$ ipmitool -I lan -H 192.168.1.211 -U admin -vvvv raw 0x04 0x2d 0x50 Password: Data length = 1 RAW REQ (channel=0x0 netfn=0x4 lun=0x0 cmd=0x2d data_len=1) RAW REQUEST (1 bytes) 50 ipmi_lan_send_cmd:opened=[0], open=[134871920] IPMI LAN host 192.168.1.211 port 623 Sending IPMI/RMCP presence ping packet send_packet (12 bytes) 06 00 ff 06 00 00 11 be 80 00 00 00 recv_packet (28 bytes) 06 00 ff 06 be 11 00 00 40 00 00 10 00 00 1b f2 03 00 00 00 81 00 00 00 00 00 00 00 Received IPMI/RMCP response packet: IPMI Supported ASF Version 1.0 RMCP Version 1.0 RMCP Sequence 255 IANA Enterprise 7154 ipmi_lan_send_cmd:opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 send_packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 0e 04 35 recv_packet (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 14 04 00 00 00 00 00 8f ipmi message header (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 14 04 00 00 00 00 00 8f << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 IPMI Request Match found get_auth_capabilities (8 bytes) 01 14 04 00 00 00 00 00 Channel 01 Authentication Capabilities: Privilege Level : ADMINISTRATOR Auth Types : MD5 PASSWORD Per-msg auth : enabled User level auth : enabled Non-null users : enabled Null users : disabled Anonymous login : disabled Proceeding with AuthType MD5 ipmi_lan_send_cmd:opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 01 >> Rq Lun : 0 >> Command : 39 send_packet (38 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 18 20 18 c8 81 04 39 02 61 64 6d 69 6e 00 00 00 00 00 00 00 00 00 00 00 37 recv_packet (42 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 04 39 00 77 85 61 0d 4b 3e bf 1c 12 90 31 fb 8b 4a 62 99 cd f9 bf f8 ba ipmi message header (42 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 1c 81 1c 63 20 04 39 00 77 85 61 0d 4b 3e bf 1c 12 90 31 fb 8b 4a 62 99 cd f9 bf f8 ba << IPMI Response Session Header << Authtype : NONE << Sequence : 0x00000000 << Session ID : 0x00000000 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 39 << Compl Code : 0x00 IPMI Request Match found get_session_challenge (20 bytes) 77 85 61 0d 4b 3e bf 1c 12 90 31 fb 8b 4a 62 99 cd f9 bf f8 Opening Session Session ID : 0d618577 Challenge : 4b3ebf1c129031fb8b4a6299cdf9bff8 Privilege Level : ADMINISTRATOR Auth Type : MD5 ipmi_lan_send_cmd:opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : MD5 >> Sequence : 0x00000000 >> Session ID : 0x0d618577 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 02 >> Rq Lun : 0 >> Command : 3a MD5 AuthCode : 8f93a0655add457cbb7da4e3f0ad368a send_packet (59 bytes) 06 00 ff 07 02 00 00 00 00 77 85 61 0d 8f 93 a0 65 5a dd 45 7c bb 7d a4 e3 f0 ad 36 8a 1d 20 18 c8 81 08 3a 02 04 4b 3e bf 1c 12 90 31 fb 8b 4a 62 99 cd f9 bf f8 de 34 e2 8f 35 recv_packet (48 bytes) 06 00 ff 07 02 de 34 e2 8f 77 85 61 0d 55 b3 b5 a5 d8 0b 5d e6 dd ce e9 ce 01 e3 b0 14 12 81 1c 63 20 08 3a 00 02 77 85 61 0d 09 00 00 00 04 25 ipmi message header (48 bytes) 06 00 ff 07 02 de 34 e2 8f 77 85 61 0d 55 b3 b5 a5 d8 0b 5d e6 dd ce e9 ce 01 e3 b0 14 12 81 1c 63 20 08 3a 00 02 77 85 61 0d 09 00 00 00 04 25 << IPMI Response Session Header << Authtype : MD5 << Sequence : 0x8fe234de << Session ID : 0x0d618577 