Title | Padding Length is 255 (max) |
CommandLine | ../ipsec/HTR_E_In_PadLen255.seq -pkt ../ipsec/HTR_E_PadLen255.def -cpp=-include ./ipsecaddr.def -log 43.html -ti Padding Length is 255 (max) |
TestVersion | REL_1_1 |
ToolVersion | REL_1_1 |
Start | 2000/07/31 19:21:47 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ../ipsec/HTR_E_PadLen255.def |
System | kame-freebsd |
TargetName | FreeBSD-3.4 Release + KAME-stable-20000704 |
HostName | target1.toba.tahi.org |
Type | host |
19:21:47 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
19:21:47 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdflush; flush; ^D target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="192.168.105.31" dst="192.168.103.20" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 | |
19:21:54 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.31" dst="192.168.103.20" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 192.168.105.31 192.168.103.20 esp 0x1000 -m transport -E des-cbc "01234567" ; dump; ^D 192.168.105.31 192.168.103.20 esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000) E: des-cbc 30313233 34353637 replay=0 flags=0x00000040 state=mature seq=0 pid=425 created: Jul 31 19:21:05 2000 current: Jul 31 19:21:05 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.105.31 192.168.103.20 esp 0x1000 -m transport -E des-cbc "01234567";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="192.168.105.31" dst="192.168.103.20" upperspec=any direction=in protocol=esp mode=transport | |
19:22:04 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.31" dst="192.168.103.20" upperspec=any direction=in protocol=esp mode=transport ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 192.168.105.31 192.168.103.20 any -P in ipsec esp/transport/192.168.105.31-192.168.103.20/require ; spddump; ^D 192.168.105.31[any] 192.168.103.20[any] any in ipsec esp/transport/192.168.105.31-192.168.103.20/require spid=44 seq=0 pid=426 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 192.168.105.31 192.168.103.20 any -P in ipsec esp/transport/192.168.105.31-192.168.103.20/require;spddump; echo $status 0 target1# ~ [EOT] |
*** Target testing phase *** |
|
19:22:14 | Start Capturing Packets (Link0) |
19:22:14 |
vSend(Link0,echo_request_from_host1_esp_pad_255) send echo_request_from_host1_esp_pad_255 |
19:22:14 | vRecv(Link0,ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1 |
19:22:14 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST1. OK |
|
19:22:20 | End |
Frame_Ether (length:562) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 2048 | Packet_IPv4 (length:548) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 548 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 50 | | | HeaderChecksum = 26659 calc(26659) | | | SourceAddress = 192.168.105.31 | | | DestinationAddress = 192.168.103.20 | | Hdr_ESP (length:528) | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = ealgo_descbc_012_pad_255 | | | IVEC = 30303030 30303030 | | | Decrypted (length:512) | | | | ESPPayload (length:255) | | | | | ICMPv4_EchoRequest (length:255) | | | | | | Type = 8 | | | | | | Code = 0 | | | | | | Checksum = 63742 calc(63742) | | | | | | Identifier = 0 | | | | | | SequenceNumber = 0 | | | | | | Payload (length:247) | | | | | | | data = ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffff | | | | Padding = 01020304 05060708 090a0b0c 0d0e0f10 11121314 15161718 191a1b1c 1d1e1f20 21222324 25262728 292a2b2c 2d2e2f30 31323334 35363738 393a3b3c 3d3e3f40 41424344 45464748 494a4b4c 4d4e4f50 51525354 55565758 595a5b5c 5d5e5f60 61626364 65666768 696a6b6c 6d6e6f70 71727374 75767778 797a7b7c 7d7e7f80 81828384 85868788 898a8b8c 8d8e8f90 91929394 95969798 999a9b9c 9d9e9fa0 a1a2a3a4 a5a6a7a8 a9aaabac adaeafb0 b1b2b3b4 b5b6b7b8 b9babbbc bdbebfc0 c1c2c3c4 c5c6c7c8 c9cacbcc cdcecfd0 d1d2d3d4 d5d6d7d8 d9dadbdc dddedfe0 e1e2e3e4 e5e6e7e8 e9eaebec edeeeff0 f1f2f3f4 f5f6f7f8 f9fafbfc fdfeff | | | | PadLength = 255 | | | | NextHeader = 1 | | | ICV = calc()
Frame_Ether (length:289) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 2048 | Packet_IPv4 (length:275) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 275 | | | Identifier = 95 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 26886 calc(26886) | | | SourceAddress = 192.168.103.20 | | | DestinationAddress = 192.168.105.31 | | ICMPv4_EchoReply (length:255) | | | Type = 0 | | | Code = 0 | | | Checksum = 255 calc(255) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:247) | | | | data = ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffff ===ns_to_router================================= ng compare _HETHER_nut2broadcast.DestinationAddress received:0:0:0:0:a0:a0 = ff:ff:ff:ff:ff:ff ng compare _HETHER_nut2broadcast.Type received:2048 = 2054 ng meta Frame_Ether.Packet_ARP != Frame_Ether.Packet_IPv4 ===echo_reply_to_host1=================================