Title | Outbound ESP packet (3DES-CBC, HMAC-SHA1) |
CommandLine | ../ipsec/HTR_E_Out_3descbc_hmacsha1.seq -pkt ./HTR_E_3descbc_hmacsha1.def -cpp=-include ./ipsecaddr.def -log 12.html -ti Outbound ESP packet (3DES-CBC, HMAC-SHA1) |
TestVersion | REL_2_1_1 |
ToolVersion | REL_3_3_2 |
Start | 2011/10/24 14:24:42 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ./HTR_E_3descbc_hmacsha1.def |
System | freebsd-i386 |
TargetName | freebsd-head |
HostName | ipv6-conf |
Type | host |
14:24:42 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
14:24:42 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecClearAll.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 ''
Connected # # /sbin/setkey -c <<EOD spdflush; flush; EOD # # sendMessagesSync: never got /sbin/setkey -c <<EODspdflush;flush;EOD echo $status 0~ [EOT] |
Target: Set SAD entries: src="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=TAHITEST89ABCDEFGHIJKLMN eauth=hmac-sha1 eauthkey=TAHITEST89ABCDEF0123 | |
14:24:47 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSAD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=TAHITEST89ABCDEFGHIJKLMN eauth=hmac-sha1 eauthkey=TAHITEST89ABCDEF0123 ''
Connected # # /sbin/setkey -c <<EOD add 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 esp 0x1000 -m transport -E 3des-cbc "TAHITEST89ABCDEFGHIJKLMN" -A hmac-sha1 "TAHITEST89ABCDEF0123" ; dump; EOD 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000) E: 3des-cbc 54414849 54455354 38394142 43444546 4748494a 4b4c4d4e A: hmac-sha1 54414849 54455354 38394142 43444546 30313233 seq=0x00000000 replay=0 flags=0x00000040 state=mature created: Oct 25 10:03:01 2011 current: Oct 25 10:03:01 2011 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 sadb_seq=0 pid=1369 refcnt=1 # # sendMessagesSync: never got /sbin/setkey -c <<EODadd 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 esp 0x1000 -m transport -E 3des-cbc "TAHITEST89ABCDEFGHIJKLMN" -A hmac-sha1 "TAHITEST89ABCDEF0123";dump;EOD echo $status 0~ [EOT] |
Target: Set SPD entries: src="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" upperspec=any direction=out protocol=esp-auth mode=transport | |
14:24:52 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSPD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" upperspec=any direction=out protocol=esp-auth mode=transport ''
Connected # # /sbin/setkey -c <<EOD spdadd 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 any -P out ipsec esp/transport/3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8-3ffe:501:ffff:ff05:200:ff:fe00:c1c1/require ; spddump; EOD 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8[any] 3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] any out ipsec esp/transport/3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8-3ffe:501:ffff:ff05:200:ff:fe00:c1c1/require spid=11 seq=0 pid=1370 refcnt=1 # # sendMessagesSync: never got /sbin/setkey -c <<EODspdadd 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 any -P out ipsec esp/transport/3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8-3ffe:501:ffff:ff05:200:ff:fe00:c1c1/require;spddump;EOD echo $status 0~ [EOT] |
*** Target testing phase *** |
|
14:24:58 | Start Capturing Packets (Link0) |
14:24:58 |
vSend(Link0,ra_to_nut) send ra_to_nut |
14:24:58 | Wait 3 second |
14:25:01 |
vSend(Link0,echo_request_from_host1) send echo_request_from_host1 |
14:25:02 | vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1_esp) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1_esp |
14:25:02 | vRecv(Link0,ns_to_router_linkaddr ns_to_router) timeout:6 cntLimit:0 seektime:0 recv ns_to_router_linkaddr |
14:25:07 |
vSend(Link0,na_from_router_linkaddr) send na_from_router_linkaddr |
NC about Router was PROBE state, but now it's REACHABLE. | |
14:25:07 | vRecv(Link0,ns_to_router_linkaddr) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
14:25:13 | vRecv(Link0,ns_to_router_linkaddr) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST1. OK |
|
14:25:19 | End |
