Created
August 17, 2022 08:47
-
-
Save KunYi/ca6b2081d3f37a0d64bb1462d369512e to your computer and use it in GitHub Desktop.
ipmitool debug information
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| kunyi@kunyi-ThinkPad-P53:~/$ ipmitool -I lanplus -p 2623 -C 17 -H 127.0.0.1 -vvv -U root -P 0penBmc mc info | |
| >> Sending IPMI command payload | |
| >> netfn : 0x06 | |
| >> command : 0x38 | |
| >> data : 0x8e 0x04 | |
| BUILDING A v1.5 COMMAND | |
| >> IPMI Request Session Header | |
| >> Authtype : NONE | |
| >> Sequence : 0x00000000 | |
| >> Session ID : 0x00000000 | |
| >> IPMI Request Message Header | |
| >> Rs Addr : 20 | |
| >> NetFn : 06 | |
| >> Rs LUN : 0 | |
| >> Rq Addr : 81 | |
| >> Rq Seq : 00 | |
| >> Rq Lun : 0 | |
| >> Command : 38 | |
| << IPMI Response Session Header | |
| << Authtype : NONE | |
| << Payload type : IPMI (0) | |
| << Session ID : 0x00000000 | |
| << Sequence : 0x00000000 | |
| << IPMI Msg/Payload Length : 16 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 07 | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 00 | |
| << Rs Lun : 0 | |
| << Command : 38 | |
| << Compl Code : 0x00 | |
| >> SENDING AN OPEN SESSION REQUEST | |
| <<OPEN SESSION RESPONSE | |
| << Message tag : 0x00 | |
| << RMCP+ status : no errors | |
| << Maximum privilege level : admin | |
| << Console Session ID : 0xa0a2a3a4 | |
| << BMC Session ID : 0x1a6acfe5 | |
| << Negotiated authenticatin algorithm : hmac_sha256 | |
| << Negotiated integrity algorithm : sha256_128 | |
| << Negotiated encryption algorithm : aes_cbc_128 | |
| >> Console generated random number (16 bytes) | |
| ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2 | |
| >> SENDING A RAKP 1 MESSAGE | |
| <<RAKP 2 MESSAGE | |
| << Message tag : 0x00 | |
| << RMCP+ status : no errors | |
| << Console Session ID : 0xa0a2a3a4 | |
| << BMC random number : 0xebd85eced6b68f4e846c855dae328c91 | |
| << BMC GUID : 0x0102030405060708090a0b0c0d0e0f10 | |
| << Key exchange auth code [sha256]: 0xccfd901f11332166f06d6804a276d8f203364271a31f6b2b89cf97aea1a1393d | |
| bmc_rand (16 bytes) | |
| eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91 | |
| >> rakp2 mac input buffer (62 bytes) | |
| a4 a3 a2 a0 e5 cf 6a 1a ad 29 3d bf ef f0 21 87 | |
| 30 04 c3 3d 9d ea bb b2 eb d8 5e ce d6 b6 8f 4e | |
| 84 6c 85 5d ae 32 8c 91 01 02 03 04 05 06 07 08 | |
| 09 0a 0b 0c 0d 0e 0f 10 14 04 72 6f 6f 74 | |
| >> rakp2 mac key (20 bytes) | |
| 30 70 65 6e 42 6d 63 00 00 00 00 00 00 00 00 00 | |
| 00 00 00 00 | |
| >> rakp2 mac as computed by the remote console (32 bytes) | |
| cc fd 90 1f 11 33 21 66 f0 6d 68 04 a2 76 d8 f2 | |
| 03 36 42 71 a3 1f 6b 2b 89 cf 97 ae a1 a1 39 3d | |
| >> rakp3 mac input buffer (26 bytes) | |
| eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91 | |
| a4 a3 a2 a0 14 04 72 6f 6f 74 | |
| >> rakp3 mac key (20 bytes) | |
| 30 70 65 6e 42 6d 63 00 00 00 00 00 00 00 00 00 | |
| 00 00 00 00 | |
| generated rakp3 mac (32 bytes) | |
| 60 f5 68 6d eb a6 e8 63 0a c9 a5 76 c9 fb de 9e | |
| ae bd 12 1c 62 5d 7c 8f 52 4f 30 25 8f 10 7a ec | |
| session integrity key input (38 bytes) | |
| ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2 | |
| eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91 | |
| 14 04 72 6f 6f 74 | |
| Generated session integrity key (32 bytes) | |
| 66 35 fc 57 e7 f1 f3 e4 cc 32 e9 02 b8 1d b2 c1 | |
| 29 a7 71 82 53 2e 10 9d 42 47 88 68 7e 42 4d 93 | |
| Generated K1 (32 bytes) | |
| cf 1a 40 f8 bd 0b fa 3c 90 f7 9d e3 28 d7 2f cf | |
| df 20 25 e3 36 0c 1b 2d 87 04 a6 b9 ba 31 b2 29 | |
| Generated K2 (32 bytes) | |
| 4f b7 64 d5 a4 92 63 a1 9c 06 7a 53 6f 66 d5 c6 | |
| 40 8f f9 a3 9f c5 c5 16 e5 d4 3a 16 f5 f1 a5 dd | |
| >> SENDING A RAKP 3 MESSAGE | |
| <<RAKP 4 MESSAGE | |
| << Message tag : 0x00 | |
| << RMCP+ status : no errors | |
| << Console Session ID : 0xa0a2a3a4 | |
| << Key exchange auth code [sha256]: 0xf8838ffb8b70cdad558325a8db848e91 | |
| >> rakp4 mac input buffer (36 bytes) | |
| ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2 | |
| e5 cf 6a 1a 01 02 03 04 05 06 07 08 09 0a 0b 0c | |
| 0d 0e 0f 10 | |
| >> rakp4 mac key (sik) (32 bytes) | |
| 66 35 fc 57 e7 f1 f3 e4 cc 32 e9 02 b8 1d b2 c1 | |
| 29 a7 71 82 53 2e 10 9d 42 47 88 68 7e 42 4d 93 | |
| >> rakp4 mac as computed by the BMC (32 bytes) | |
| f8 83 8f fb 8b 70 cd ad 55 83 25 a8 db 84 8e 91 | |
| 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 | |
| >> rakp4 mac as computed by the remote console (32 bytes) | |
| f8 83 8f fb 8b 70 cd ad 55 83 25 a8 db 84 8e 91 | |
| 2c 3a 20 79 c5 9c 5a c0 5e 5d 5f d6 75 a3 44 6e | |
| IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY | |
| >> Sending IPMI command payload | |
| >> netfn : 0x06 | |
| >> command : 0x3b | |
| >> data : 0x04 | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 | |
| >> Initialization vector (16 bytes) | |
| 86 4e 75 1c 3d 09 78 39 7f 37 8a 3e 1e f9 cd b7 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 03 00 00 00 20 00 86 4e 75 1c | |
| 3d 09 78 39 7f 37 8a 3e 1e f9 cd b7 8f 18 f9 6b | |
| c3 7d 5b c8 d8 53 c3 9d f1 53 b3 cc ff ff 02 07 | |
| authcode output (16 bytes) | |
| c0 0b f6 91 db b8 40 a5 5b 97 ce 3c b8 2d e7 ea | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000001 | |
| << IPMI Msg/Payload Length : 32 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 07 | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 01 | |
| << Rs Lun : 0 | |
| << Command : 3b | |
| << Compl Code : 0x00 | |
| set_session_privlvl (1 bytes) | |
| 04 | |
| Set Session Privilege Level to ADMINISTRATOR | |
| >> Sending IPMI command payload | |
| >> netfn : 0x2c | |
| >> command : 0x3e | |
| >> data : 0x00 0x02 | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 | |
| >> Initialization vector (16 bytes) | |
| d4 06 21 de 8e 20 ca 41 bb 14 b8 a7 d3 96 18 17 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 04 00 00 00 20 00 d4 06 21 de | |
| 8e 20 ca 41 bb 14 b8 a7 d3 96 18 17 f2 c7 93 86 | |
| d1 06 da 43 7e 0e b1 58 00 ab e9 58 ff ff 02 07 | |
| authcode output (16 bytes) | |
| d2 e3 c8 7c 43 4e 12 28 27 b1 43 c4 f6 88 dc 3e | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000002 | |
| << IPMI Msg/Payload Length : 32 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 2d | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 02 | |
| << Rs Lun : 0 | |
| << Command : 3e | |
| << Compl Code : 0xc1 | |
| IPM Controller is not HPM.2 compatible | |
| >> Sending IPMI command payload | |
| >> netfn : 0x06 | |
| >> command : 0x01 | |
| >> data : | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 | |
| >> Initialization vector (16 bytes) | |
| d0 9c eb 77 ab 18 42 31 7d eb 11 1b 56 6d d3 ed | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 05 00 00 00 20 00 d0 9c eb 77 | |
| ab 18 42 31 7d eb 11 1b 56 6d d3 ed e7 58 01 4f | |
| 82 03 c0 aa 72 9c c4 4c 21 9d cc cd ff ff 02 07 | |
| authcode output (16 bytes) | |
| 25 1c 57 e8 04 d7 a4 39 95 26 91 fe 46 76 21 da | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000003 | |
| << IPMI Msg/Payload Length : 48 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 07 | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 03 | |
| << Rs Lun : 0 | |
| << Command : 01 | |
| << Compl Code : 0x00 | |
| Iana: 0 | |
| Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20 | |
| >> Sending IPMI command payload | |
| >> netfn : 0x2c | |
| >> command : 0x00 | |
| >> data : 0x00 | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 | |
| >> Initialization vector (16 bytes) | |
| 2f 18 33 99 79 93 18 80 07 b0 96 ac ea 44 6e c0 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 06 00 00 00 20 00 2f 18 33 99 | |
| 79 93 18 80 07 b0 96 ac ea 44 6e c0 a0 98 e1 de | |
| c2 2c 04 66 c3 a1 11 4a 21 f1 a8 c4 ff ff 02 07 | |