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 3a << Compl Code : 0x00 IPMI Request Match found activate_session (10 bytes) 02 77 85 61 0d 09 00 00 00 04 Session Activated Auth Type : MD5 Max Priv Level : ADMINISTRATOR Session ID : 0d618577 Inbound Seq : 00000009 ipmi_lan_send_cmd:opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : MD5 >> Sequence : 0x00000009 >> Session ID : 0x0d618577 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 03 >> Rq Lun : 0 >> Command : 3b MD5 AuthCode : 80966191b8156b8c10f1b062008022f5 send_packet (38 bytes) 06 00 ff 07 02 09 00 00 00 77 85 61 0d 80 96 61 91 b8 15 6b 8c 10 f1 b0 62 00 80 22 f5 08 20 18 c8 81 0c 3b 04 34 recv_packet (39 bytes) 06 00 ff 07 02 df 34 e2 8f 77 85 61 0d cd ac 3b 5d f7 cf 62 2b c1 2b aa d2 68 c2 5c 55 09 81 1c 63 20 0c 3b 00 04 95 ipmi message header (39 bytes) 06 00 ff 07 02 df 34 e2 8f 77 85 61 0d cd ac 3b 5d f7 cf 62 2b c1 2b aa d2 68 c2 5c 55 09 81 1c 63 20 0c 3b 00 04 95 << IPMI Response Session Header << Authtype : MD5 << Sequence : 0x8fe234df << Session ID : 0x0d618577 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 IPMI Request Match found set_session_privlvl (1 bytes) 04 Set Session Privilege Level to ADMINISTRATOR opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : MD5 >> Sequence : 0x0000000a >> Session ID : 0x0d618577 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 04 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 04 >> Rq Lun : 0 >> Command : 2d MD5 AuthCode : 6a367e423fe04e4caf37d53a7c08a293 send_packet (38 bytes) 06 00 ff 07 02 0a 00 00 00 77 85 61 0d 6a 36 7e 42 3f e0 4e 4c af 37 d5 3a 7c 08 a2 93 08 20 10 d0 81 10 2d 50 f2 recv_packet (41 bytes) 06 00 ff 07 02 e0 34 e2 8f 77 85 61 0d 0d 33 55 eb ce ef c9 4d 16 34 ba 04 c2 a7 f4 7c 0b 81 14 6b 20 10 2d 00 00 e0 00 c3 ipmi message header (41 bytes) 06 00 ff 07 02 e0 34 e2 8f 77 85 61 0d 0d 33 55 eb ce ef c9 4d 16 34 ba 04 c2 a7 f4 7c 0b 81 14 6b 20 10 2d 00 00 e0 00 c3 << IPMI Response Session Header << Authtype : MD5 << Sequence : 0x8fe234e0 << Session ID : 0x0d618577 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 05 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 04 << Rs Lun : 0 << Command : 2d << Compl Code : 0x00 IPMI Request Match found RAW RSP (3 bytes) 00 e0 00 ipmi_lan_send_cmd:opened=[1], open=[134871920] >> IPMI Request Session Header >> Authtype : MD5 >> Sequence : 0x0000000b >> Session ID : 0x0d618577 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 05 >> Rq Lun : 0 >> Command : 3c MD5 AuthCode : a611e16b400c65cb4e8b55a8033aad18 send_packet (41 bytes) 06 00 ff 07 02 0b 00 00 00 77 85 61 0d a6 11 e1 6b 40 0c 65 cb 4e 8b 55 a8 03 3a ad 18 0b 20 18 c8 81 14 3c 77 85 61 0d c5 recv_packet (38 bytes) 06 00 ff 07 02 e1 34 e2 8f 77 85 61 0d 49 6f d4 17 4a fa e5 cc dc 0a c9 be 4b 57 8f 46 08 81 1c 63 20 14 3c 00 90 ipmi message header (38 bytes) 06 00 ff 07 02 e1 34 e2 8f 77 85 61 0d 49 6f d4 17 4a fa e5 cc dc 0a c9 be 4b 57 8f 46 08 81 1c 63 20 14 3c 00 90 << IPMI Response Session Header << Authtype : MD5 << Sequence : 0x8fe234e1 << Session ID : 0x0d618577 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 05 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 IPMI Request Match found Closed Session 0d618577