Hi, i've set up SOL on a SuperMicro H8SSL-I2 with an AOC-1UIPMI-B. It initially just worked but after a day without power, SOL doesn't want's to work anymore. I do ``sol activate'', it connects without an error and that's just it and sits there until i close the session. Normally i should get the login prompt from the operating system (which worked before when SOL didn't hang).
I see one single character on reboot of the machine though, and when i close the session the command fails: $ ipmitool -I lanplus -H 10.10.0.99 -U root -f root.pw sol activate [SOL Session operational. Use ~? for help] รพ~. [terminated ipmitool] Close Session command failed: Unknown (0x80) Is there something i'm missing here? Details of the setup below. Kind regards, Simon BIOS settings: * *************************************************** * * Remote Access [Enabled] * * * * Serial port number [COM2] * * Base Address, IRQ [2F8h, 3] * * Serial Port Mode [19200 8,n,1] * * Flow Control [None] * * Redirection After BIOS POST [Always] * * Terminal Type [ANSI] * * VT-UTF8 Combo Key Support [Enabled] * * Sredir Memory Display Delay [Delay 1 Sec] * * * * *************************************************** * IPMI settings: # sol info 1 Info: SOL parameter 'Payload Channel (7)' not supported - defaulting to 0x01 Set in progress : set-complete Enabled : true Force Encryption : true Force Authentication : true Privilege Level : ADMINISTRATOR Character Accumulate Level (ms) : 50 Character Send Threshold : 100 Retry Count : 7 Retry Interval (ms) : 500 Volatile Bit Rate (kbps) : 19.2 Non-Volatile Bit Rate (kbps) : 19.2 Payload Channel : 1 (0x01) Payload Port : 623 # user list ID Name Callin Link Auth IPMI Msg Channel Priv Limit 2 ADMIN true true true ADMINISTRATOR 3 root true true true ADMINISTRATOR # channel info 1 Channel 0x1 info: Channel Medium Type : 802.3 LAN Channel Protocol Type : IPMB-1.0 Session Support : multi-session Active Session Count : 1 Protocol Vendor ID : 7154 Volatile(active) Settings Alerting : enabled Per-message Auth : enabled User Level Auth : enabled Access Mode : always available Non-Volatile Settings Alerting : enabled Per-message Auth : enabled User Level Auth : enabled Access Mode : always available # channel getaccess 1 3 Maximum User IDs : 10 Enabled User IDs : 2 User ID : 3 User Name : root Fixed Name : No Access Available : call-in / callback Link Authentication : enabled IPMI Messaging : enabled Privilege Level : ADMINISTRATOR # sol info 1 Set in progress : set-complete Enabled : true Force Encryption : true Force Authentication : true Privilege Level : ADMINISTRATOR Character Accumulate Level (ms) : 50 Character Send Threshold : 100 Retry Count : 7 Retry Interval (ms) : 500 Volatile Bit Rate (kbps) : 19.2 Non-Volatile Bit Rate (kbps) : 19.2 Payload Channel : 1 (0x01) Payload Port : 623 # sol payload status 1 3 User 3 on channel 1 is enabled # lan print 1 Set in Progress : Set Complete Auth Type Support : NONE MD2 MD5 PASSWORD Auth Type Enable : Callback : MD5 PASSWORD : User : MD5 PASSWORD : Operator : MD5 PASSWORD : Admin : MD5 PASSWORD : OEM : MD2 MD5 PASSWORD IP Address Source : Static Address IP Address : 10.10.0.99 Subnet Mask : 255.255.255.0 MAC Address : 00:30:48:d1:1a:2a SNMP Community String : G1VjdpQxtAiNvL42 IP Header : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10 BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Enabled Gratituous ARP Intrvl : 2.0 seconds Default Gateway IP : 10.10.0.8 Default Gateway MAC : 00:0d:b9:05:c3:a6 Backup Gateway IP : 0.0.0.0 Backup Gateway MAC : 00:00:00:00:00:00 802.1q VLAN ID : Disabled 802.1q VLAN Priority : 0 RMCP+ Cipher Suites : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14 Cipher Suite Priv Max : Xaaaaaaaaaaaaaa : X=Cipher Suite Unused : c=CALLBACK : u=USER : o=OPERATOR : a=ADMIN : O=OEM # sol session where i press ENTER once and disconnect after it $ ipmitool -I lanplus -H 10.10.0.99 -U root -f root.pw -vv sol activate IPMI LAN host 10.10.0.99 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 >> SENDING AN OPEN SESSION REQUEST <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : admin << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x02007200 << Negotiated authenticatin algorithm : hmac_sha1 << Negotiated integrity algorithm : hmac_sha1_96 << Negotiated encryption algorithm : aes_cbc_128 >> Console generated random number (16 bytes) af fc 5c 70 ab 22 33 0e af 75 c6 f5 3a ca 3f 19 >> SENDING A RAKP 1 MESSAGE <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x5a4a28d09a8a69a0cebe9b4909f9d76e << BMC GUID : 0x20000e45027f78080000000000000000 << Key exchange auth code [sha1] : 0x7af1e75e7b01a7da21562479d27d452da1d58736 session integrity key input (38 bytes) af fc 5c 70 ab 22 33 0e af 75 c6 f5 3a ca 3f 19 5a 4a 28 d0 9a 8a 69 a0 ce be 9b 49 09 f9 d7 6e 14 04 72 6f 6f 74 Generated session integrity key (20 bytes) 5c d6 34 13 2c 3c 12 3c 1f 56 3d 93 67 e1 00 68 b3 48 c0 f5 Generated K1 (20 bytes) 3e cc 87 0f 74 68 fc 9b d4 2d 1d 92 3a 53 96 dd 8e 19 64 32 Generated K2 (20 bytes) 38 b3 ec 8a 73 66 eb e2 02 64 c8 e9 c1 7f c3 05 be b3 48 55 >> SENDING A RAKP 3 MESSAGE <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code [sha1] : 0x8620f3eb654747d8e6168be8 IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 [SOL Session operational. Use ~? for help] >> SENDING A SOL MESSAGE >>>>>>>>>> SENDING TO BMC >>>>>>>>>> > SOL sequence number : 0x01 > SOL acked packet : 0x00 > SOL accepted char count : 0x00 > SOL is nack : false > SOL assert ring wor : false > SOL generate break : false > SOL deassert cts : false > SOL deassert dcd dsr : false > SOL flush inbound : false > SOL flush outbound : false > SOL character count : 1 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >> SENDING A SOL MESSAGE >>>>>>>>>> SENDING TO BMC >>>>>>>>>> > SOL sequence number : 0x01 > SOL acked packet : 0x00 > SOL accepted char count : 0x00 > SOL is nack : false > SOL assert ring wor : false > SOL generate break : false > SOL deassert cts : false > SOL deassert dcd dsr : false > SOL flush inbound : false > SOL flush outbound : false > SOL character count : 1 >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> <<<<<<<<<< RECV FROM BMC <<<<<<<<<<< < SOL sequence number : 0x00 < SOL acked packet : 0x01 < SOL accepted char count : 0x00 < SOL is nack : true < SOL xfer unavailable : false < SOL inactive : false < SOL transmit overrun : false < SOL break detected : false <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< ~. [terminated ipmitool] >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x49 >> data : 0x01 0x01 0x00 0x00 0x00 0x00 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x49 >> data : 0x01 0x01 0x00 0x00 0x00 0x00 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0x00 0x72 0x00 0x02 Closed Session 02007200 ------------------------------------------------------------------------------ Crystal Reports - New Free Runtime and 30 Day Trial Check out the new simplified licensing option that enables unlimited royalty-free distribution of the report engine for externally facing server and web deployment. http://p.sf.net/sfu/businessobjects _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel