Hi,
i've set up SOL on a SuperMicro H8SSL-I2 with an AOC-1UIPMI-B.
It initially just worked but after a day without power, SOL doesn't
want's to work anymore.  I do ``sol activate'', it connects without
an error and that's just it and sits there until i close the session.
Normally i should get the login prompt from the operating system (which
worked before when SOL didn't hang).

I see one single character on reboot of the machine though, and when i
close the session the command fails:

$ ipmitool -I lanplus -H 10.10.0.99 -U root -f root.pw sol activate 
[SOL Session operational.  Use ~? for help]
รพ~. [terminated ipmitool]
Close Session command failed: Unknown (0x80)

Is there something i'm missing here?  Details of the setup below.

Kind regards,
Simon

BIOS settings:
* *************************************************** *
* Remote Access                  [Enabled]            *
*                                                     *
* Serial port number             [COM2]               *
*      Base Address, IRQ         [2F8h, 3]            *
* Serial Port Mode               [19200 8,n,1]        *
* Flow Control                   [None]               *
* Redirection After BIOS POST    [Always]             *
* Terminal Type                  [ANSI]               *
* VT-UTF8 Combo Key Support      [Enabled]            *
* Sredir Memory Display Delay    [Delay 1 Sec]        *
*                                                     *
* *************************************************** *

IPMI settings:

# sol info 1
Info: SOL parameter 'Payload Channel (7)' not supported - defaulting to 0x01
Set in progress                 : set-complete
Enabled                         : true
Force Encryption                : true
Force Authentication            : true
Privilege Level                 : ADMINISTRATOR
Character Accumulate Level (ms) : 50
Character Send Threshold        : 100
Retry Count                     : 7
Retry Interval (ms)             : 500
Volatile Bit Rate (kbps)        : 19.2
Non-Volatile Bit Rate (kbps)    : 19.2
Payload Channel                 : 1 (0x01)
Payload Port                    : 623

# user list
ID  Name             Callin  Link Auth  IPMI Msg   Channel Priv Limit
2   ADMIN            true    true       true       ADMINISTRATOR
3   root             true    true       true       ADMINISTRATOR

# channel info 1
Channel 0x1 info:
  Channel Medium Type   : 802.3 LAN
  Channel Protocol Type : IPMB-1.0
  Session Support       : multi-session
  Active Session Count  : 1
  Protocol Vendor ID    : 7154
  Volatile(active) Settings
    Alerting            : enabled
    Per-message Auth    : enabled
    User Level Auth     : enabled
    Access Mode         : always available
  Non-Volatile Settings
    Alerting            : enabled
    Per-message Auth    : enabled
    User Level Auth     : enabled
    Access Mode         : always available

# channel getaccess 1 3
Maximum User IDs     : 10
Enabled User IDs     : 2

User ID              : 3
User Name            : root
Fixed Name           : No
Access Available     : call-in / callback
Link Authentication  : enabled
IPMI Messaging       : enabled
Privilege Level      : ADMINISTRATOR

# sol info 1
Set in progress                 : set-complete
Enabled                         : true
Force Encryption                : true
Force Authentication            : true
Privilege Level                 : ADMINISTRATOR
Character Accumulate Level (ms) : 50
Character Send Threshold        : 100
Retry Count                     : 7
Retry Interval (ms)             : 500
Volatile Bit Rate (kbps)        : 19.2
Non-Volatile Bit Rate (kbps)    : 19.2
Payload Channel                 : 1 (0x01)
Payload Port                    : 623

# sol payload status 1 3
User 3 on channel 1 is enabled

# lan print 1
Set in Progress         : Set Complete
Auth Type Support       : NONE MD2 MD5 PASSWORD 
Auth Type Enable        : Callback : MD5 PASSWORD 
                        : User     : MD5 PASSWORD 
                        : Operator : MD5 PASSWORD 
                        : Admin    : MD5 PASSWORD 
                        : OEM      : MD2 MD5 PASSWORD 
IP Address Source       : Static Address
IP Address              : 10.10.0.99
Subnet Mask             : 255.255.255.0
MAC Address             : 00:30:48:d1:1a:2a
SNMP Community String   : G1VjdpQxtAiNvL42
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Enabled
Gratituous ARP Intrvl   : 2.0 seconds
Default Gateway IP      : 10.10.0.8
Default Gateway MAC     : 00:0d:b9:05:c3:a6
Backup Gateway IP       : 0.0.0.0
Backup Gateway MAC      : 00:00:00:00:00:00
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14
Cipher Suite Priv Max   : Xaaaaaaaaaaaaaa
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM


# sol session where i press ENTER once and disconnect after it

$ ipmitool -I lanplus -H 10.10.0.99 -U root -f root.pw -vv sol activate 
IPMI LAN host 10.10.0.99 port 623

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04 

>> SENDING AN OPEN SESSION REQUEST

<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : admin
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x02007200
<<  Negotiated authenticatin algorithm : hmac_sha1
<<  Negotiated integrity algorithm     : hmac_sha1_96
<<  Negotiated encryption algorithm    : aes_cbc_128

>> Console generated random number (16 bytes)
 af fc 5c 70 ab 22 33 0e af 75 c6 f5 3a ca 3f 19
>> SENDING A RAKP 1 MESSAGE

<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0x5a4a28d09a8a69a0cebe9b4909f9d76e
<<  BMC GUID                      : 0x20000e45027f78080000000000000000
<<  Key exchange auth code [sha1] : 0x7af1e75e7b01a7da21562479d27d452da1d58736

session integrity key input (38 bytes)
 af fc 5c 70 ab 22 33 0e af 75 c6 f5 3a ca 3f 19
 5a 4a 28 d0 9a 8a 69 a0 ce be 9b 49 09 f9 d7 6e
 14 04 72 6f 6f 74
Generated session integrity key (20 bytes)
 5c d6 34 13 2c 3c 12 3c 1f 56 3d 93 67 e1 00 68
 b3 48 c0 f5
Generated K1 (20 bytes)
 3e cc 87 0f 74 68 fc 9b d4 2d 1d 92 3a 53 96 dd
 8e 19 64 32
Generated K2 (20 bytes)
 38 b3 ec 8a 73 66 eb e2 02 64 c8 e9 c1 7f c3 05
 be b3 48 55
>> SENDING A RAKP 3 MESSAGE

<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code [sha1] : 0x8620f3eb654747d8e6168be8

IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x04 

Set Session Privilege Level to ADMINISTRATOR


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x48
>>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00 


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x48
>>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00 

[SOL Session operational.  Use ~? for help]
>> SENDING A SOL MESSAGE

>>>>>>>>>> SENDING TO BMC >>>>>>>>>>
> SOL sequence number     : 0x01
> SOL acked packet        : 0x00
> SOL accepted char count : 0x00
> SOL is nack             : false
> SOL assert ring wor     : false
> SOL generate break      : false
> SOL deassert cts        : false
> SOL deassert dcd dsr    : false
> SOL flush inbound       : false
> SOL flush outbound      : false
> SOL character count     : 1
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>> SENDING A SOL MESSAGE

>>>>>>>>>> SENDING TO BMC >>>>>>>>>>
> SOL sequence number     : 0x01
> SOL acked packet        : 0x00
> SOL accepted char count : 0x00
> SOL is nack             : false
> SOL assert ring wor     : false
> SOL generate break      : false
> SOL deassert cts        : false
> SOL deassert dcd dsr    : false
> SOL flush inbound       : false
> SOL flush outbound      : false
> SOL character count     : 1
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
<<<<<<<<<< RECV FROM BMC <<<<<<<<<<<
< SOL sequence number     : 0x00
< SOL acked packet        : 0x01
< SOL accepted char count : 0x00
< SOL is nack             : true
< SOL xfer unavailable    : false
< SOL inactive            : false
< SOL transmit overrun    : false
< SOL break detected      : false
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
~. [terminated ipmitool]

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x49
>>    data    : 0x01 0x01 0x00 0x00 0x00 0x00 


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x49
>>    data    : 0x01 0x01 0x00 0x00 0x00 0x00 


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0x00 0x72 0x00 0x02 

Closed Session 02007200


------------------------------------------------------------------------------
Crystal Reports - New Free Runtime and 30 Day Trial
Check out the new simplified licensing option that enables unlimited
royalty-free distribution of the report engine for externally facing 
server and web deployment.
http://p.sf.net/sfu/businessobjects
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to