Skip to content

Instantly share code, notes, and snippets.

@KunYi
Created August 17, 2022 08:47
Show Gist options
  • Select an option

  • Save KunYi/ca6b2081d3f37a0d64bb1462d369512e to your computer and use it in GitHub Desktop.

Select an option

Save KunYi/ca6b2081d3f37a0d64bb1462d369512e to your computer and use it in GitHub Desktop.
ipmitool debug information
kunyi@kunyi-ThinkPad-P53:~/$ ipmitool -I lanplus -p 2623 -C 17 -H 127.0.0.1 -vvv -U root -P 0penBmc mc info
>> Sending IPMI command payload
>> netfn : 0x06
>> command : 0x38
>> data : 0x8e 0x04
BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>> Authtype : NONE
>> Sequence : 0x00000000
>> Session ID : 0x00000000
>> IPMI Request Message Header
>> Rs Addr : 20
>> NetFn : 06
>> Rs LUN : 0
>> Rq Addr : 81
>> Rq Seq : 00
>> Rq Lun : 0
>> Command : 38
<< IPMI Response Session Header
<< Authtype : NONE
<< Payload type : IPMI (0)
<< Session ID : 0x00000000
<< Sequence : 0x00000000
<< IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 00
<< Rs Lun : 0
<< Command : 38
<< Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST
<<OPEN SESSION RESPONSE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Maximum privilege level : admin
<< Console Session ID : 0xa0a2a3a4
<< BMC Session ID : 0x1a6acfe5
<< Negotiated authenticatin algorithm : hmac_sha256
<< Negotiated integrity algorithm : sha256_128
<< Negotiated encryption algorithm : aes_cbc_128
>> Console generated random number (16 bytes)
ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2
>> SENDING A RAKP 1 MESSAGE
<<RAKP 2 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< BMC random number : 0xebd85eced6b68f4e846c855dae328c91
<< BMC GUID : 0x0102030405060708090a0b0c0d0e0f10
<< Key exchange auth code [sha256]: 0xccfd901f11332166f06d6804a276d8f203364271a31f6b2b89cf97aea1a1393d
bmc_rand (16 bytes)
eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91
>> rakp2 mac input buffer (62 bytes)
a4 a3 a2 a0 e5 cf 6a 1a ad 29 3d bf ef f0 21 87
30 04 c3 3d 9d ea bb b2 eb d8 5e ce d6 b6 8f 4e
84 6c 85 5d ae 32 8c 91 01 02 03 04 05 06 07 08
09 0a 0b 0c 0d 0e 0f 10 14 04 72 6f 6f 74
>> rakp2 mac key (20 bytes)
30 70 65 6e 42 6d 63 00 00 00 00 00 00 00 00 00
00 00 00 00
>> rakp2 mac as computed by the remote console (32 bytes)
cc fd 90 1f 11 33 21 66 f0 6d 68 04 a2 76 d8 f2
03 36 42 71 a3 1f 6b 2b 89 cf 97 ae a1 a1 39 3d
>> rakp3 mac input buffer (26 bytes)
eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91
a4 a3 a2 a0 14 04 72 6f 6f 74
>> rakp3 mac key (20 bytes)
30 70 65 6e 42 6d 63 00 00 00 00 00 00 00 00 00
00 00 00 00
generated rakp3 mac (32 bytes)
60 f5 68 6d eb a6 e8 63 0a c9 a5 76 c9 fb de 9e
ae bd 12 1c 62 5d 7c 8f 52 4f 30 25 8f 10 7a ec
session integrity key input (38 bytes)
ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2
eb d8 5e ce d6 b6 8f 4e 84 6c 85 5d ae 32 8c 91
14 04 72 6f 6f 74
Generated session integrity key (32 bytes)
66 35 fc 57 e7 f1 f3 e4 cc 32 e9 02 b8 1d b2 c1
29 a7 71 82 53 2e 10 9d 42 47 88 68 7e 42 4d 93
Generated K1 (32 bytes)
cf 1a 40 f8 bd 0b fa 3c 90 f7 9d e3 28 d7 2f cf
df 20 25 e3 36 0c 1b 2d 87 04 a6 b9 ba 31 b2 29
Generated K2 (32 bytes)
4f b7 64 d5 a4 92 63 a1 9c 06 7a 53 6f 66 d5 c6
40 8f f9 a3 9f c5 c5 16 e5 d4 3a 16 f5 f1 a5 dd
