Title | DAD Success when NUT received NS (Src addr is Unicast) on Stateless Link-local address autoconfiguration |
CommandLine | ./DADSuccess_DADPostSendNS.seq -pkt LLOCAL_irregNS_src_ucast.def addrconf=boot -log 17.html -ti DAD Success when NUT received NS (Src addr is Unicast) on Stateless Link-local address autoconfiguration |
TestVersion | |
ToolVersion | undefined |
Start | 2000/06/12 19:46:18 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | LLOCAL_irregNS_src_ucast.def |
System | linux-v6 |
TargetName | Kernel 2.2.15 |
HostName | target.tahi.org |
Type | host |
19:46:18 | Start |
*** Target initialization phase *** Wait for NUT becomes ready (wait for login prompt). |
|
19:46:18 |
vRemote(loginout.rmt) ``/usr/local/v6eval//bin/linux-v6/loginout.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=20''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:41:04 on ttyS0 # # exit Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: ~ [EOT] |
No NUT initialization specified. *** Target testing phase *** |
|
19:46:22 | Start Capturing Packets (Link0) |
Wait for NUT becomes ready (wait for login prompt). |
|
19:46:22 |
vRemote(loginout.rmt) ``/usr/local/v6eval//bin/linux-v6/loginout.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=20''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:42:26 on ttyS0 # # exit Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: ~ [EOT] |
Remote boot NUT. |
|
19:46:27 |
vRemote(reboot_async.rmt) ``/usr/local/v6eval//bin/linux-v6/reboot_async.rmt -t linux-v6 -u root -p v6eval -d cuaa0c -o 1 timeout=5''
connected Kondara MNU/Linux Server release 1.1 (Asuka) Kernel 2.2.15-1ks3 on an i686 target.tahi.org login: root Password: Last login: Mon Jun 12 19:42:32 on ttyS0 # # reboot ~ [EOT] |
19:46:47 | wait 10 [sec] for shutdown NUT. |
TN wait the DAD NS sends from NUT (120 [sec]): dadns_from_NUT |
|
19:46:57 | vRecv(Link0,dadns_from_NUT dadns_any_from_NUT dadns_sll_any_from_NUT) timeout:120 cntLimit:0 seektime:0 recv dadns_sll_any_from_NUT |
Received packet count=1TN received irregular DAD NS. TN received the DAD NS sends from NUT. TN send the strange DAD Packet(dadpkt_to_NUT) to NUT, check if NUT ignore this. |
|
19:47:43 |
vSend(Link0,dadpkt_to_NUT) send dadpkt_to_NUT |
19:47:43 | Wait for NUT to finish DAD. (1 [sec]) |
19:47:44 | Wait 1 second |
Check if NUT's address is configured Send DAD NS from TN to NUT: chkconf_dadns_to_NUT |
|
19:47:45 |
vSend(Link0,chkconf_dadns_to_NUT) send chkconf_dadns_to_NUT |
Wait DAD NA from NUT: chkconf_dadna_from_NUT,chkconf_dadna_any_from_NUT,chkconf_dadna_notll_any_from_NUT |
|
19:47:45 | vRecv(Link0,chkconf_dadna_from_NUT chkconf_dadna_any_from_NUT chkconf_dadna_notll_any_from_NUT) timeout:5 cntLimit:0 seektime:960806865.537386 vRecv() return status=1 |
Received packet count=0 Wait DAD NA from NUT: timeout NUT's address is not configured. Note: There is a irregular DAD NS. NG *** EOT *** |
|
19:47:50 | End |
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:ff:0:24:da | | SourceAddress = 0:0:1:0:24:da | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = :: | | | DestinationAddress = ff02::1:ff00:24da | | ICMPv6_NS (length:32) | | | Type = 135 | | | Code = 0 | | | Checksum = 2448 calc(2448) | | | Reserved = 0 | | | TargetAddress = fe80::200:1ff:fe00:24da | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 0:0:1:0:24:da ===dadns_from_NUT================================= ng count Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_NS ===dadns_any_from_NUT================================= ng count Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_NS ===dadns_sll_any_from_NUT=================================
Frame_Ether (length:78) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:ff:0:24:da | | SourceAddress = 0:0:1:0:24:da | | Type = 34525 | Packet_IPv6 (length:64) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 24 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = fe80::200:1ff:fe00:24da | | | DestinationAddress = ff02::1:ff00:24da | | ICMPv6_NS (length:24) | | | Type = 135 | | | Code = 0 | | | Checksum = 2840 calc(2840) | | | Reserved = 0 | | | TargetAddress = fe80::200:1ff:fe00:24da
Frame_Ether (length:78) | Hdr_Ether (length:14) | | DestinationAddress = 33:33:ff:0:24:da | | SourceAddress = 0:0:1:0:25:a1 | | Type = 34525 | Packet_IPv6 (length:64) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 24 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = :: | | | DestinationAddress = ff02::1:ff00:24da | | ICMPv6_NS (length:24) | | | Type = 135 | | | Code = 0 | | | Checksum = 12403 calc(12403) | | | Reserved = 0 | | | TargetAddress = fe80::200:1ff:fe00:24da