Test Information

TitleExpand or shift Receive Window
CommandLine../ipsec/HTR_E_In_ReceiveWindow.seq -pkt ./HTR_E_ReceiveWindow.def -cpp=-include ./ipsecaddr.def -log 82.html -ti Expand or shift Receive Window
TestVersionREL_2_1_1
ToolVersionREL_3_3_2
Start2011/10/24 15:02:09
Tn/usr/local/v6eval//etc//tn.def
Nu/usr/local/v6eval//etc//nut.def
Pkt./HTR_E_ReceiveWindow.def
Systemfreebsd-i386
TargetNamefreebsd-head
HostNameipv6-conf
Typehost

Test Sequence Execution Log

15:02:09Start

*** Target initialization phase ***
Target: Clear all SAD and SPD entries
15:02:09 vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecClearAll.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 ''
Connected

# 
# /sbin/setkey -c <<EOD
spdflush;
flush;
EOD

# # sendMessagesSync: never got /sbin/setkey -c <<EODspdflush;flush;EOD
echo $status
0~
[EOT]

Target: Set SAD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp rsize=4 ealgo=null eauth=hmac-md5 eauthkey=TAHITEST89ABCDEF
15:02:14 vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSAD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp rsize=4 ealgo=null eauth=hmac-md5 eauthkey=TAHITEST89ABCDEF ''
Connected

# 
# /sbin/setkey -c <<EOD
add 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
    esp 0x1000
    -m transport
    -r 4
    -E simple ""
    -A hmac-md5 "TAHITEST89ABCDEF"
;
dump;
EOD

line 5: WARNING: obsolete algorithm at [simple]
line 5: syntax error at []
parse failed, line 5.
# # sendMessagesSync: never got /sbin/setkey -c <<EODadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8    esp 0x1000    -m transport    -r 4    -E simple ""    -A hmac-md5 "TAHITEST89ABCDEF";dump;EOD
echo $status
1~
[EOT]

Target: Set SPD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp-auth mode=transport
15:02:20 vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSPD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp-auth mode=transport ''
Connected

# 
# /sbin/setkey -c <<EOD
spdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
       any
       -P in ipsec
       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
;
spddump;
EOD

3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8[any] any
        in ipsec
        esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
        spid=82 seq=0 pid=1690
        refcnt=1
# # sendMessagesSync: never got /sbin/setkey -c <<EODspdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8       any       -P in ipsec       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require;spddump;EOD
echo $status
0~
[EOT]

*** Target testing phase ***
15:02:26Start Capturing Packets (Link0)
15:02:26 vSend(Link0,ra_to_nut)
send ra_to_nut
15:02:26 Wait 3 second

Sequence number = 4294967295
15:02:29 vSend(Link0,echo_request_from_host1_esp_2)
send echo_request_from_host1_esp_2
15:02:29 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
TUN doesn't shift receive window.
OK
15:02:35Clear Captured Packets (Link0)

Sequence number = 1
15:02:35 vSend(Link0,echo_request_from_host1_esp_2)
send echo_request_from_host1_esp_2
15:02:35 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
TUN seems to shift receive window.
TUN ignored left side sequence packet of receive window.
OK
15:02:41End

Packet Reverse Log