Hi John, I assume this username works when using IPMI 1.5 (-D lan) vs. IPMI 2.0 (-D lan_2_0)?
I wonder if some of the workarounds like "-W opensesspriv" would help. Or perhaps some other options like a different privilege level (-l admin). If it works under IPMI 1.5 but not IPMI 2.0, I'm thinking there's a subtle bug in HP's authentication mechanism. Al On Fri, 2012-02-17 at 00:28 -0800, john s. wrote: > > Hello Al Chu > > > Here is the Debug file when the error says "username invalid": > > > > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 1.5 Get Channel Authentication Capabilities Request > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI Session Header: > xxx.xxx.xxx.xxx: -------------------- > xxx.xxx.xxx.xxx: [ 0h] = authentication_type[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 9h] = ipmi_msg_len[ 8b] > xxx.xxx.xxx.xxx: IPMI Message Header: > xxx.xxx.xxx.xxx: -------------------- > xxx.xxx.xxx.xxx: [ 20h] = rs_addr[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = rs_lun[ 2b] > xxx.xxx.xxx.xxx: [ 6h] = net_fn[ 6b] > xxx.xxx.xxx.xxx: [ C8h] = checksum1[ 8b] > xxx.xxx.xxx.xxx: [ 81h] = rq_addr[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = rq_lun[ 2b] > xxx.xxx.xxx.xxx: [ 5h] = rq_seq[ 6b] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 38h] = cmd[ 8b] > xxx.xxx.xxx.xxx: [ Eh] = channel_number[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 3b] > xxx.xxx.xxx.xxx: [ 1h] = get_ipmi_v2.0_extended_data[ 1b] > xxx.xxx.xxx.xxx: [ 2h] = maximum_privilege_level[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 4b] > xxx.xxx.xxx.xxx: IPMI Trailer: > xxx.xxx.xxx.xxx: -------------- > xxx.xxx.xxx.xxx: [ A3h] = checksum2[ 8b] > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 1.5 Get Channel Authentication Capabilities Response > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI Session Header: > xxx.xxx.xxx.xxx: -------------------- > xxx.xxx.xxx.xxx: [ 0h] = authentication_type[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 10h] = ipmi_msg_len[ 8b] > xxx.xxx.xxx.xxx: IPMI Message Header: > xxx.xxx.xxx.xxx: -------------------- > xxx.xxx.xxx.xxx: [ 81h] = rq_addr[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = rq_lun[ 2b] > xxx.xxx.xxx.xxx: [ 7h] = net_fn[ 6b] > xxx.xxx.xxx.xxx: [ 63h] = checksum1[ 8b] > xxx.xxx.xxx.xxx: [ 20h] = rs_addr[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = rs_lun[ 2b] > xxx.xxx.xxx.xxx: [ 5h] = rq_seq[ 6b] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 38h] = cmd[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = comp_code[ 8b] > xxx.xxx.xxx.xxx: [ 2h] = channel_number[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.none[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.md2[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.md5[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.reserved1[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = > authentication_type.straight_password_key[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.oem_prop[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_type.reserved2[ 1b] > xxx.xxx.xxx.xxx: [ 1h] = > authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = > authentication_status.anonymous_login[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_status.null_username[ > 1b] > xxx.xxx.xxx.xxx: [ 1h] = > authentication_status.non_null_username[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = > authentication_status.user_level_authentication[ 1b] > xxx.xxx.xxx.xxx: [ 1h] = > authentication_status.per_message_authentication[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_status.k_g[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_status.