Great little program, thanks!  I would love to see the grab script if you can 
send; every byte is sacred, I say ;)  If there are things in it that really 
aren't appropriate I can remove them (<3 BIOS data, though.)

dan

^..^

On Oct 29, 2012, at 2:39 PM, "Andy Cress" <andy.cr...@us.kontron.com> wrote:

> Dan,
>  
> For discovery, I have a bit of code that uses RMCP ping, or alternatively 
> GetChanAuthCap packets to discover some systems that don’t answer pings 
> reliably.  See 
> http://ipmiutil.svn.sourceforge.net/viewvc/ipmiutil/trunk/util/idiscover.c?revision=269
>  
> To gather all the ipmi data from a system, I have a ‘grab’ script that we use 
> to gather that for support purposes, but it also has lots of other stuff in 
> it for BIOS data, storage configuration, etc., etc.
>  
> Andy
>  
> From: ^..^ [mailto:zenf...@gmail.com] 
> Sent: Monday, October 29, 2012 3:26 PM
> To: Hank Bruning
> Cc: ipmitool-devel@lists.sourceforge.net
> Subject: Re: [Ipmitool-devel] scriptasaurus rex
>  
> Thanks for the response… if I understand the licensing of Hemi it's a 
> commercial product 
> (http://www.jblade.com/products/hemi/license/HemiLicenseOverview.jsf), which 
> immediately counts it out (not to mention I wouldn't be caught dead using 
> java, but I might make an exception for extreme circumstances ;)) since I 
> can't redistribute it.   I'm fine writing it myself, I simply didn't want to 
> reinvent anything.
>  
> Also, I don't need something to RMCP ping something; as I said that's an 
> obvious win, and I'm looking at other methods of IPMI discovery.  Think 
> discovery in broad terms; knowing an IPMI server is there even if you can't 
> communicate over UDP 623 is still very interesting.
>  
> dan
> 
> ^..^
>  
> On Oct 29, 2012, at 11:53 AM, Hank Bruning <h...@jblade.com> wrote:
> 
> 
> I don't know if this meets your requirements but if you want to replace 
> IPMITool with an Java IPMI library take a look at Hemi. It's well documented, 
> over 475 pages for the JavaDoc.
> http://www.jblade.com/products/hemi/HemiOverview.jsf
> I think you want the Hemi DC version.
> 
> The RMCP Ping methods your after are at found at
> http://www.jblade.com/JbDoc1/products/hemi/hemiCX/doc/programmers/HemiDiscoverer.html
> 
> Hank Bruning
> 
> 
> On Mon, Oct 29, 2012 at 11:24 AM, ^..^ <zenf...@gmail.com> wrote:
>  
> Hey folks - first, thanks for a tremendous tool and all the effort put into 
> this over the years (the documentation is really stellar as well, something 
> that is both rare and apparently under-appreciated in open source.)  I've a 
> couple of questions that I hope are suited this venue; if not please forgive 
> me, and if you could suggest a better forum I'd appreciate it.
>  
> I'm doing a bit of research on IPMI and BMC security (more like IPMI++, since 
> I'm doing work with some of the various offshoots; iDRAC, iLO, etc.)  
> Currently I'm pulling various bits of data from the IPMI interface - ideally 
> I'd like to *remotely* get as much as possible about the configuration and 
> state of the BMC and IPMI configuration, and I plan to use your tool along 
> with nmap, SMASH/CLP (don't laugh too much, at least its modestly cross 
> platform ;)), and some duct tape and bailing wire to gather data.  Think of 
> it more as a snapshot or audit effort rather than any sort of continuous 
> monitoring.
>  
> Q-1) I'm familiar with the nagios and other folks who are all about gathering 
> BMC sensor data… but I can't find a general IPMI data sucker  (e.g. get all 
> the stuff that ipmitool will get me in one fell swoop, even though under the 
> hood it might be doing lots of queries) anywhere; has anyone written such a 
> thing?  (It'd have to be non-commercial, or at least free to distribute.)
>  
> [meta note: the README file in the contrib subdirectory has a broken url: 
> http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ - seems as though the 
> user moved on.  As such one can't see any sample output to the scripts or 
> what they really collect without perusing the source or hunting around.   In 
> particular the file "oem_ibm_sel_map" is pretty opaque and not referenced by 
> anything but the makefile in the contrib… is this used anywhere except in 
> comments (and if so, a one-liner somewhere explaining would be great)? :) ]
>  
>  
> Q-2) In the absence of someone else having something I can steal, my current 
> thought would be to simply toss all the various ipmitool gathering options 
> (e.g. fru, sel, pef, etc.) in a file, exec them all, and stash the resultsin 
> something like JSON for safekeeping and post-processing.  So again… has 
> anyone done anything like this?  Assuming that what I'm looking is all that 
> data, even if you think I'm foolish wanting it, is that a reasonable way to 
> collect it?  It'd be great to have any tricks or tips.   (Size of output is 
> not an issue.  Heck, I'd snarf up BMC flash storage and RAM as well, if I 
> could find a reasonable way of doing so remotely!)  I'd be happy to share 
> pre-distributed versions if anyone is burning with curiosity, has a use for 
> such a thing, or would be willing to discuss various ways to build a better 
> mousetrap.
>  
> Q-3) Finally - I'm writing up a bit of an analysis on IPMI/BMC/++ security; 
> if there is a person or two here who are interested in such things I would 
> love a real IPMI expert to give feedback (I'm not an IPMI expert by any 
> stretch of the imagination, though I might have some unusual thoughts on IPMI 
> security); I'll just say as a warning I'll be asking for no one to 
> redistribute it prior to my putting it out, which will hopefully be in about 
> 30-60 days or so.
>  
> Thanks again (mac support in particular is greatly appreciated as well.)
>  
> dan
>  
> p.s.  Also - if anyone has any thoughts or scripts or tools or anything on 
> how to remotely identify systems running IPMI I've yet another simple tool to 
> start doing this (obviously if they answer to an RMCP ping that's a win, but 
> I'm talking about on a larger network scale where firewalls and network 
> topologies), and would welcome any conversations on that also.
>  
> p.p.s. For context some of my earlier work may be found at 
> http://fish2.com/security
>  
> ^..^
>  
> 
> ------------------------------------------------------------------------------
> The Windows 8 Center - In partnership with Sourceforge
> Your idea - your app - 30 days.
> Get started!
> http://windows8center.sourceforge.net/
> what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> 
>  
>  
> 
> WARNING - This e-mail or its attachments may contain controlled technical 
> data or controlled technology within the definition of the International 
> Traffic in Arms Regulations (ITAR) or Export Administration Regulations 
> (EAR), and are subject to the export control laws of the U.S. Government. 
> Transfer of this data or technology by any means to a foreign person, whether 
> in the United States or abroad, without an export license or other approval 
> from the U.S. Government, is prohibited. The information contained in this 
> document is CONFIDENTIAL and property of Kontron. Any unauthorized review, 
> use, disclosure or distribution is prohibited without express written consent 
> of Kontron. If you are not the intended recipient, please contact the sender 
> and destroy all copies of the original message and enclosed attachments.   ­­ 
>  

------------------------------------------------------------------------------
The Windows 8 Center - In partnership with Sourceforge
Your idea - your app - 30 days.
Get started!
http://windows8center.sourceforge.net/
what-html-developers-need-to-know-about-coding-windows-8-metro-style-apps/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to