Hi Hank,
On Fri, 2011-01-21 at 14:02 -0800, Hank Bruning wrote:
> if your are using IPMI 2.0 RMCP sessions then you must use an OEM way
> to find which privilege level is assigned to an IPMI cipher suite.
> Often cipher suite 0 can not be used for Administrator or User roles.
> What you are asking is outside the spec. In my opinion the spec is
> faulty that a privilege level (admin, user, callback, etc)can not be
> queried for which cipher suites that are supported. This is a major
> fail for the IPMI spec.
> Our Retuli product implements a proprietary way to do this. It's not
> widely used.
Maybe I'm missing something from the conversation, but it isn't true
that an OEM way is required to find which privilege level is assigned to
a cipher suite. In Table 23-4 of the IPMI spec there is support for
this w/ "RMCP+ Messaging Cipher Suite Privilege Levels". I'm unsure if
this is supported in ipmitool, but it is in FreeIPMI.
> /usr/sbin/bmc-config --checkout --section=Rmcpplus_Conf_Privilege
Section Rmcpplus_Conf_Privilege
## Possible values:
Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_0 Unused
## Possible values:
Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_1 Unused
## Possible values:
Unused/User/Operator/Administrator/OEM_Proprietary
Maximum_Privilege_Cipher_Suite_Id_2 Unused
<snip>
In the above examples, the cipher suites are currently disabled, but
they can be configured to whatever you want. I've tested this on
atleast 4 or 5 different vendor implementations of IPMI.
Al
> Please ping Dell or Intel on you request. It's not new but more voices
> heard might move an iceburg
>
> [email protected]
> IPMI Architecture Group
> JBlade
>
>
> On 01/21/2011 10:10 AM, Szabo, Steve G wrote:
> >
> > Anyone know which privilege is required when accessing ProLiant
> > BL460c G6?
> >
> >
> >
> >
> > $ ipmitool -vv -I lanplus -U someguy -H somehost -P somepass channel
> > info
> >
> > IPMI LAN host somehost port 623
> >
> > >> Sending IPMI command payload
> > >> netfn : 0x06
> > >> command : 0x38
> > >> data : 0x8e 0x04
> >
> > >> SENDING AN OPEN SESSION REQUEST
> >
> > <<OPEN SESSION RESPONSE
> > << Message tag : 0x00
> > << RMCP+ status : no errors
> > << Maximum privilege level : admin
> > << Console Session ID : 0xa0a2a3a4
> > << BMC Session ID : 0x0086219a
> > << Negotiated authenticatin algorithm : hmac_sha1
> > << Negotiated integrity algorithm : hmac_sha1_96
> > << Negotiated encryption algorithm : aes_cbc_128
> >
> > >> Console generated random number (16 bytes)
> > 42 21 af 9e be 27 90 14 c0 08 82 00 4d 86 88 65
> > >> SENDING A RAKP 1 MESSAGE
> >
> > <<RAKP 2 MESSAGE
> > << Message tag : 0x00
> > << RMCP+ status : no errors
> > << Console Session ID : 0xa0a2a3a4
> > << BMC random number :
> > 0x3de07bce4ebad1deb8365f560bb22463
> > << BMC GUID :
> > 0x3530373737394d585130313030334454
> > << Key exchange auth code [sha1] :
> > 0xf102da4902ea7e1e68a2d44882b2c57fcfa70236
> >
> > session integrity key input (40 bytes)
> > 42 21 af 9e be 27 90 14 c0 08 82 00 4d 86 88 65
> > 3d e0 7b ce 4e ba d1 de b8 36 5f 56 0b b2 24 63
> > 14 06 73 79 73 6f 70 73
> > Generated session integrity key (20 bytes)
> > ab 09 95 ee 2f 3d 08 25 20 7f 52 40 52 22 ab 4f
> > 9c e9 17 1a
> > Generated K1 (20 bytes)
> > 52 ad 59 e4 f9 14 89 ed 68 97 cc bd 5d 86 4f 0b
> > 0c 8f f9 b8
> > Generated K2 (20 bytes)
> > 8b 9e f8 b4 d7 00 f4 68 c2 34 57 fd e4 16 21 1c
> > ac 8b d1 99
> > >> SENDING A RAKP 3 MESSAGE
> >
> > <<RAKP 4 MESSAGE
> > << Message tag : 0x00
> > << RMCP+ status : no errors
> > << Console Session ID : 0xa0a2a3a4
> > << Key exchange auth code [sha1] : 0x6d9720c5ac3de5e28e47fedc
> >
> > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
> >
> >
> > >> Sending IPMI command payload
> > >> netfn : 0x06
> > >> command : 0x3b
> > >> data : 0x04
> >
> > Set Session Privilege Level to ADMINISTRATOR failed: Unknown (0x81)
> > Error: Unable to establish IPMI v2 / RMCP+ session
> > Unable to Get Channel Info
> >
> > Cheers
> > -------------------------------------------------------------------------
> >
> >
> > NOTICE: Confidential message which may be privileged. Unauthorized
> > use/disclosure prohibited. If received in error, please go to
> > www.td.com/legal for instructions.
> > AVIS : Message confidentiel dont le contenu peut être privilégié.
> > Utilisation/divulgation interdites sans permission. Si reçu par
> > erreur, prière d'aller au www.td.com/francais/avis_juridique pour
> > des instructions.
> >
> >
> > ------------------------------------------------------------------------------
> > Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)!
> > Finally, a world-class log management solution at an even better price-free!
> > Download using promo code Free_Logger_4_Dev2Dev. Offer expires
> > February 28th, so secure your free ArcSight Logger TODAY!
> > http://p.sf.net/sfu/arcsight-sfd2d
> >
> > _______________________________________________
> > Ipmitool-devel mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
--
Albert Chu
[email protected]
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory
------------------------------------------------------------------------------
Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)!
Finally, a world-class log management solution at an even better price-free!
Download using promo code Free_Logger_4_Dev2Dev. Offer expires
February 28th, so secure your free ArcSight Logger TODAY!
http://p.sf.net/sfu/arcsight-sfd2d
_______________________________________________
Ipmitool-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel