1ipmipower(8)                    System Commands                   ipmipower(8)
2
3
4

NAME

6       ipmipower - IPMI power control utility
7

SYNOPSIS

9       ipmipower [OPTION...]
10

DESCRIPTION

12       ipmipower  allows  users  to remotely power on, off, cycle, hard reset,
13       get a power status query, perform a pulse diagnostic interrupt, or ini‐
14       tiate a soft-shutdown of the OS via ACPI through the IPMI over LAN pro‐
15       tocol.
16
17       When a power command (--on, --off, --cycle, --reset,  --stat,  --pulse,
18       or  --soft) is specified on the command line, ipmipower will attempt to
19       run the power command on all hostnames listed on the command line  then
20       exit.
21
22       If  no power commands are specified on the command line, ipmipower will
23       run in interactive mode. Interactive mode gives the user a command line
24       interface to enter various commands. Details of the interactive command
25       line interface can be found below under INTERACTIVE COMMANDS.
26
27       Listed below are general IPMI options, tool specific  options,  trouble
28       shooting  information,  workaround  information,  examples,  and  known
29       issues. For a general introduction to FreeIPMI please see freeipmi(7).
30

GENERAL OPTIONS

32       The following options are general options for configuring IPMI communi‐
33       cation and executing general tool commands.
34
35       -D, --driver-type=IPMIDRIVER
36              Specify  the  driver type to use instead of doing an auto selec‐
37              tion.  The currently available outofband  drivers  are  LAN  and
38              LAN_2_0, which perform IPMI 1.5 and IPMI 2.0 respectively.
39
40       -h, --hostname=IPMIHOST1,IPMIHOST2,...
41              Specify  the  remote host(s) to communicate with. Multiple host‐
42              names may be separated by comma or may be specified in  a  range
43              format; see HOSTRANGED SUPPORT below.
44
45       -u, --username=USERNAME
46              Specify  the username to use when authenticating with the remote
47              host.  If not specified, a null  (i.e.  anonymous)  username  is
48              assumed.  The  user must have atleast OPERATOR privileges to run
49              the --on, --off, --reset, --cycle, --pulse, or --soft power con‐
50              trol  commands.  The  user  must have atleast USER privileges to
51              determine the power status of the machine through --stat.
52
53       -p, --password=PASSWORD
54              Specify the password to use when authenticationg with the remote
55              host.   If  not  specified,  a null password is assumed. Maximum
56              password length is 16 for IPMI 1.5 and 20 for IPMI 2.0.
57
58       -P, --password-prompt
59              Prompt for password  to  avoid  possibility  of  listing  it  in
60              process lists.
61
62       -k, --k-g=K_G
63              Specify  the  K_g  BMC  key  to use when authenticating with the
64              remote host for IPMI 2.0.  If  not  specified,  a  null  key  is
65              assumed. To input the key in hexadecimal form, prefix the string
66              with '0x'. E.g., the key 'abc' can be entered  with  the  either
67              the string 'abc' or the string '0x616263'
68
69       -K, --k-g-prompt
70              Prompt  for  k-g  to  avoid possibility of listing it in process
71              lists.
72
73       --session-timeout=MILLISECONDS
74              Specify the session timeout in milliseconds. Defaults  to  20000
75              milliseconds (20 seconds) if not specified.
76
77       --retransmission-timeout=MILLISECONDS
78              Specify  the  packet  retransmission  timeout  in  milliseconds.
79              Defaults to 400 milliseconds (0.4 seconds) if not specified.
80
81       -a, --authentication-type=AUTHENTICATION-TYPE
82              Specify the IPMI 1.5 authentication type to use.  The  currently
83              available  authentication types are NONE, STRAIGHT_PASSWORD_KEY,
84              MD2, and MD5. Defaults to MD5 if not specified.
85
86       -I, --cipher-suite-id=CIPHER-SUITE-ID
87              Specify the IPMI 2.0 cipher suite ID to use. The Cipher Suite ID
88              identifies a set of authentication, integrity, and confidential‐
89              ity algorithms to use for IPMI 2.0 communication. The  authenti‐
90              cation  algorithm  identifies  the  algorithm to use for session
91              setup, the integrity algorithm identifies the algorithm  to  use
92              for session packet signatures, and the confidentiality algorithm
93              identifies the algorithm to use for payload encryption. Defaults
94              to  cipher  suite  ID  3  if not specified. The following cipher
95              suite ids are currently supported:
96
97              0 - Authentication Algorithm = None; Integrity Algorithm = None;
98              Confidentiality Algorithm = None
99
100              1  - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm =
101              None; Confidentiality Algorithm = None
102
103              2 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =
104              HMAC-SHA1-96; Confidentiality Algorithm = None
105
106              3  - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm =
107              HMAC-SHA1-96; Confidentiality Algorithm = AES-CBC-128
108
109              6 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =
110              None; Confidentiality Algorithm = None
111
112              7  -  Authentication Algorithm = HMAC-MD5; Integrity Algorithm =
113              HMAC-MD5-128; Confidentiality Algorithm = None
114
115              8 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =
116              HMAC-MD5-128; Confidentiality Algorithm = AES-CBC-128
117
118              11  - Authentication Algorithm = HMAC-MD5; Integrity Algorithm =
119              MD5-128; Confidentiality Algorithm = None
120
121              12 - Authentication Algorithm = HMAC-MD5; Integrity Algorithm  =
122              MD5-128; Confidentiality Algorithm = AES-CBC-128
123
124       -l, --privilege-level=PRIVILEGE-LEVEL
125              Specify  the privilege level to be used. The currently available
126              privilege levels are USER,  OPERATOR,  and  ADMIN.  Defaults  to
127              OPERATOR if not specified.
128
129       --config-file=FILE
130              Specify an alternate configuration file.
131
132       -W, --workaround-flags=WORKAROUNDS
133              Specify  workarounds to vendor compliance issues. Multiple work‐
134              arounds can be specified separated by  commas.  See  WORKAROUNDS
135              below for a list of available workarounds.
136
137       --debug
138              Turn on debugging.
139
140       -?, --help
141              Output a help list and exit.
142
143       --usage
144              Output a usage message and exit.
145
146       -V, --version
147              Output the program version and exit.
148

IPMIPOWER OPTIONS

150       The following options are specific to ipmipower.
151
152       -n, --on
153              Power on the target hosts.
154
155       -f, --off
156              Power off the target hosts.
157
158       -c, --cycle
159              Power cycle the target hosts.
160
161       -r, --reset
162              Reset the target hosts.
163
164       -s, --stat
165              Get power status of the target hosts.
166
167       --pulse
168              Send power diagnostic interrupt to target hosts.
169
170       --soft Initiate a soft-shutdown of the OS via ACPI.
171
172       --on-if-off
173              The  IPMI specification does not require the power cycle or hard
174              reset commands to turn on a machine that  is  currently  powered
175              off.  This  option will force ipmipower to issue a power on com‐
176              mand instead of a power cycle  or  hard  reset  command  if  the
177              remote machine's power is currently off.
178
179       --wait-until-on
180              The  IPMI specification allows power on commands to return prior
181              to the power on actually taking place. This  option  will  force
182              ipmipower  to  regularly  query  the  remote BMC and return only
183              after the machine has powered on.
184
185       --wait-until-off
186              The IPMI specification allows power off commands to return prior
187              the  power  off  actually  taking  place. This option will force
188              ipmipower to regularly query the  remote  BMC  and  return  only
189              after the machine has powered off.
190

IPMIPOWER ADVANCED NETWORK OPTIONS

192       The  following  options  are  used to change the networking behavior of
193       ipmipower.
194
195       --retransmission-wait-timeout=MILLISECONDS
196              Specify the retransmission wait timeout length in  milliseconds.
197              The retransmission wait timeout is similar to the retransmission
198              timeout above, but is used  specifically  for  power  completion
199              verification   with  the  --wait-until-on  and  --wait-until-off
200              options.  Defaults to 500 milliseconds (0.5 seconds).
201
202       --retransmission-backoff-count=COUNT
203              Specify the retransmission backoff  count  for  retransmissions.
204              After  ever  COUNT  retransmissions,  the retransmission timeout
205              length will be increased by another factor. Defaults to 8.
206
207       --ping-interval=MILLISECONDS
208              Specify the ping interval length in milliseconds.  When  running
209              in  interactive  mode, RMCP (Remote Management Control Protocol)
210              discovery messages will be sent to all configured  remote  hosts
211              every  MILLISECONDS to confirm their support of IPMI. Power com‐
212              mands cannot be sent to a host until it is  discovered  (or  re-
213              discovered if previously lost). Defaults to 5000 milliseconds (5
214              seconds). Ping discovery messages can  be  disabled  by  setting
215              this  valu  to 0. RMCP ping discovery messages are automatically
216              disabled in non-interactive mode.
217
218       --ping-timeout=MILLISECONDS
219              Specify the ping timeout length in milliseconds. When running in
220              interactive mode, RMCP (Remote Management Control Protocol) mes‐
221              sages discovery will be sent to all configured remote  hosts  to
222              confirm  their  support  of  IPMI.  A  remote host is considered
223              undiscovered if the host does not respond in MILLISECONDS  time.
224              Defaults  to  30000  milliseconds (30 seconds). The ping timeout
225              cannot be larger than the ping interval.
226
227       --ping-packet-count=COUNT
228              Specify the ping packet count size.  Defaults  to  10.  See  the
229              --ping-percent-fR  option  below  for  more  information on this
230              option.
231
232       --ping-percent=PERCENT
233              Specify the ping percent value. Defaults to 50.  Since  IPMI  is
234              based  on  UDP,  it  is  difficult  for ipmipower to distinguish
235              between a missing machine and a bad (or heavily loaded)  network
236              connection  in  interactive  mode.  when  running in interactive
237              mode. For example, suppose a link consistently drops 80% of  the
238              packets to a particular machine. The power control operation may
239              have difficulty completing, although a recent pong response from
240              RMCP  makes  ipmipower believe the machine is up and functioning
241              properly.  The ping packet acount and percent options  are  used
242              to  alleviate  this  problem.   Ipmipower will monitor RMCP ping
243              packets in packet count chunks. If ipmipower does not receive  a
244              response   to  greater  than  ping  percent  of  those  packets,
245              ipmipower will assume the link to this node is bad and will  not
246              send  power control operations to that node until the connection
247              is determined to be reliable. This heuristic can be disabled  by
248              setting  either the ping packet count or ping percent to 0. This
249              feature is not used if ping interval is set to 0.
250
251       --ping-consec-count=COUNT
252              Specify the ping consecutive count. This  is  another  heuristic
253              used  to  determine  if  a node should be considered discovered,
254              undiscovered, or with a bad connection. If  a  valid  RMCP  pong
255              response  was  received  for the last COUNT ping packets, a node
256              will be considered discovered, regardless  of  other  heuristics
257              listed  above.  Defaults to 5. This heuristic can be disabled by
258              setting this value to 0. This feature is not used if other  ping
259              features described above are disabled.
260

