number[ 8b] >> 10.173.69.39: [ 0h] = authentication_type.none[ 1b] >> 10.173.69.39: [ 1h] = authentication_type.md2[ 1b] >> 10.173.69.39: [ 1h] = authentication_type.md5[ 1b] >> 10.173.69.39: [ 0h] = authentication_type.reserved1[ 1b] >> 10.173.69.39: [ 1h] = >> authentication_type.straight_password_key[ 1b] >> 10.173.69.39: [ 0h] = authentication_type.oem_prop[ 1b] >> 10.173.69.39: [ 0h] = authentication_type.reserved2[ 1b] >> 10.173.69.39: [ 1h] = >> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] >> 10.173.69.39: [ 0h] = authentication_status.anonymous_login[ >> 1b] >> 10.173.69.39: [ 1h] = authentication_status.null_username[ 1b] >> 10.173.69.39: [ 0h] = authentication_status.non_null_username[ >> 1b] >> 10.173.69.39: [ 0h] = >> authentication_status.user_level_authentication[ 1b] >> 10.173.69.39: [ 0h] = >> authentication_status.per_message_authentication[ 1b] >> 10.173.69.39: [ 0h] = authentication_status.k_g[ 1b] >> 10.173.69.39: [ 0h] = authentication_status.reserved[ 2b] >> 10.173.69.39: [ 1h] = channel_supports_ipmi_v1.5_connections[ >> 1b] >> 10.173.69.39: [ 1h] = channel_supports_ipmi_v2.0_connections[ >> 1b] >> 10.173.69.39: [ 0h] = reserved[ 6b] >> 10.173.69.39: [ 0h] = oem_id[24b] >> 10.173.69.39: [ 0h] = oem_auxiliary_data[ 8b] >> 10.173.69.39: IPMI Trailer: >> 10.173.69.39: -------------- >> 10.173.69.39: [ ACh] = checksum2[ 8b] >> 10.173.69.39: username invalid >> _______________________________________________ >> Freeipmi-users mailing list >> [email protected] >> http://lists.gnu.org/mailman/listinfo/freeipmi-users
_______________________________________________ Freeipmi-users mailing list [email protected] http://lists.gnu.org/mailman/listinfo/freeipmi-users