Frame_Ether (length:118) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:00:00:00:01 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:104) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 64 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:ff:fe00:a0a0 | | | DestinationAddress = ff02::1 | | ICMPv6_RA (length:64) | | | Type = 134 | | | Code = 0 | | | Checksum = 38752 calc(38752) | | | CurHopLimit = 64 | | | MFlag = 0 | | | OFlag = 0 | | | HFlag = 0 | | | Preference = 0 | | | Reserved = 0 | | | LifeTime = 1800 | | | ReachableTime = 0 | | | RetransTimer = 0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 00:00:00:00:a0:a0 | | | Opt_ICMPv6_MTU (length:8) | | | | Type = 5 | | | | Length = 1 | | | | Reserved = 0 | | | | MTU = 1500 | | | Opt_ICMPv6_Prefix (length:32) | | | | Type = 3 | | | | Length = 4 | | | | PrefixLength = 64 | | | | LFlag = 1 | | | | AFlag = 1 | | | | RFlag = 0 | | | | Reserved1 = 0 | | | | ValidLifetime = 2592000 | | | | PreferredLifetime = 604800 | | | | Reserved2 = 0 | | | | Prefix = 3ffe:501:ffff:ff03::
Frame_Ether (length:76) | Hdr_Ether (length:14) | | DestinationAddress = 00:1c:23:09:f4:e8 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:62) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 22 | | | NextHeader = 17 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 | | | DestinationAddress = 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 | | Upp_UDP (length:22) | | | Hdr_UDP (length:8) | | | | SourcePort = 10000 | | | | DestinationPort = 7 | | | | Length = 22 | | | | Checksum = 64088 calc(64088) | | | Payload (length:14) | | | | data = 5061644c 656e2069 73205a65 726f
===ALGORITHM LISTS BEGIN==================== -------------------------------------------- frame=echo_reply_to_host1_esp ESP=ealgo_3descbc_012_hmacsha1_012 crypt=des3cbc("TAHITEST89ABCDEFGHIJKLMN") auth=hmacsha1("TAHITEST89ABCDEF0123") -------------------------------------------- ===ALGORITHM LISTS END====================== Frame_Ether (length:106) | Hdr_Ether (length:14) | | DestinationAddress = 00:00:00:00:a0:a0 | | SourceAddress = 00:1c:23:09:f4:e8 | | Type = 34525 | Packet_IPv6 (length:92) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 52 | | | NextHeader = 50 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 | | | DestinationAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 | | Hdr_ESP (length:52) | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = ealgo_3descbc_012_hmacsha1_012 | | | IVEC = 72ffb623 26b8e58a | | | Decrypted (length:24) | | | | ESPPayload (length:22) | | | | | Upp_UDP (length:22) | | | | | | Hdr_UDP (length:8) | | | | | | | SourcePort = 7 | | | | | | | DestinationPort = 10000 | | | | | | | Length = 22 | | | | | | | Checksum = 64088 calc(64088) | | | | | | Payload (length:14) | | | | | | | data = 5061644c 656e2069 73205a65 726f | | | | Padding = | | | | PadLength = 0 | | | | NextHeader = 17 | | | ICV = 5b7ecfe1 8d31d58e 5b832ad4 calc(5b7ecfe1 8d31d58e 5b832ad4) ===echo_reply_to_host1_esp================================= applied algorithms={ealgo_3descbc_012_hmacsha1_012}
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 00:00:00:00:a0:a0 | | SourceAddress = 00:1c:23:09:f4:e8 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::21c:23ff:fe09:f4e8 | | | DestinationAddress = fe80::200:ff:fe00:a0a0 | | ICMPv6_NS (length:32) | | | Type = 135 | | | Code = 0 | | | Checksum = 1988 calc(1988) | | | Reserved = 0 | | | TargetAddress = fe80::200:ff:fe00:a0a0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 00:1c:23:09:f4:e8 ===ns_to_router_linkaddr=================================
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 00:1c:23:09:f4:e8 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:ff:fe00:a0a0 | | | DestinationAddress = fe80::21c:23ff:fe09:f4e8 | | ICMPv6_NA (length:32) | | | Type = 136 | | | Code = 0 | | | Checksum = 40240 calc(40240) | | | RFlag = 1 | | | SFlag = 1 | | | OFlag = 1 | | | Reserved = 0 | | | TargetAddress = fe80::200:ff:fe00:a0a0 | | | Opt_ICMPv6_TLL (length:8) | | | | Type = 2 | | | | Length = 1 | | | | LinkLayerAddress = 00:00:00:00:a0:a0