Test Information

TitleLifetime of SA using time, ESP (NULL),ESP Authentication HMAC-MD5
CommandLine../ipsec/HTR_E_In_LifetimeSATime.seq -pkt ./HTR_E_LifetimeSA.def -cpp=-include ./ipsecaddr.def -log 83.html -ti Lifetime of SA using time, ESP (NULL),ESP Authentication HMAC-MD5
TestVersionREL_2_1_1
ToolVersionREL_3_3_2
Start2011/10/24 15:02:43
Tn/usr/local/v6eval//etc//tn.def
Nu/usr/local/v6eval//etc//nut.def
Pkt./HTR_E_LifetimeSA.def
Systemfreebsd-i386
TargetNamefreebsd-head
HostNameipv6-conf
Typehost

Test Sequence Execution Log

15:02:43Start

*** Target initialization phase ***
Target: Clear all SAD and SPD entries
15:02:43 vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecClearAll.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 ''
Connected

# 
# /sbin/setkey -c <<EOD
spdflush;
flush;
EOD

# # sendMessagesSync: never got /sbin/setkey -c <<EODspdflush;flush;EOD
echo $status
0~
[EOT]

Target: Set SAD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp stime=35 htime=35 ealgo=null eauth=hmac-md5 eauthkey=TAHITEST89ABCDEF
15:02:48 vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSAD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp stime=35 htime=35 ealgo=null eauth=hmac-md5 eauthkey=TAHITEST89ABCDEF ''
Connected

# 
# /sbin/setkey -c <<EOD
add 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
    esp 0x1000
    -m transport
    -lh 35
    -ls 35
    -E simple ""
    -A hmac-md5 "TAHITEST89ABCDEF"
;
dump;
EOD

line 6: WARNING: obsolete algorithm at [simple]
line 6: syntax error at []
parse failed, line 6.
# # sendMessagesSync: never got /sbin/setkey -c <<EODadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8    esp 0x1000    -m transport    -lh 35    -ls 35    -E simple ""    -A hmac-md5 "TAHITEST89ABCDEF";dump;EOD
echo $status
1~
[EOT]

Target: Set SPD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp-auth mode=transport
15:02:54 vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSPD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp-auth mode=transport ''
Connected

# 
# /sbin/setkey -c <<EOD
spdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
       any
       -P in ipsec
       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
;
spddump;
EOD

3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8[any] any
        in ipsec
        esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
        spid=83 seq=0 pid=1693
        refcnt=1
# # sendMessagesSync: never got /sbin/setkey -c <<EODspdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8       any       -P in ipsec       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require;spddump;EOD
echo $status
0~
[EOT]

Excute ipsecSetSPD time: 15:03:00.
*** Target testing phase ***
15:03:00Start Capturing Packets (Link0)
15:03:00 vSend(Link0,ra_to_nut)
send ra_to_nut
15:03:00 Wait 3 second
15:03:03 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:03 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Timer count: 9 sec
Warn
15:03:10 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:10 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Timer count: 16 sec
Warn
15:03:16 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:16 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Timer count: 22 sec
Warn
15:03:22 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:22 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Timer count: 28 sec
Warn
15:03:28 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:28 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Timer count: 34 sec
Warn
15:03:34 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
15:03:34 vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from NUT to HOST1.
Expire lifetime of SA, Timer count: 40 sec
OK
OK
15:03:40End

Packet Reverse Log