IPMI LAN host 192.168.145.223 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND added list entry seq=0x00 cmd=0x38 >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << received packet (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 84 04 03 00 00 00 00 1c << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x00 cmd=0x38 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 << received packet (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 04 00 a4 a3 a2 a0 3d b1 7d 0f 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 <> Console generated random number (16 bytes) e7 9d b9 ed b1 8a fb 35 14 83 fa e8 bc d1 db 37 >> SENDING A RAKP 1 MESSAGE >> sending packet (50 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 22 00 00 00 00 00 3d b1 7d 0f e7 9d b9 ed b1 8a fb 35 14 83 fa e8 bc d1 db 37 14 00 00 06 55 53 45 52 49 44 << received packet (76 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 00 00 00 00 a4 a3 a2 a0 e3 f9 66 d1 89 f1 ed b5 3c 3d b7 03 dc fe 79 1c 90 e0 e3 4e b2 5b d9 11 9f ce 1c b3 76 1e 5e 00 26 fc 57 ec 90 d7 89 69 76 9f 70 fb f2 71 5a 8f 87 66 03 20 <> rakp2 mac input buffer (64 bytes) a4 a3 a2 a0 3d b1 7d 0f e7 9d b9 ed b1 8a fb 35 14 83 fa e8 bc d1 db 37 e3 f9 66 d1 89 f1 ed b5 3c 3d b7 03 dc fe 79 1c 90 e0 e3 4e b2 5b d9 11 9f ce 1c b3 76 1e 5e 00 14 06 55 53 45 52 49 44 >> rakp2 mac key (20 bytes) 50 41 53 53 57 30 52 44 00 00 00 00 00 00 00 00 00 00 00 00 >> rakp2 mac as computed by the remote console (20 bytes) 26 fc 57 ec 90 d7 89 69 76 9f 70 fb f2 71 5a 8f 87 66 03 20 >> rakp3 mac input buffer (28 bytes) e3 f9 66 d1 89 f1 ed b5 3c 3d b7 03 dc fe 79 1c a4 a3 a2 a0 14 06 55 53 45 52 49 44 >> rakp3 mac key (20 bytes) 50 41 53 53 57 30 52 44 00 00 00 00 00 00 00 00 00 00 00 00 generated rakp3 mac (20 bytes) 7b 7b 90 a7 8f a1 7a ae 48 f3 7e 6a 35 46 fb 01 3a 75 03 17 session integrity key input (40 bytes) e7 9d b9 ed b1 8a fb 35 14 83 fa e8 bc d1 db 37 e3 f9 66 d1 89 f1 ed b5 3c 3d b7 03 dc fe 79 1c 14 06 55 53 45 52 49 44 Generated session integrity key (20 bytes) 3f 6a a7 74 1d 69 fc 2c 2c e6 65 f0 0e e2 fc 34 52 38 75 ef Generated K1 (20 bytes) 66 bc 2d e0 49 82 5b fa 61 d1 7c 23 d2 98 f2 ec 3a 7b e2 32 Generated K2 (20 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 79 d9 b4 d1 >> SENDING A RAKP 3 MESSAGE >> sending packet (44 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00 00 00 00 00 3d b1 7d 0f 7b 7b 90 a7 8f a1 7a ae 48 f3 7e 6a 35 46 fb 01 3a 75 03 17 << received packet (36 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 14 00 00 00 00 00 a4 a3 a2 a0 ee 2f 32 1f 73 e9 bf 26 fb 5f 6d dc <> rakp4 mac input buffer (36 bytes) e7 9d b9 ed b1 8a fb 35 14 83 fa e8 bc d1 db 37 3d b1 7d 0f 90 e0 e3 4e b2 5b d9 11 9f ce 1c b3 76 1e 5e 00 >> rakp4 mac key (sik) (20 bytes) 3f 6a a7 74 1d 69 fc 2c 2c e6 65 f0 0e e2 fc 34 52 38 75 ef >> rakp4 mac as computed by the BMC (20 bytes) ee 2f 32 1f 73 e9 bf 26 fb 5f 6d dc dc fe 79 1c 90 e0 e3 4e >> rakp4 mac as computed by the remote console (20 bytes) ee 2f 32 1f 73 e9 bf 26 fb 5f 6d dc b1 36 27 02 56 f7 1d 6e IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 BUILDING A v2 COMMAND added list entry seq=0x01 cmd=0x3b >> Initialization vector (16 bytes) 98 4e 19 e1 08 ba 87 01 81 5d 76 9f 0a 9a 80 5e encrypting with this IV (16 bytes) 98 4e 19 e1 08 ba 87 01 81 5d 76 9f 0a 9a 80 5e encrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 encrypting this data (16 bytes) 20 18 c8 81 04 3b 04 3c 01 02 03 04 05 06 07 07 authcode input (48 bytes) 06 c0 3d b1 7d 0f 03 00 00 00 20 00 98 4e 19 e1 08 ba 87 01 81 5d 76 9f 0a 9a 80 5e f9 42 47 4d 25 53 bb 31 c8 e0 e5 f0 a5 1e fd db ff ff 02 07 authcode output (12 bytes) d4 cb c4 e6 67 01 e5 ad b5 35 a2 d8 >> sending packet (64 bytes) 06 00 ff 07 06 c0 3d b1 7d 0f 03 00 00 00 20 00 98 4e 19 e1 08 ba 87 01 81 5d 76 9f 0a 9a 80 5e f9 42 47 4d 25 53 bb 31 c8 e0 e5 f0 a5 1e fd db ff ff 02 07 d4 cb c4 e6 67 01 e5 ad b5 35 a2 d8 << received packet (62 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 01 00 00 00 20 00 8d fb 4d c4 b3 93 d5 b3 51 46 dc 92 f4 fc 46 0c 6d 7b c0 22 e5 7f b5 63 a5 64 0e 5e 3f 10 91 15 00 07 16 9b 65 85 f1 f0 f0 7f 56 e2 02 ab Validating authcode K1 (20 bytes) 66 bc 2d e0 49 82 5b fa 61 d1 7c 23 d2 98 f2 ec 3a 7b e2 32 Authcode Input Data (46 bytes) 06 c0 a4 a3 a2 a0 01 00 00 00 20 00 8d fb 4d c4 b3 93 d5 b3 51 46 dc 92 f4 fc 46 0c 6d 7b c0 22 e5 7f b5 63 a5 64 0e 5e 3f 10 91 15 00 07 Generated authcode (12 bytes) 16 9b 65 85 f1 f0 f0 7f 56 e2 02 ab Expected authcode (12 bytes) 16 9b 65 85 f1 f0 f0 7f 56 e2 02 ab decrypting with this IV (16 bytes) 8d fb 4d c4 b3 93 d5 b3 51 46 dc 92 f4 fc 46 0c decrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 decrypting this data (16 bytes) 6d 7b c0 22 e5 7f b5 63 a5 64 0e 5e 3f 10 91 15 Decrypted 16 encrypted bytes Decrypted this data (16 bytes) 81 1c 63 20 04 3b 00 04 9d 01 02 03 04 05 06 06 << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 32 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x01 cmd=0x3b set_session_privlvl (1 bytes) 04 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x00 >> command : 0x01 >> data : BUILDING A v2 COMMAND added list entry seq=0x02 cmd=0x01 >> Initialization vector (16 bytes) c8 3f 84 5b ef de 30 0c f3 56 8d b2 68 df 2c 1f encrypting with this IV (16 bytes) c8 3f 84 5b ef de 30 0c f3 56 8d b2 68 df 2c 1f encrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 encrypting this data (16 bytes) 20 00 e0 81 08 01 76 01 02 03 04 05 06 07 08 08 authcode input (48 bytes) 06 c0 3d b1 7d 0f 04 00 00 00 20 00 c8 3f 84 5b ef de 30 0c f3 56 8d b2 68 df 2c 1f 8a 98 39 1c c4 79 da 90 bf 87 98 1d a3 7d 2e 58 ff ff 02 07 authcode output (12 bytes) 20 7c b5 7e e7 ec bd 4a 54 7a a3 9d >> sending packet (64 bytes) 06 00 ff 07 06 c0 3d b1 7d 0f 04 00 00 00 20 00 c8 3f 84 5b ef de 30 0c f3 56 8d b2 68 df 2c 1f 8a 98 39 1c c4 79 da 90 bf 87 98 1d a3 7d 2e 58 ff ff 02 07 20 7c b5 7e e7 ec bd 4a 54 7a a3 9d << received packet (62 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 02 00 00 00 20 00 16 bd 57 eb 19 f2 bd 95 ab cb 9b cb 09 a4 52 4a 3b ab c8 69 ae ed a7 e5 48 ee cb 04 10 75 76 58 00 07 66 34 ae 2b 6a de 54 ce cd fd