NAME¶
openipmi_cmdparms - Connection parmeters for OpenIPMI
SYNOPSIS¶
smi smi-num
lan [
-U username] [
-P password] [
-p[2]
port] [
-A authtype] [
-L privilege]
[
-s] [
-Ra auth alg] [
-Ri integ alg]
[
-Rc conf algo] [
-Rl] [
-Rk bmc key]
[
-H hackname]
host [
host]
DESCRIPTION¶
The connection parameters for OpenIPMI vary depending on the connection type.
This document describes the standard connection types; others may be available
from OEMs.
OPTIONS¶
- smi-num
- The SMI interface for the local connection. There may be more than one BMC
connection on a system and they are generally numbered, like
/dev/ipmi0, /dev/ipmi1, etc.
- -U username
- Use the given username for the LAN connection. If none is given,
then no username is used.
- -P password
- The password to use for the connection. If none is given, the user
is assumed to have an empty password
- -p[2] port
- The UCP port to connect to. This defaults to the standard 623 port,
so it is not necessary unless a special port is required. Note that since
you can have two connections (hosts), -p is for the first host and
-p2 is for the second host.
- -A authtype
- The authentication type to use, one of rmcp+, md5,
md2, straight, or none. If you don't supply this, the
most secure one available is chosen, in the order given in the previous
list.
- -L privilege
- The privilege to use for the connection. Lower privileges cannot
execute some commands. Privileges are: callback, user,
operator, admin, and oem. The default is
admin.
- -Ra authentication algorithm
- Set the RMCP+ authentication algorithm to use. Options are:
bmcpick, rakp_none, rakp_hmac_sha1, and
rakp_hmac_md5. The bmcpick option is used by default, which
means the BMC picks the algorithm it wants to use.
- -Ri integrity algorithm
- The RMCP+ integrity algorithm to use. This ensures that the data
has not be altered between the sender and receiver. Valid options are:
bmcpick, none, hmac_sha1, hmac_md5, and
md5. The bmcpick option is used by default, which means the
BMC picks the algorithm it wants to use.
- -Rc confidentiality algorithm
- The RMCP+ confidentiality (encryption) algorithm to use. This keeps
evesdroppers from seeing the data. Valid values are: bmcpick,
aes_cbc_128, xrc4_128, and xrc_40. The bmcpick
option is used by default, which means the BMC picks the algorithm it
wants to use.
- -Rl
- If this is specified, the username is looked up using the privilege level
along with the username. This allows the same name to have different
passwords with different privilege levels.
- -Rk BMC Key
- If the system requires two-key lookups, this specifies the second
key (the BMC key) to use. This is ignored if two-key lookups are not
enabled by the BMC.
- -H hackname
- Well, it always happens. Things in the field don't work quite like they
are supposed to. There was some vagueness in the first IPMI specs and
different vendors interpreted RMCP+ in different ways. This allows
different options to be supported. Try different hacks if your RMCP+
systems don't authenticate properly. These are:
- rakp3_wrong_rolem
- Some systems use the incorrect Role(m) field in a specific authentication
message (the RAKP3 message). This is a common problem.
- rmcpp_integ_sik
- The original IPMI 2.0 spec specified the incorrect key to use for the
integrity key. This forces use of the Session Initiation Key. The default
is to use K(1)
- -s
- Make two connections to the BMC. This means the BMC has two different IP
addresses/ports that are equivalent. If this is specified, a second host
must be supplied. This is not the same as two connections to two different
BMCs. This must be a connection to the same BMC.
- host
- The IP address (either by name lookup or specified directly) to connect
to. If the -s is specified, two hosts must be supplied.
The
-Ra,
-Ri,
-Rc,
-Rk and
-Rl options only
apply to RMCP+ connections and will be ignored if the connection does not
support RMCP+ or if a non-RMCP+ authentication type is specified.
SEE ALSO¶
ipmish(8),
openipmicmd(8),
solterm(1)
KNOWN PROBLEMS¶
This is excessively complicated, but the defaults should be good.
AUTHOR¶
Corey Minyard <cminyard@mvista.org>