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = > channel_supports_ipmi_v1.5_connections[ 1b] > xxx.xxx.xxx.xxx: [ 1h] = > channel_supports_ipmi_v2.0_connections[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = oem_id[24b] > xxx.xxx.xxx.xxx: [ 0h] = oem_auxiliary_data[ 8b] > xxx.xxx.xxx.xxx: IPMI Trailer: > xxx.xxx.xxx.xxx: -------------- > xxx.xxx.xxx.xxx: [ FCh] = checksum2[ 8b] > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 2.0 Open Session Request > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header: > xxx.xxx.xxx.xxx: ----------------------------- > xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 10h] = payload_type[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 20h] = ipmi_payload_len[16b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload: > xxx.xxx.xxx.xxx: ---------------------- > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[32B] > xxx.xxx.xxx.xxx: [ 5Dh 00h 00h 00h 39h C2h DCh 47h ] > xxx.xxx.xxx.xxx: [ 00h 00h 00h 08h 01h 00h 00h 00h ] > xxx.xxx.xxx.xxx: [ 01h 00h 00h 08h 01h 00h 00h 00h ] > xxx.xxx.xxx.xxx: [ 02h 00h 00h 08h 01h 00h 00h 00h ] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 5Dh] = message_tag[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = requested_maximum_privilege_level[ > 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved2[16b] > xxx.xxx.xxx.xxx: [ 47DCC239h] = remote_console_session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_payload.payload_type[ > 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b] > xxx.xxx.xxx.xxx: [ 8h] = > authentication_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > authentication_payload.authentication_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved4[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved5[24b] > xxx.xxx.xxx.xxx: [ 1h] = integrity_payload.payload_type[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved6[16b] > xxx.xxx.xxx.xxx: [ 8h] = integrity_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > integrity_payload.integrity_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved7[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved8[24b] > xxx.xxx.xxx.xxx: [ 2h] = confidentiality_payload.payload_type[ > 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved9[16b] > xxx.xxx.xxx.xxx: [ 8h] = > confidentiality_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > confidentiality_payload.confidentiality_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved10[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved11[24b] > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 2.0 Open Session Response > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header: > xxx.xxx.xxx.xxx: ----------------------------- > xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 11h] = payload_type[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload: > xxx.xxx.xxx.xxx: ---------------------- > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B] > xxx.xxx.xxx.xxx: [ 5Dh 00h 04h 00h 39h C2h DCh 47h ] > xxx.xxx.xxx.xxx: [ 80h 1Dh 86h 00h 00h 00h 00h 08h ] > xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h 01h 00h 00h 08h ] > xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h 02h 00h 00h 08h ] > xxx.xxx.xxx.xxx: [ 01h 00h 00h 00h ] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 5Dh] = message_tag[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = rmcpplus_status_code[ 8b] > xxx.xxx.xxx.xxx: [ 4h] = maximum_privilege_level[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 8b] > xxx.xxx.xxx.xxx: [ 47DCC239h] = remote_console_session_id[32b] > xxx.xxx.xxx.xxx: [ 861D80h] = managed_system_session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = authentication_payload.payload_type[ > 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b] > xxx.xxx.xxx.xxx: [ 8h] = > authentication_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > authentication_payload.authentication_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved4[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved5[24b] > xxx.xxx.xxx.xxx: [ 1h] = integrity_payload.payload_type[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved6[16b] > xxx.xxx.xxx.xxx: [ 8h] = integrity_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > integrity_payload.integrity_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved7[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved8[24b] > xxx.xxx.xxx.xxx: [ 2h] = confidentiality_payload.payload_type[ > 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved9[16b] > xxx.xxx.xxx.xxx: [ 8h] = > confidentiality_payload.payload_length[ 8b] > xxx.xxx.xxx.xxx: [ 1h] = > confidentiality_payload.confidentiality_algorithm[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = reserved10[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = reserved11[24b] > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 2.0 RAKP Message 1 Request > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header: > xxx.xxx.xxx.xxx: ----------------------------- > xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 12h] = payload_type[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload: > xxx.xxx.xxx.xxx: ---------------------- > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B] > xxx.xxx.xxx.xxx: [ 5Eh 00h 00h 00h 80h 1Dh 86h 00h ] > xxx.xxx.xxx.xxx: [ CBh ECh 7Dh 47h C8h 07h F5h 53h ] > xxx.xxx.xxx.xxx: [ 7Ah A2h A3h 45h 76h AFh 78h D2h ] > xxx.xxx.xxx.xxx: [ 12h 00h 00h 08h 69h 6Ch 6Fh 61h ] > xxx.xxx.xxx.xxx: [ 64h 6Dh 69h 6Eh ] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 5Eh] = message_tag[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[24b] > xxx.xxx.xxx.xxx: [ 861D80h] = managed_system_session_id[32b] > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = remote_console_random_number[16B] > xxx.xxx.xxx.xxx: [ CBh ECh 7Dh 47h C8h 07h F5h 53h ] > xxx.xxx.xxx.xxx: [ 7Ah A2h A3h 45h 76h AFh 78h D2h ] > xxx.xxx.xxx.xxx: [ 2h] = requested_maximum_privilege_level[ > 4b] > xxx.xxx.xxx.xxx: [ 1h] = name_only_lookup[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = reserved2[ 3b] > xxx.xxx.xxx.xxx: [ 0h] = reserved3[16b] > xxx.xxx.xxx.xxx: [ 8h] = user_name_length[ 8b] > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = user_name[ 8B] > xxx.xxx.xxx.xxx: [ 69h 6Ch 6Fh 61h 64h 6Dh 69h 6Eh ] > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: IPMI 2.0 RAKP Message 2 Response > xxx.xxx.xxx.xxx: ===================================================== > xxx.xxx.xxx.xxx: RMCP Header: > xxx.xxx.xxx.xxx: ------------ > xxx.xxx.xxx.xxx: [ 6h] = version[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved[ 8b] > xxx.xxx.xxx.xxx: [ FFh] = sequence_number[ 8b] > xxx.xxx.xxx.xxx: [ 7h] = message_class.class[ 5b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.reserved[ 2b] > xxx.xxx.xxx.xxx: [ 0h] = message_class.ack[ 1b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Session Header: > xxx.xxx.xxx.xxx: ----------------------------- > xxx.xxx.xxx.xxx: [ 6h] = authentication_type[ 4b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[ 4b] > xxx.xxx.xxx.xxx: [ 13h] = payload_type[ 6b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.authenticated[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = payload_type.encrypted[ 1b] > xxx.xxx.xxx.xxx: [ 0h] = session_id[32b] > xxx.xxx.xxx.xxx: [ 0h] = session_sequence_number[32b] > xxx.xxx.xxx.xxx: [ 24h] = ipmi_payload_len[16b] > xxx.xxx.xxx.xxx: IPMI RMCPPLUS Payload: > xxx.xxx.xxx.xxx: ---------------------- > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = payload_data[36B] > xxx.xxx.xxx.xxx: [ 5Eh 0Dh 00h 00h 80h 1Dh 86h 00h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: IPMI Command Data: > xxx.xxx.xxx.xxx: ------------------ > xxx.xxx.xxx.xxx: [ 5Eh] = message_tag[ 8b] > xxx.xxx.xxx.xxx: [ Dh] = rmcpplus_status_code[ 8b] > xxx.xxx.xxx.xxx: [ 0h] = reserved1[16b] > xxx.xxx.xxx.xxx: [ 861D80h] = remote_console_session_id[32b] > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = managed_system_random_number[16B] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ BYTE ARRAY ... ] = managed_system_guid[12B] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h EDh FEh DEh C0h ] > xxx.xxx.xxx.xxx: [ EDh FEh DEh C0h ] > > > best regards john s. > > > -- > View this message in context: > http://old.nabble.com/ipmi-support-with-HP-iLO2-servers-initial-success%21-tp29527071p33341216.html > Sent from the FreeIPMI - Users mailing list archive at Nabble.com. > > > _______________________________________________ > Freeipmi-users mailing list > [email protected] > https://lists.gnu.org/mailman/listinfo/freeipmi-users -- Albert Chu [email protected] Computer Scientist High Performance Systems Division Lawrence Livermore National Laboratory _______________________________________________ Freeipmi-users mailing list [email protected] https://lists.gnu.org/mailman/listinfo/freeipmi-users
