freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] DELL C6100 Megarac - ipmi_ctx_open_outofband


From: Albert Chu
Subject: Re: [Freeipmi-users] DELL C6100 Megarac - ipmi_ctx_open_outofband
Date: Mon, 19 Dec 2011 15:28:42 -0800

Hi Alex,

> ipmi_ctx_open_outofband: bad completion code: request data/parameter
invalid

Ugh, this really stinks.  It means that the motherboard is confused and
unwilling to accept some data.  The error code doesn't even provide us a
useful hint.

First off, I think a bug report should be filed to Dell.

Second, it'd be good to play around with some of the options.  Like try
alternate privilege levels (i.e. -l admin vs -l operator),
authentication mechanisms (i.e. -a md5 vs -a md2), and such.  It might
also be good to try the IPMI 2.0 protocol (-D lan_2_0) too.

Hopefully there will be a workaround of some sort that will work.

Al

> Hello,
> i'm new to freeipmi-tools and started to integrate this within our
> Icinga monitoring system for about 200 manageable hosts.
> All works fine for all that Supermicro stuff.
> 
> But i cannot get out of trouble with that Dell C6100 multinode
> systems, getting the following error all the time:
>     ipmi_ctx_open_outofband: bad completion code: request
> data/parameter invalid
> 
> Request ist the same as it works for supermicro servers except that
> there is another username.
>     monitoring:/~# /usr/sbin/ipmimonitoring -h <ip-address> -u root -P
> This results in the error message mentioned above.
> 
> That is what ipmiping tells me:
>     monitoring:/~# ipmiping -v -c 1 -I eth1 <ip-address>
>     response received from <ip-address>: rq_seq=63, auth: none=set
> md2=set md5=set password=set oem=clear anon=clear null=clear
> non-null=set user=clear permsg=clear
> 
> Here is also the output of the debug request of ipmimonitoring
>     monitoring:/~# /usr/sbin/ipmimonitoring -h <ip-address> -u root -P
> --debug
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
> Request
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               0h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [               0h] = session_id[32b]
>     <ip-address>: [               9h] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [               6h] = net_fn[ 6b]
>     <ip-address>: [              C8h] = checksum1[ 8b]
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [              30h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              38h] = cmd[ 8b]
>     <ip-address>: [               Eh] = channel_number[ 4b]
>     <ip-address>: [               0h] = reserved1[ 4b]
>     <ip-address>: [               3h] = maximum_privilege_level[ 4b]
>     <ip-address>: [               0h] = reserved2[ 4b]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              76h] = checksum2[ 8b]
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Get Channel Authentication Capabilities
> Response
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               0h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [               0h] = session_id[32b]
>     <ip-address>: [              10h] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [               7h] = net_fn[ 6b]
>     <ip-address>: [              63h] = checksum1[ 8b]
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [              30h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              38h] = cmd[ 8b]
>     <ip-address>: [               0h] = comp_code[ 8b]
>     <ip-address>: [               1h] = channel_number[ 8b]
>     <ip-address>: [               1h] = authentication_type.none[ 1b]
>     <ip-address>: [               1h] = authentication_type.md2[ 1b]
>     <ip-address>: [               1h] = authentication_type.md5[ 1b]
>     <ip-address>: [               0h] =
> authentication_type.reserved1[ 1b]
>     <ip-address>: [               1h] =
> authentication_type.straight_password_key[ 1b]
>     <ip-address>: [               0h] =
> authentication_type.oem_prop[ 1b]
>     <ip-address>: [               0h] =
> authentication_type.reserved2[ 2b]
>     <ip-address>: [               0h] =
> authentication_status.anonymous_login[ 1b]
>     <ip-address>: [               0h] =
> authentication_status.null_username[ 1b]
>     <ip-address>: [               1h] =
> authentication_status.non_null_username[ 1b]
>     <ip-address>: [               0h] =
> authentication_status.user_level_authentication[ 1b]
>     <ip-address>: [               0h] =
> authentication_status.per_message_authentication[ 1b]
>     <ip-address>: [               0h] =
> authentication_status.reserved[ 3b]
>     <ip-address>: [               0h] = reserved1[ 8b]
>     <ip-address>: [               0h] = oem_id[24b]
>     <ip-address>: [               0h] = oem_auxiliary_data[ 8b]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              CCh] = checksum2[ 8b]
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Get Session Challenge Request
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               0h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [               0h] = session_id[32b]
>     <ip-address>: [              18h] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [               6h] = net_fn[ 6b]