HOSTRANGED OPTIONS

262       The following options manipulate hostranged output. See HOSTRANGED SUP‐
263       PORT below for additional information on hostranges.
264
265       -B, --buffer-output
266              Buffer hostranged output. For each node, buffer standard  output
267              until the node has completed its IPMI operation. When specifying
268              this option, data may appear to output slower to the user  since
269              the  the entire IPMI operation must complete before any data can
270              be output.  See HOSTRANGED SUPPORT below for additional informa‐
271              tion.
272
273       -C, --consolidate-output
274              Consolidate hostranged output. The complete standard output from
275              every node specified will be consolidated  so  that  nodes  with
276              identical  output are not output twice. A header will list those
277              nodes with the consolidated output. When this option  is  speci‐
278              fied,  no  output  can  be seen until the IPMI operations to all
279              nodes has completed. If the  user  breaks  out  of  the  program
280              early,  all  currently  consolidated  output will be dumped. See
281              HOSTRANGED SUPPORT below for additional information.
282
283       -F, --fanout
284              Specify multiple host fanout. Indicates the  maximum  number  of
285              power control operations that can be executed in parallel.
286
287       -E, --eliminate
288              Eliminate  hosts  determined  as undetected by ipmidetect.  This
289              attempts to remove the common issue of hostranged execution tim‐
290              ing  out  due  to  several nodes being removed from service in a
291              large cluster. The ipmidetectd daemon must  be  running  on  the
292              node executing the command.
293
294       --always-prefix
295              Always prefix output, even if only one host is specified or com‐
296              municating in-band. This option is primarily useful for  script‐
297              ing  purposes.  Option  will be ignored if specified with the -C
298              option.
299

INTERACTIVE COMMANDS

301       ipmipower provides the following interactive commands at the ipmipower>
302       prompt.  Before any power commands (on, off, cycle, reset, stat, pulse,
303       or soft) can be used, hostnames  must  be  configured  into  ipmipower,
304       either  through  the  command prompt or the hostname command below. The
305       parameters and options to the commands below mirror  their  appropriate
306       command line options.
307
308       hostname [IPMIHOST(s)]
309              Specify a new set of hosts. No input to unconfigure all hosts.
310
311       username [USERNAME]
312              Specify a new username. No input for null username.
313
314       password [PASSWORD]
315              Specify a new password. No input for null password.
316
317       k_g [K_G]
318              Specify  a  new  K_g BMC Key. No input for null key. Prefix with
319              '0x' to enter a key in hexadecimal
320
321       ipmi-version IPMIVERSION
322              Specify the ipmi version to use.
323
324       session-timeout MILLISECONDS
325              Specify a new session timeout length.
326
327       retransmission-timeout MILLISECONDS
328              Specify a new retransmiision timeout length.
329
330       authentication-type AUTHENTICATION-TYPE
331              Specify the authentication type to use.
332
333       cipher-suite-id CIPHER-SUITE-ID
334              Specify the cipher suite id to use.
335
336       privilege-level PRIVILEGE-LEVEL
337              Specify the privilege level to use.
338
339       workaround-flags WORKAROUNDS
340              Specify workaround flags.
341
342       debug [on|off]
343              Toggle debug output.
344
345       on [IPMIHOST(s)]
346              Turn on all configured hosts or specified hosts.
347
348       off [IPMIHOST(s)]
349              Turn off all configured hosts or specified hosts.
350
351       cycle [IPMIHOST(s)]
352              Power cycle all configured hosts or specified hosts.
353
354       reset [IPMIHOST(s)]
355              Reset all configured hosts or specified hosts.
356
357       stat [IPMIHOST(s)]
358              Query power status for all configured hosts or specified hosts.
359
360       pulse [IPMIHOST(s)]
361              Pulse diagnostic interrupt all  configured  hosts  or  specified
362              hosts.
363
364       soft [IPMIHOST(s)]
365              Initiate  a  soft-shutdown for all configured hosts or specified
366              hosts.
367
368       identify-on [IPMIHOST(s)]
369              Turn on physical system identification.
370
371       identify-off [IPMIHOST(s)]
372              Turn off physical system identification.
373
374       identify-status [IPMIHOST(s)]
375              Query physical system identification status.
376
377       on-if-off [on|off]
378              Toggle on-if-off functionality.
379
380       wait-until-on [on|off]
381              Toggle wait-until-on functionality.
382
383       wait-until-off [on|off]
384              Toggle wait-until-off functionality.
385
386       retransmission-wait-timeout MILLISECONDS
387              Specify a new retransmission wait timeout length.
388
389       retransmission-backoff-count COUNT
390              Specify a new retransmission backoff count.
391
392       ping-interval MILLISECONDS
393              Specify a new ping interval length.
394
395       ping-timeout MILLISECONDS
396              Specify a new ping timeout length.
397
398       ping-packet-count COUNT
399              Specify a new ping packet count.
400
401       ping-percent PERCENT
402              Specify a new ping percent.
403
404       ping-consec-count COUNT
405              Specify a new ping consec count.
406
407       buffer-output [on|off]
408              Toggle buffer-output functionality.
409
410       consolidate-output [on|off]
411              Toggle consolidate-output functionality.
412
413       fanout COUNT
414              Specify a fanout.
415
416       always-prefix [on|off]
417              Toggle always-prefix functionality.
418
419       help   Output help menu.
420
421       version
422              Output version.
423
424       config Output the current configuration.
425
426       quit   Quit program.  ipmipower.
427

HOSTRANGED SUPPORT

429       Multiple hosts can be input either as an explicit comma separated lists
430       of  hosts  or  a  range of hostnames in the general form: prefix[n-m,l-
431       k,...], where n < m and l < k, etc. The later form should not  be  con‐
432       fused  with  regular expression character classes (also denoted by []).
433       For example, foo[19] does not represent foo1 or foo9, but rather repre‐
434       sents a degenerate range: foo19.
435
436       This  range  syntax  is  meant only as a convenience on clusters with a
437       prefixNN naming convention and specification of ranges  should  not  be
438       considered  necessary -- the list foo1,foo9 could be specified as such,
439       or by the range foo[1,9].
440
441       Some examples of range usage follow:
442           foo[01-05] instead of foo01,foo02,foo03,foo04,foo05
443           foo[7,9-10] instead of foo7,foo9,foo10
444           foo[0-3] instead of foo0,foo1,foo2,foo3
445
446       As a reminder to the reader, some shells will interpret brackets ([ and
447       ])  for  pattern matching. Depending on your shell, it may be necessary
448       to enclose ranged lists within quotes.
449
450       When multiple hosts are specified by the user, a socket will be created
451       for  each host and polled on, effectively allowing communication to all
452       hosts in parallel. This will allow communication to  large  numbers  of
453       nodes  far more quickly than if done in serial.  The -F option can con‐
454       figure the number of nodes that can be communicated with in parallel at
455       the same time.
456
457       By  default,  standard  output  from each node specified will be output
458       with the hostname prepended to each line. Although this output is read‐
459       able  in  many  situations, it may be difficult to read in other situa‐
460       tions. For example, output from multiple nodes may be  mixed  together.
461       The -B and -C options can be used to change this default.
462

EXAMPLES

464       Determine the power status of foo[0-2] with null username and password
465               ipmipower -h foo[0-2] --stat
466
467       Determine the power status of foo[0-2] with non-null username and pass‐
468       word
469               ipmipower -h foo[0-2] -u foo -p bar --stat
470
471       Hard reset nodes foo[0-2] with non-null username and password
472               ipmipower -h foo[0-2] -u foo -p bar --reset
473