>> SENDING A RAKP 3 MESSAGE
<<RAKP 4 MESSAGE
<< Message tag : 0x00
<< RMCP+ status : no errors
<< Console Session ID : 0xa0a2a3a4
<< Key exchange auth code [sha256]: 0xf8838ffb8b70cdad558325a8db848e91
>> rakp4 mac input buffer (36 bytes)
ad 29 3d bf ef f0 21 87 30 04 c3 3d 9d ea bb b2
e5 cf 6a 1a 01 02 03 04 05 06 07 08 09 0a 0b 0c
0d 0e 0f 10
>> rakp4 mac key (sik) (32 bytes)
66 35 fc 57 e7 f1 f3 e4 cc 32 e9 02 b8 1d b2 c1
29 a7 71 82 53 2e 10 9d 42 47 88 68 7e 42 4d 93
>> rakp4 mac as computed by the BMC (32 bytes)
f8 83 8f fb 8b 70 cd ad 55 83 25 a8 db 84 8e 91
01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10
>> rakp4 mac as computed by the remote console (32 bytes)
f8 83 8f fb 8b 70 cd ad 55 83 25 a8 db 84 8e 91
2c 3a 20 79 c5 9c 5a c0 5e 5d 5f d6 75 a3 44 6e
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>> Sending IPMI command payload
>> netfn : 0x06
>> command : 0x3b
>> data : 0x04
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
86 4e 75 1c 3d 09 78 39 7f 37 8a 3e 1e f9 cd b7
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 03 00 00 00 20 00 86 4e 75 1c
3d 09 78 39 7f 37 8a 3e 1e f9 cd b7 8f 18 f9 6b
c3 7d 5b c8 d8 53 c3 9d f1 53 b3 cc ff ff 02 07
authcode output (16 bytes)
c0 0b f6 91 db b8 40 a5 5b 97 ce 3c b8 2d e7 ea
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000001
<< IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 01
<< Rs Lun : 0
<< Command : 3b
<< Compl Code : 0x00
set_session_privlvl (1 bytes)
04
Set Session Privilege Level to ADMINISTRATOR
>> Sending IPMI command payload
>> netfn : 0x2c
>> command : 0x3e
>> data : 0x00 0x02
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
d4 06 21 de 8e 20 ca 41 bb 14 b8 a7 d3 96 18 17
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 04 00 00 00 20 00 d4 06 21 de
8e 20 ca 41 bb 14 b8 a7 d3 96 18 17 f2 c7 93 86
d1 06 da 43 7e 0e b1 58 00 ab e9 58 ff ff 02 07
authcode output (16 bytes)
d2 e3 c8 7c 43 4e 12 28 27 b1 43 c4 f6 88 dc 3e
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000002
<< IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 2d
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 02
<< Rs Lun : 0
<< Command : 3e
<< Compl Code : 0xc1
IPM Controller is not HPM.2 compatible
>> Sending IPMI command payload
>> netfn : 0x06
>> command : 0x01
>> data :
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
d0 9c eb 77 ab 18 42 31 7d eb 11 1b 56 6d d3 ed
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 05 00 00 00 20 00 d0 9c eb 77
ab 18 42 31 7d eb 11 1b 56 6d d3 ed e7 58 01 4f
82 03 c0 aa 72 9c c4 4c 21 9d cc cd ff ff 02 07
authcode output (16 bytes)
25 1c 57 e8 04 d7 a4 39 95 26 91 fe 46 76 21 da
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000003
<< IPMI Msg/Payload Length : 48
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 03
<< Rs Lun : 0
<< Command : 01
<< Compl Code : 0x00
Iana: 0
Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20
>> Sending IPMI command payload
>> netfn : 0x2c
>> command : 0x00
>> data : 0x00
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
2f 18 33 99 79 93 18 80 07 b0 96 ac ea 44 6e c0
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 06 00 00 00 20 00 2f 18 33 99
79 93 18 80 07 b0 96 ac ea 44 6e c0 a0 98 e1 de