ba 81 Validating authcode K1 (20 bytes) 66 bc 2d e0 49 82 5b fa 61 d1 7c 23 d2 98 f2 ec 3a 7b e2 32 Authcode Input Data (46 bytes) 06 c0 a4 a3 a2 a0 02 00 00 00 20 00 16 bd 57 eb 19 f2 bd 95 ab cb 9b cb 09 a4 52 4a 3b ab c8 69 ae ed a7 e5 48 ee cb 04 10 75 76 58 00 07 Generated authcode (12 bytes) 66 34 ae 2b 6a de 54 ce cd fd ba 81 Expected authcode (12 bytes) 66 34 ae 2b 6a de 54 ce cd fd ba 81 decrypting with this IV (16 bytes) 16 bd 57 eb 19 f2 bd 95 ab cb 9b cb 09 a4 52 4a decrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 decrypting this data (16 bytes) 3b ab c8 69 ae ed a7 e5 48 ee cb 04 10 75 76 58 Decrypted 16 encrypted bytes Decrypted this data (16 bytes) 81 04 7b 20 08 01 00 21 01 40 00 75 01 02 03 03 << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 32 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 01 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 01 << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x02 cmd=0x01 Chassis Power is on >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0x3d 0xb1 0x7d 0x0f BUILDING A v2 COMMAND added list entry seq=0x03 cmd=0x3c >> Initialization vector (16 bytes) 95 19 31 a0 ba 93 81 94 2f 9b fa 3c e7 c6 e0 0d encrypting with this IV (16 bytes) 95 19 31 a0 ba 93 81 94 2f 9b fa 3c e7 c6 e0 0d encrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 encrypting this data (16 bytes) 20 18 c8 81 0c 3c 3d b1 7d 0f bd 01 02 03 04 04 authcode input (48 bytes) 06 c0 3d b1 7d 0f 05 00 00 00 20 00 95 19 31 a0 ba 93 81 94 2f 9b fa 3c e7 c6 e0 0d 93 f4 73 39 f4 c4 1b b4 7b e1 28 18 c4 06 1a e2 ff ff 02 07 authcode output (12 bytes) 32 d4 85 1a ea 59 0f 3c ea 19 68 fc >> sending packet (64 bytes) 06 00 ff 07 06 c0 3d b1 7d 0f 05 00 00 00 20 00 95 19 31 a0 ba 93 81 94 2f 9b fa 3c e7 c6 e0 0d 93 f4 73 39 f4 c4 1b b4 7b e1 28 18 c4 06 1a e2 ff ff 02 07 32 d4 85 1a ea 59 0f 3c ea 19 68 fc << received packet (62 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 03 00 00 00 20 00 a2 0d a8 74 15 da c6 7c ef 7c 45 86 00 0f 85 e9 f3 56 ab a5 db 1d 9d 73 aa c9 a7 26 6a 62 d6 78 00 07 fb 83 14 2d 15 2e 9f 32 da 67 09 49 Validating authcode K1 (20 bytes) 66 bc 2d e0 49 82 5b fa 61 d1 7c 23 d2 98 f2 ec 3a 7b e2 32 Authcode Input Data (46 bytes) 06 c0 a4 a3 a2 a0 03 00 00 00 20 00 a2 0d a8 74 15 da c6 7c ef 7c 45 86 00 0f 85 e9 f3 56 ab a5 db 1d 9d 73 aa c9 a7 26 6a 62 d6 78 00 07 Generated authcode (12 bytes) fb 83 14 2d 15 2e 9f 32 da 67 09 49 Expected authcode (12 bytes) fb 83 14 2d 15 2e 9f 32 da 67 09 49 decrypting with this IV (16 bytes) a2 0d a8 74 15 da c6 7c ef 7c 45 86 00 0f 85 e9 decrypting with this key (16 bytes) 1a 3d 50 45 2f 3f f5 c8 cc 19 33 4a 86 0a 93 70 decrypting this data (16 bytes) f3 56 ab a5 db 1d 9d 73 aa c9 a7 26 6a 62 d6 78 Decrypted 16 encrypted bytes Decrypted this data (16 bytes) 81 1c 63 20 0c 3c 00 98 01 02 03 04 05 06 07 07 << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000003 << IPMI Msg/Payload Length : 32 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 IPMI Request Match found removed list entry seq=0x03 cmd=0x3c Closed Session 0f7db13d