GENERAL TROUBLESHOOTING

475       Most often, IPMI over LAN problems involve a  misconfiguration  of  the
476       remote machine's BMC.  Double check to make sure the following are con‐
477       figured properly in the remote machine's BMC: IP address, MAC  address,
478       subnet  mask,  username, user enablement, user privilege, password, LAN
479       privilege, LAN enablement, and allowed authentication type(s). For IPMI
480       2.0  connections,  double  check  to  make sure the cipher suite privi‐
481       lege(s) and K_g key are configured properly. The bmc-config(8) tool can
482       be used to check and/or change these configuration settings.
483
484       The following are common issues for given error messages:
485
486       "username  invalid"  - The username entered (or a NULL username if none
487       was entered) is not available on the remote machine.  It  may  also  be
488       possible the remote BMC's username configuration is incorrect.
489
490       "password  invalid"  - The password entered (or a NULL password if none
491       was entered) is not correct. It may also be possible the  password  for
492       the user is not correctly configured on the remote BMC.
493
494       "password  verification timeout" - Password verification has timed out.
495       A "password invalid" error (described  above)  or  a  generic  "session
496       timeout" (described below) occurred.  During this point in the protocol
497       it cannot be differentiated which occurred.
498
499       "k_g invalid" - The K_g key entered (or a NULL  K_g  key  if  none  was
500       entered)  is  not  correct.  It may also be possible the K_g key is not
501       correctly configured on the remote BMC.
502
503       "privilege level insufficient" - An IPMI command requires a higher user
504       privilege  than  the one authenticated with. Please try to authenticate
505       with a higher privilege. This may require authenticating to a different
506       user which has a higher maximum privilege.
507
508       "privilege  level  cannot  be  obtained  for this user" - The privilege
509       level you are attempting to authenticate with is higher than the  maxi‐
510       mum  allowed for this user. Please try again with a lower privilege. It
511       may also be possible the maximum privilege level allowed for a user  is
512       not configured properly on the remote BMC.
513
514       "authentication  type  unavailable for attempted privilege level" - The
515       authentication type you wish to authenticate with is not available  for
516       this privilege level. Please try again with an alternate authentication
517       type or alternate privilege level. It may also be possible  the  avail‐
518       able  authentication  types you can authenticate with are not correctly
519       configured on the remote BMC.
520
521       "cipher suite id unavailable" - The cipher suite id you wish to authen‐
522       ticate  with  is not available on the remote BMC. Please try again with
523       an alternate cipher suite id. It may also  be  possible  the  available
524       cipher suite ids are not correctly configured on the remote BMC.
525
526       "ipmi  2.0  unavailable"  -  IPMI  2.0 was not discovered on the remote
527       machine. Please try to use IPMI 1.5 instead.
528
529       "connection timeout" - Initial IPMI communication failed. A  number  of
530       potential errors are possible, including an invalid hostname specified,
531       an IPMI IP address cannot be resolved,  IPMI  is  not  enabled  on  the
532       remote  server,  the network connection is bad, etc. Please verify con‐
533       figuration and connectivity.
534
535       "session timeout" - The IPMI session has timed out.  Please  reconnect.
536       If  IPMI  over  LAN continually times out, you may wish to increase the
537       retransmission timeout. Some remote BMCs are considerably  slower  than
538       others.
539
540       Please  see  WORKAROUNDS below to also if there are any vendor specific
541       bugs that have been discovered and worked around.
542

IPMIPOWER TROUBLESHOOTING

544       When powering on a powered off machine, the client must have a means by
545       which to resolve the MAC address of the remote machine's ethernet card.
546       This is typically done in one of two ways.
547
548       1) Enable gratuitous ARPs on the remote  machine.  The  remote  machine
549       will  send  out  a gratuitous ARP, which advertises the ethernet IP and
550       MAC address so that other machines  on  the  network  this  information
551       their  local  ARP  cache. For large clusters, this method is not recom‐
552       mended since gratuitous ARPs can flood  the  network  with  unnecessary
553       traffic.
554
555       2)  Permanently store the remote machine's MAC address in the local ARP
556       cache. This is the more common approach on large clusters.
557
558       Other methods are listed in the IPMI specification.
559
560       If ipmipower is running a tad slow when running a power control command
561       on  the  commandline  (compared  to  running a power control command in
562       interactive mode), hostname IP resolution may be  slowing  the  startup
563       code  down.  Hostname resolution tuning may help make ipmipower execute
564       faster on the commandline. This performance problem should  not  matter
565       when  running  in interactive mode or with powerman, since it is a one-
566       time setup cost.
567

WORKAROUNDS

569       With so many different vendors implementing their own  IPMI  solutions,
570       different  vendors  may implement their IPMI protocols incorrectly. The
571       following lists the workarounds currently available to  handle  discov‐
572       ered compliance issues.
573
574       When possible, workarounds have been implemented so they will be trans‐
575       parent to the user. However, some will require the user  to  specify  a
576       workaround be used via the -W option.
577
578       The hardware listed below may only indicate the hardware that a problem
579       was discovered on. Newer versions of  hardware  may  fix  the  problems
580       indicated  below.  Similar machines from vendors may or may not exhibit
581       the same problems. Different vendors may license  their  firmware  from
582       the  same IPMI firmware developer, so it may be worthwhile to try work‐
583       arounds listed below even if your motherboard is not listed.
584
585       "idzero" - This workaround option will allow empty session  IDs  to  be
586       accepted by the client. It works around IPMI sessions that report empty
587       session IDs to the client. Those hitting this issue  may  see  "session
588       timeout" errors. Issue observed on Tyan S2882 with M3289 BMC.
589
590       "unexpectedauth"  -  This  workaround option will allow unexpected non-
591       null authcodes to be checked as though they  were  expected.  It  works
592       around  an issue when packets contain non-null authentication data when
593       they should be null due to disabled per-message  authentication.  Those
594       hitting  this issue may see "session timeout" errors. Issue observed on
595       Dell PowerEdge 2850,SC1425. Confirmed fixed on newer firmware.
596
597       "forcepermsg" - This workaround option will force per-message authenti‐
598       cation to be used no matter what is advertised by the remote system. It
599       works around an issue when per-message authentication is advertised  as
600       disabled on the remote system, but it is actually required for the pro‐
601       tocol. Those hitting this  issue  may  see  "session  timeout"  errors.
602       Issue observed on IBM eServer 325.
603
604       "endianseq"  -  This workaround option will flip the endian of the ses‐
605       sion sequence numbers to allow the session to  continue  properly.   It
606       works  around  IPMI  1.5  session  sequence  numbers that are the wrong
607       endian. Those hitting this issue  may  see  "session  timeout"  errors.
608       Issue  observed  on some Sun ILOM 1.0/2.0 (depends on service processor
609       endian).
610
611       "authcap" - This workaround option will skip early checks for  username
612       capabilities,  authentication  capabilities,  and K_g support and allow
613       IPMI authentication to succeed. It  works  around  multiple  issues  in
614       which the remote system does not properly report username capabilities,
615       authentication capabilities, or K_g status. Those  hitting  this  issue
616       may  see  "username  invalid",  "authentication  type  unavailable  for
617       attempted privilege level", or "k_g invalid" errors.  Issue observed on
618       Asus  P5M2/P5MT-R/RS162-E4/RX4,  Intel  SR1520ML/X38ML,  and  Sun  Fire
619       2200/4150/4450 with ELOM.
620
621       "intel20" - This workaround option will work around several Intel  IPMI
622       2.0  authentication issues. The issues covered include padding of user‐
623       names, automatic acceptance of a RAKP 4 response integrity  check  when
624       using  the  integrity algorithm MD5-128, and password truncation if the
625       authentication algorithm is HMAC-MD5-128. Those hitting this issue  may
626       see  "username  invalid",  "password invalid", or "k_g invalid" errors.
627       Issue observed on Intel SE7520AF2 with Intel Server  Management  Module
628       (Professional Edition).
629
630       "supermicro20" - This workaround option will work around several Super‐
631       micro IPMI 2.0 authentication issues on motherboards w/ Peppercon  IPMI
632       firmware.  The issues covered include handling invalid length authenti‐
633       cation codes. Those hitting  this  issue  may  see  "password  invalid"
634       errors.   Issue  observed on Supermicro H8QME with SIMSO daughter card.
635       Confirmed fixed on newerver firmware.
636
637       "sun20" - This workaround option will work work around several Sun IPMI
638       2.0  authentication issues. The issues covered include invalid lengthed
639       hash keys, improperly hashed keys, and invalid  cipher  suite  records.
640       Those  hitting  this  issue  may  see "password invalid" or "bmc error"
641       errors.  Issue observed on Sun Fire  4100/4200/4500  with  ILOM.   This
642       workaround automatically includes the "opensesspriv" workaround.
643
644       "opensesspriv"  - This workaround option will slightly alter FreeIPMI's
645       IPMI 2.0 connection protocol to workaround an invalid hashing algorithm
646       used  by  the  remote  system. The privilege level sent during the Open
647       Session stage of an IPMI 2.0 connection is sometimes invalid  and  used
648       for  hashing  keys instead of the privilege level sent during the RAKP1
649       connection stage. Those hitting this issue may see "password  invalid",
650       "k_g  invalid",  "bad rmcpplus status code", or "privilege level cannot
651       be obtained for  this  user  "  errors.  Issue  observed  on  Sun  Fire
652       4100/4200/4500  with  ILOM,  Inventec  5441/Dell  Xanadu II, Supermicro
653       X8DTH, Supermicro X8DTG, Supermicro X8DTU, and  Intel  S5500WBV/Penguin
654       Relion 700. This workaround is automatically triggered with the "sun20"
655       workaround.
656
657       "integritycheckvalue" - This workaround  option  will  work  around  an
658       invalid  integrity check value during an IPMI 2.0 session establishment
659       when using Cipher Suite ID 0. The integrity check  value  should  be  0
660       length, however the remote motherboard responds with a non-empty field.
661       Those hitting this issue may see "k_g invalid" errors.  Issue  observed
662       on  Supermicro  X8DTG,  Supermicro  X8DTU,  and  Intel S5500WBV/Penguin
663       Relion 700.
664