c2 2c 04 66 c3 a1 11 4a 21 f1 a8 c4 ff ff 02 07
authcode output (16 bytes)
25 a0 68 d9 63 f9 62 15 f0 02 5a 5f 2e 41 6a a0
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000004
<< IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 2d
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 04
<< Rs Lun : 0
<< Command : 00
<< Compl Code : 0xc1
Error response 0xc1 from Get PICMG Properities
Running Get VSO Capabilities my_addr 0x20, transit 0, target 0x20
>> Sending IPMI command payload
>> netfn : 0x2c
>> command : 0x00
>> data : 0x03
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
d6 e1 6f 28 f8 e5 4a 5f bb 09 02 5d a0 a3 0f d2
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 07 00 00 00 20 00 d6 e1 6f 28
f8 e5 4a 5f bb 09 02 5d a0 a3 0f d2 77 8b bb 71
36 04 c3 e2 90 8a fe 5d 9c bb 79 24 ff ff 02 07
authcode output (16 bytes)
72 dd 2b 8e d4 59 2e 71 92 43 85 5f 63 54 69 eb
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000005
<< IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 2d
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 05
<< Rs Lun : 0
<< Command : 00
<< Compl Code : 0xc1
Invalid completion code received: Invalid command
Acquire IPMB address
Discovered IPMB address 0x0
Interface address: my_addr 0x20 transit 0:0 target 0x20:0 ipmb_target 0
>> Sending IPMI command payload
>> netfn : 0x06
>> command : 0x01
>> data :
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 1
>> Initialization vector (16 bytes)
b3 95 9e 05 c8 7e 49 44 ff be 35 8a a7 0d f1 59
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 08 00 00 00 20 00 b3 95 9e 05
c8 7e 49 44 ff be 35 8a a7 0d f1 59 62 98 88 c4
ac 94 29 5d c5 d8 f5 a8 6a 8a 17 8f ff ff 02 07
authcode output (16 bytes)
b0 69 fc 16 6f db 35 36 b7 ba 61 6f e4 b8 66 02
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000006
<< IPMI Msg/Payload Length : 48
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 06
<< Rs Lun : 0
<< Command : 01
<< Compl Code : 0x00
Device ID : 0
Device Revision : 0
Firmware Revision : 2.17
IPMI Version : 2.0
Manufacturer ID : 0
Manufacturer Name : Unknown
Product ID : 0 (0x0000)
Product Name : Unknown (0x0)
Device Available : yes
Provides Device SDRs : yes
Additional Device Support :
Sensor Device
SEL Device
FRU Inventory Device
Chassis Device
Aux Firmware Rev Info :
0x00
0x00
0x00
0x00
>> Sending IPMI command payload
>> netfn : 0x06
>> command : 0x3c
>> data : 0xe5 0xcf 0x6a 0x1a
BUILDING A v2 COMMAND
Local RqAddr 0x20 transit 0:0 target 0x20:0 bridgePossible 0
>> Initialization vector (16 bytes)
da 80 51 6c b3 48 5a 90 62 b9 15 27 ec 6d 15 e0
authcode input (48 bytes)
06 c0 e5 cf 6a 1a 09 00 00 00 20 00 da 80 51 6c
b3 48 5a 90 62 b9 15 27 ec 6d 15 e0 a8 8f b9 af
75 20 6f 64 6a a3 22 2a 74 9e be b6 ff ff 02 07
authcode output (16 bytes)
28 a9 0c 60 56 f8 ac a5 40 a9 f9 58 c4 61 1f 2e
<< IPMI Response Session Header
<< Authtype : RMCP+
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000007
<< IPMI Msg/Payload Length : 32
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 07
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 07
<< Rs Lun : 0
<< Command : 3c
<< Compl Code : 0x00
Closed Session 1a6acfe5
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment