About Us Products Solutions Support News Where To Buy
About Us Company Milestones Investor Relations Careers Contact Policies Sitemap
SuperServer® SuperBlade® MicroBlade Motherboards Chassis Accessories AMD Solutions
RSD Data Management Virtualization® Cloud® Software Defined Storage Big Data
Support Downloads Online Support Onsite Services Manual QRG RMA Warranty
Newsroom Events & Conferences News View Video Press Releases
Asia / Middle East Pan Europe North America Central America South America Other Regions GSA
Super Micro Computer, Inc.
Contact Us


 Support Home
 Online Support FAQ Search OS Compatibility
 Onsite Services
 Quick References

FAQ Search

Category:  Hardware Monitoring
Keyword:  IPMI
1833 FAQs Found

PAGE OF 184   
Question Date
1 Though I can create a user account at the Debug tool site, Can I know how the “dbgtools.supermicro.com” debug tools work?

By using a non-HTTPS site, requiring the customer to log in to their own servers’ IPMI interface with administrative privileges, it certainly is not a good idea. Plus, our IPMI interface IP is in our private non-routable subnet, I don’t think Supermicro can run the test remotely.

Pleaes feel free to correct me if I mis-understand how the dbgtools.supermicro.com tool works.
2 We are checking for status of IPMI firmware in regards to several CVEs related to SSH module (Dropbear)

Do you have a fix for it for X8, X9, X10 motherboards?
According to its self-reported version in its banner, Dropbear SSH running on the remote host is prior to 2016.74. It is, therefore, affected by the following vulnerabilities:

A format string flaw exists due to improper handling of string format specifiers (e.g., %s and %x) in usernames and host arguments. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2016-7406)

A flaw exists in drop bear convert due to improper handling of specially crafted OpenSSH key files. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2016-7407)

A flaw exists in DB client when handling the -m or -c arguments in scripts. An unauthenticated, remote attacker can exploit this, via a specially crafted script, to execute arbitrary code. (CVE-2016-7408)
A flaw exists in DB client or drop bear server if they are compiled with the DEBUG_TRACE option and then run using the -v switch. A local attacker can exploit this to disclose process memory. (CVE-2016-7409)
3 We are using X11SSL-CF and have firmware 1.15, the iKVM/HTML5 missing from the X11SSL-CF IPMI. 04/17/17
4 Is there a programming guide for IPMI commands and syntax? In a 1U, the fans are normally controlled by a BMC. But when you have 4x BMC in the same enclosure, who controls the fans? 04/14/17
5 For IPMI service, the “service start” approach didn’t seem to work. I tried the “modprobe” approach, but IPMI tool returned the error message "Could not open device at /dev/ipmi0 or /dev/ipmi/0 or /dev/ipmidev/0: No such file or directory" 04/14/17
6 On Linux, is it possible to install IPMIView using yum? 04/14/17
7 Do you know if Microblade BMC IPMI firmware supports REDFISH? 04/14/17
8 We use ssh-port-forwarding for TCP/5900 to run the iKVM.jar locally which works fine for the 150 other SuperMicro machines we have, but not for these new two as now UDP/623 (the 'Virtual Media Port') is also required and ssh-port-forwarding can ONLY use TCP, not UDP.

How to use iKVM.jar behind TCP forwarded ports?
9 Would like to report a minor bug which seems to be present in some redfish firmware’s.

IPMI 03.48 in Configuration - Network I have given a name to the server.
Now I want to delete this name but I can not delete it in any way.
10 Been going through your online FAQ’s and some searches on the Internet – haven’t been able to find the raw bits to return the IPMI (BMC) MAC using ipmitool. Can you assist? 04/07/17

Information in this document is subject to change without notice.
Other products and companies referred to herein are trademarks or registered trademarks of their respective companies or mark holders.