KNOWN ISSUES

666       On older operating systems, if you input your username,  password,  and
667       other  potentially  security  relevant information on the command line,
668       this information may be discovered by other users when using tools like
669       the  ps(1) command or looking in the /proc file system. It is generally
670       more secure to input password information with options like the  -P  or
671       -K  options.  Configuring security relevant information in the FreeIPMI
672       configuration file would also be an appropriate way to hide this infor‐
673       mation.
674
675       In  order  to  prevent  brute force attacks, some BMCs will temporarily
676       "lock up" after a number of remote authentication errors. You may  need
677       to  wait awhile in order to this temporary "lock up" to pass before you
678       may authenticate again.
679
680       IPMI specifications do not require BMCs  to  perform  a  power  control
681       operation before returning a completion code to the caller.  Therefore,
682       it is possible for ipmipower to return power status queries opposite of
683       what  you  are  expecting.   For example, if a "power off" operation is
684       performed, a BMC may return a successful completion code  to  ipmipower
685       before  the  "power  off"  operation  is actually performed. Subsequent
686       power status queries may return "on" for several seconds, until the BMC
687       actually performs the "power off" operation.
688

REPORTING BUGS

690       Report bugs to <freeipmi-users@gnu.org> or <freeipmi-devel@gnu.org>.
691
693       Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC.
694       Copyright (C) 2003-2007 The Regents of the University of California.
695
696       This program is free software; you can redistribute it and/or modify it
697       under the terms of the GNU General Public License as published  by  the
698       Free  Software Foundation; either version 2 of the License, or (at your
699       option) any later version.
700

SEE ALSO

702       freeipmi.conf(5), freeipmi(7), bmc-config(8)
703
704       http://www.gnu.org/software/freeipmi/
705
706
707
708ipmipower 0.8.8                   2010-07-21                      ipmipower(8)
Impressum