File: manpage-common-workaround-outofband-15-text.man

package info (click to toggle)
freeipmi 1.4.11-1.1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 21,952 kB
  • ctags: 18,990
  • sloc: ansic: 299,490; sh: 11,087; makefile: 1,958; perl: 1,078
file content (38 lines) | stat: -rw-r--r-- 2,115 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
.LP
\fIidzero\fR - This workaround flag will allow empty session IDs to be
accepted by the client.  It works around IPMI sessions that report
empty session IDs to the client.  Those hitting this issue may see
"session timeout" errors.  Issue observed on Tyan S2882 with M3289
BMC.
.LP
\fIunexpectedauth\fR - This workaround flag will allow unexpected non-null
authcodes to be checked as though they were expected.  It works around
an issue when packets contain non-null authentication data when they
should be null due to disabled per-message authentication.  Those
hitting this issue may see "session timeout" errors.  Issue observed
on Dell PowerEdge 2850,SC1425.  Confirmed fixed on newer firmware.
.LP
\fIforcepermsg\fR - This workaround flag will force per-message
authentication to be used no matter what is advertised by the remote
system.  It works around an issue when per-message authentication is
advertised as disabled on the remote system, but it is actually
required for the protocol.  Those hitting this issue may see "session
timeout" errors.  Issue observed on IBM eServer 325.
.LP
\fIendianseq\fR - This workaround flag will flip the endian of the session
sequence numbers to allow the session to continue properly.  It works
around IPMI 1.5 session sequence numbers that are the wrong endian.
Those hitting this issue may see "session timeout" errors.  Issue
observed on some Sun ILOM 1.0/2.0 (depends on service processor
endian).
.LP
\fInoauthcodecheck\fR - This workaround flag will tell FreeIPMI to not
check the authentication codes returned from IPMI 1.5 command
responses.  It works around systems that return invalid authentication
codes due to hashing or implementation errors.  Users are cautioned on
the use of this option, as it removes an authentication check
verifying the validity of a packet.  However, in most organizations,
this is unlikely to be a security issue.  Those hitting this issue may
see "connection timeout", "session timeout", or "password verification
timeout" errors.  Issue observed on Xyratex FB-H8-SRAY, Intel
Windmill, Quanta Winterfell, and Wiwynn Windmill.