| authcode output (16 bytes) | |
| 25 a0 68 d9 63 f9 62 15 f0 02 5a 5f 2e 41 6a a0 | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000004 | |
| << IPMI Msg/Payload Length : 32 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 2d | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 04 | |
| << Rs Lun : 0 | |
| << Command : 00 | |
| << Compl Code : 0xc1 | |
| Error response 0xc1 from Get PICMG Properities | |
| Running Get VSO Capabilities my_addr 0x20, transit 0, target 0x20 | |
| >> Sending IPMI command payload | |
| >> netfn : 0x2c | |
| >> command : 0x00 | |
| >> data : 0x03 | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 | |
| >> Initialization vector (16 bytes) | |
| d6 e1 6f 28 f8 e5 4a 5f bb 09 02 5d a0 a3 0f d2 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 07 00 00 00 20 00 d6 e1 6f 28 | |
| f8 e5 4a 5f bb 09 02 5d a0 a3 0f d2 77 8b bb 71 | |
| 36 04 c3 e2 90 8a fe 5d 9c bb 79 24 ff ff 02 07 | |
| authcode output (16 bytes) | |
| 72 dd 2b 8e d4 59 2e 71 92 43 85 5f 63 54 69 eb | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000005 | |
| << IPMI Msg/Payload Length : 32 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 2d | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 05 | |
| << Rs Lun : 0 | |
| << Command : 00 | |
| << Compl Code : 0xc1 | |
| Invalid completion code received: Invalid command | |
| Acquire IPMB address | |
| Discovered IPMB address 0x0 | |
| Interface address: my_addr 0x20 transit 0:0 target 0x20:0 ipmb_target 0 | |
| >> Sending IPMI command payload | |
| >> netfn : 0x06 | |
| >> command : 0x01 | |
| >> data : | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1 | |
| >> Initialization vector (16 bytes) | |
| b3 95 9e 05 c8 7e 49 44 ff be 35 8a a7 0d f1 59 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 08 00 00 00 20 00 b3 95 9e 05 | |
| c8 7e 49 44 ff be 35 8a a7 0d f1 59 62 98 88 c4 | |
| ac 94 29 5d c5 d8 f5 a8 6a 8a 17 8f ff ff 02 07 | |
| authcode output (16 bytes) | |
| b0 69 fc 16 6f db 35 36 b7 ba 61 6f e4 b8 66 02 | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000006 | |
| << IPMI Msg/Payload Length : 48 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 07 | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 06 | |
| << Rs Lun : 0 | |
| << Command : 01 | |
| << Compl Code : 0x00 | |
| Device ID : 0 | |
| Device Revision : 0 | |
| Firmware Revision : 2.17 | |
| IPMI Version : 2.0 | |
| Manufacturer ID : 0 | |
| Manufacturer Name : Unknown | |
| Product ID : 0 (0x0000) | |
| Product Name : Unknown (0x0) | |
| Device Available : yes | |
| Provides Device SDRs : yes | |
| Additional Device Support : | |
| Sensor Device | |
| SEL Device | |
| FRU Inventory Device | |
| Chassis Device | |
| Aux Firmware Rev Info : | |
| 0x00 | |
| 0x00 | |
| 0x00 | |
| 0x00 | |
| >> Sending IPMI command payload | |
| >> netfn : 0x06 | |
| >> command : 0x3c | |
| >> data : 0xe5 0xcf 0x6a 0x1a | |
| BUILDING A v2 COMMAND | |
| Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0 | |
| >> Initialization vector (16 bytes) | |
| da 80 51 6c b3 48 5a 90 62 b9 15 27 ec 6d 15 e0 | |
| authcode input (48 bytes) | |
| 06 c0 e5 cf 6a 1a 09 00 00 00 20 00 da 80 51 6c | |
| b3 48 5a 90 62 b9 15 27 ec 6d 15 e0 a8 8f b9 af | |
| 75 20 6f 64 6a a3 22 2a 74 9e be b6 ff ff 02 07 | |
| authcode output (16 bytes) | |
| 28 a9 0c 60 56 f8 ac a5 40 a9 f9 58 c4 61 1f 2e | |
| << IPMI Response Session Header | |
| << Authtype : RMCP+ | |
| << Payload type : IPMI (0) | |
| << Session ID : 0xa0a2a3a4 | |
| << Sequence : 0x00000007 | |
| << IPMI Msg/Payload Length : 32 | |
| << IPMI Response Message Header | |
| << Rq Addr : 81 | |
| << NetFn : 07 | |
| << Rq LUN : 0 | |
| << Rs Addr : 20 | |
| << Rq Seq : 07 | |
| << Rs Lun : 0 | |
| << Command : 3c | |
| << Compl Code : 0x00 | |
| Closed Session 1a6acfe5 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment