To complicate things regarding the IPMI GUID more:
Microsoft SCVMM (System Center Virtual Machine Manager) - if I recall
correctly - expects the binary output of the IPMI Get System GUID in (native
RFC4122???) format for technical reasons unknown to me. This is used for bare
metal server discove
As Alexander already pointed out you did not provide the actual command how
you set the SEL time.
You can try the following command instead which will not execute the code path
described below.
ipmitool sel set time now
Based on your information this would be my guess of what happens:
To whom it may concern,
the latest changes in lanplus_crypt_impl.c together with the OpenSSL 1.1
changes now leak the allocated cipher context on every call. You should call
EVP_CIPHER_CTX_free(ctx), also I would suggest to call
EVP_CIPHER_CTX_cleanup(ctx) always and not only in the success case (e
Guessing from your other post this is related to the 'Get Channel Auth
Capabilities' cmd (NetNn 0x06 Cmd 0x38). As the name suggests, this is used to
query the channel authentication capabilities and is one of the few commands
which are supported without an active session (Get System GUID is ano
MD5 is the (default and strongest) Authentication for RMCP (a.k.a. IPMI 1.5,
a.k.a. -I lan) and not for RMCP+ (a.k.a. IPMI 2.0 a.k.a. -I lanplus) so I
guess this command line option gets ignored as you are still trying to
establish a RMCP+ session (-I lanplus) with the default Cipher Suite 3 - w
cipher suites e.g., lan set 1 cipher_privs
XXaXXaX , I am not able to access the ipmi device at all.
The error i get :
Error in open session response message : no matching cipher suite
Error: Unable to establish IPMI v2 / RMCP+ session
On Tue, Jan 31, 2017 at 12:42 AM, holger.lie
Typically a BMC lists only the cipher suites it supports with ipmitool lan
print e.g.
# ipmitool lan print | grep Cipher
RMCP+ Cipher Suites : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max : XaaaXXX
: X=Cipher Suite Unused
: c=CAL