>     <ip-address>: [              C8h] = checksum1[ 8b]
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [              31h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              39h] = cmd[ 8b]
>     <ip-address>: [               2h] = authentication_type[ 4b]
>     <ip-address>: [               0h] = reserved[ 4b]
>     <ip-address>: [  BYTE ARRAY ... ] = user_name[16B]
>     <ip-address>: [ 72h 6Fh 6Fh 74h 00h 00h 00h 00h ]
>     <ip-address>: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              BCh] = checksum2[ 8b]
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Get Session Challenge Response
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               0h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [               0h] = session_id[32b]
>     <ip-address>: [              1Ch] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [               7h] = net_fn[ 6b]
>     <ip-address>: [              63h] = checksum1[ 8b]
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [              31h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              39h] = cmd[ 8b]
>     <ip-address>: [               0h] = comp_code[ 8b]
>     <ip-address>: [        4DF527F8h] = temp_session_id[32b]
>     <ip-address>: [  BYTE ARRAY ... ] = challenge_string[16B]
>     <ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
>     <ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              19h] = checksum2[ 8b]
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Activiate Session Request
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               2h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [        4DF527F8h] = session_id[32b]
>     <ip-address>: [  BYTE ARRAY ... ] = authentication_code[16B]
>     <ip-address>: [ 1Eh FCh 53h 98h 70h 2Eh 25h 99h ]
>     <ip-address>: [ 6Eh EBh 3Eh FFh ADh 95h E6h 66h ]
>     <ip-address>: [              1Dh] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [               6h] = net_fn[ 6b]
>     <ip-address>: [              C8h] = checksum1[ 8b]
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [              32h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              3Ah] = cmd[ 8b]
>     <ip-address>: [               2h] = authentication_type[ 4b]
>     <ip-address>: [               0h] = reserved1[ 4b]
>     <ip-address>: [               3h] = maximum_privilege_level[ 4b]
>     <ip-address>: [               0h] = reserved2[ 4b]
>     <ip-address>: [  BYTE ARRAY ... ] = challenge_string[16B]
>     <ip-address>: [ 1Bh E8h E7h 8Dh 76h 5Ah 2Eh 63h ]
>     <ip-address>: [ 33h 9Fh C9h 9Ah 66h 32h 0Dh B7h ]
>     <ip-address>: [         6A5AC49h] =
> initial_outbound_sequence_number[32b]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              6Fh] = checksum2[ 8b]
>     <ip-address>:
> =====================================================
>     <ip-address>: IPMI 1.5 Activiate Session Response
>     <ip-address>:
> =====================================================
>     <ip-address>: RMCP Header:
>     <ip-address>: ------------
>     <ip-address>: [               6h] = version[ 8b]
>     <ip-address>: [               0h] = reserved[ 8b]
>     <ip-address>: [              FFh] = sequence_number[ 8b]
>     <ip-address>: [               7h] = message_class.class[ 5b]
>     <ip-address>: [               0h] = message_class.reserved[ 2b]
>     <ip-address>: [               0h] = message_class.ack[ 1b]
>     <ip-address>: IPMI Session Header:
>     <ip-address>: --------------------
>     <ip-address>: [               2h] = authentication_type[ 8b]
>     <ip-address>: [               0h] = session_sequence_number[32b]
>     <ip-address>: [        4DF527F8h] = session_id[32b]
>     <ip-address>: [  BYTE ARRAY ... ] = authentication_code[16B]
>     <ip-address>: [ 51h C6h 11h 08h 55h 50h B1h 12h ]
>     <ip-address>: [ C2h 42h 9Eh 06h 9Dh 9Ch ADh 61h ]
>     <ip-address>: [               8h] = ipmi_msg_len[ 8b]
>     <ip-address>: IPMI Message Header:
>     <ip-address>: --------------------
>     <ip-address>: [              81h] = rq_addr[ 8b]
>     <ip-address>: [               0h] = rq_lun[ 2b]
>     <ip-address>: [               7h] = net_fn[ 6b]
>     <ip-address>: [              63h] = checksum1[ 8b]
>     <ip-address>: [              20h] = rs_addr[ 8b]
>     <ip-address>: [               0h] = rs_lun[ 2b]
>     <ip-address>: [              32h] = rq_seq[ 6b]
>     <ip-address>: IPMI Command Data:
>     <ip-address>: ------------------
>     <ip-address>: [              3Ah] = cmd[ 8b]
>     <ip-address>: [              CCh] = comp_code[ 8b]
>     <ip-address>: IPMI Trailer:
>     <ip-address>: --------------
>     <ip-address>: [              12h] = checksum2[ 8b]
>     ipmi_ctx_open_outofband: bad completion code: request
> data/parameter invalid
> 
> I tried different workaround settings or authorization methods but
> can't get any working config. Web-access of these IPMI interfaces
> works as expected.
> Thanks for any advice on this problem.
> 
> Alex -- Alexander Warschun 
> Systemadministration 

-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]