| Title | Inbound ESP (DES-CBC) packet (Invalid Encryption Key) |
| CommandLine | ./HTR_E_In_EncryptKey_descbc.seq -pkt ./HTR_E_EncryptKey_descbc.def -log 67.html -ti Inbound ESP (DES-CBC) packet (Invalid Encryption Key) |
| TestVersion | REL_2_1_1 |
| ToolVersion | REL_3_3_2 |
| Start | 2011/10/24 16:00:50 |
| Tn | /usr/local/v6eval//etc//tn.def |
| Nu | /usr/local/v6eval//etc//nut.def |
| Pkt | ./HTR_E_EncryptKey_descbc.def |
| System | freebsd-i386 |
| TargetName | freebsd-head |
| HostName | ipv6-conf |
| Type | host |
| 16:00:50 | Start |
|
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
| 16:00:50 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecClearAll.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 ''
Connected # # /sbin/setkey -c <<EOD spdflush; flush; EOD # # sendMessagesSync: never got /sbin/setkey -c <<EODspdflush;flush;EOD echo $status 0~ [EOT] |
| Target: Set SAD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=TAHITEST | |
| 16:00:56 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSAD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=TAHITEST ''
Connected
#
# /sbin/setkey -c <<EOD
add 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
esp 0x1000
-m transport
-E des-cbc "TAHITEST"
;
dump;
EOD
3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000)
E: des-cbc 54414849 54455354
seq=0x00000000 replay=0 flags=0x00000040 state=mature
created: Oct 25 11:39:10 2011 current: Oct 25 11:39:10 2011
diff: 0(s) hard: 0(s) soft: 0(s)
last: hard: 0(s) soft: 0(s)
current: 0(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
sadb_seq=0 pid=1587 refcnt=1
# # sendMessagesSync: never got /sbin/setkey -c <<EODadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 esp 0x1000 -m transport -E des-cbc "TAHITEST";dump;EOD
echo $status
0~
[EOT]
|
| Target: Set SPD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp mode=transport | |
| 16:01:03 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/freebsd-i386//ipsecSetSPD.rmt -t freebsd-i386 -u root -p v6eval -d cuau0 -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8" upperspec=any direction=in protocol=esp mode=transport ''
Connected
#
# /sbin/setkey -c <<EOD
spdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
any
-P in ipsec
esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
;
spddump;
EOD
3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8[any] any
in ipsec
esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require
spid=73 seq=0 pid=1588
refcnt=1
# # sendMessagesSync: never got /sbin/setkey -c <<EODspdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 any -P in ipsec esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8/require;spddump;EOD
echo $status
0~
[EOT]
|
|
*** Target testing phase *** |
|
| 16:01:09 | Start Capturing Packets (Link0) |
| 16:01:09 |
vSend(Link0,ra_to_nut) send ra_to_nut |
| 16:01:09 | Wait 3 second |
| 16:01:12 |
vSend(Link0,echo_request_from_host1_esp) send echo_request_from_host1_esp |
| 16:01:12 | vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1 |
| 16:01:12 | vRecv(Link0,ns_to_router_linkaddr ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
|
TN received echo reply from NUT to HOST1. |
|
| 16:01:18 |
vSend(Link0,echo_request_from_host1_esp_2) send echo_request_from_host1_esp_2 |
| 16:01:18 | vRecv(Link0,ns_to_router_linkaddr ns_to_router echo_reply_to_host1_2) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
|
TN received no echo reply packet from NUT to HOST1. TN ignored the invalid encryption key OK |
|
| 16:01:24 | End |
Frame_Ether (length:118) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:00:00:00:01 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:104) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 64 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:ff:fe00:a0a0 | | | DestinationAddress = ff02::1 | | ICMPv6_RA (length:64) | | | Type = 134 | | | Code = 0 | | | Checksum = 38752 calc(38752) | | | CurHopLimit = 64 | | | MFlag = 0 | | | OFlag = 0 | | | HFlag = 0 | | | Preference = 0 | | | Reserved = 0 | | | LifeTime = 1800 | | | ReachableTime = 0 | | | RetransTimer = 0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 00:00:00:00:a0:a0 | | | Opt_ICMPv6_MTU (length:8) | | | | Type = 5 | | | | Length = 1 | | | | Reserved = 0 | | | | MTU = 1500 | | | Opt_ICMPv6_Prefix (length:32) | | | | Type = 3 | | | | Length = 4 | | | | PrefixLength = 64 | | | | LFlag = 1 | | | | AFlag = 1 | | | | RFlag = 0 | | | | Reserved1 = 0 | | | | ValidLifetime = 2592000 | | | | PreferredLifetime = 604800 | | | | Reserved2 = 0 | | | | Prefix = 3ffe:501:ffff:ff03::
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 00:1c:23:09:f4:e8 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 50 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 | | | DestinationAddress = 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 | | Hdr_ESP (length:32) | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = ealgo_descbc_012 | | | IVEC = 00000000 00000000 | | | Decrypted (length:16) | | | | ESPPayload (length:14) | | | | | ICMPv6_EchoRequest (length:14) | | | | | | Type = 128 | | | | | | Code = 0 | | | | | | Checksum = 17131 calc(17131) | | | | | | Identifier = 0 | | | | | | SequenceNumber = 0 | | | | | | Payload (length:6) | | | | | | | data = 44617461 2031 | | | | Padding = | | | | PadLength = 0 | | | | NextHeader = 58 | | | ICV = calc()
Frame_Ether (length:68)
| Hdr_Ether (length:14)
| | DestinationAddress = 00:00:00:00:a0:a0
| | SourceAddress = 00:1c:23:09:f4:e8
| | Type = 34525
| Packet_IPv6 (length:54)
| | Hdr_IPv6 (length:40)
| | | Version = 6
| | | TrafficClass = 0
| | | FlowLabel = 0
| | | PayloadLength = 14
| | | NextHeader = 58
| | | HopLimit = 64
| | | SourceAddress = 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8
| | | DestinationAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1
| | ICMPv6_EchoReply (length:14)
| | | Type = 129
| | | Code = 0
| | | Checksum = 16875 calc(16875)
| | | Identifier = 0
| | | SequenceNumber = 0
| | | Payload (length:6)
| | | | data = 44617461 2031
===ns_to_router_linkaddr=================================
ng compare _HDR_IPV6_ns_to_router_linkaddr.HopLimit received:64 = 255
ng compare _HDR_IPV6_ns_to_router_linkaddr.DestinationAddress received:3ffe:501:ffff:ff05:200:ff:fe00:c1c1 = oneof(v6("fe80::200:ff:fe00:a0a0"),v6merge("FF02:0:0:0:0:1:FF00:0000",104,v6("fe80::200:ff:fe00:a0a0")))
ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_EchoReply
===ns_to_router=================================
ng compare _HDR_IPV6_ns_to_router.HopLimit received:64 = 255
ng compare _HDR_IPV6_ns_to_router.DestinationAddress received:3ffe:501:ffff:ff05:200:ff:fe00:c1c1 = oneof(v6("3ffe:501:ffff:ff03:200:ff:fe00:a0a0"),v6merge("FF02:0:0:0:0:1:FF00:0000",104,v6("3ffe:501:ffff:ff03:200:ff:fe00:a0a0")))
ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_EchoReply
===echo_reply_to_host1=================================
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 00:1c:23:09:f4:e8 | | SourceAddress = 00:00:00:00:a0:a0 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 50 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 | | | DestinationAddress = 3ffe:501:ffff:ff03:21c:23ff:fe09:f4e8 | | Hdr_ESP (length:32) | | | SPI = 4096 | | | SequenceNumber = 2 | | | algorithm = ealgo_descbc_foo | | | IVEC = 00000000 00000000 | | | Decrypted (length:16) | | | | ESPPayload (length:14) | | | | | ICMPv6_EchoRequest (length:14) | | | | | | Type = 128 | | | | | | Code = 0 | | | | | | Checksum = 17130 calc(17130) | | | | | | Identifier = 0 | | | | | | SequenceNumber = 0 | | | | | | Payload (length:6) | | | | | | | data = 44617461 2032 | | | | Padding = | | | | PadLength = 0 | | | | NextHeader = 58 | | | ICV = calc()