Test Infomation

TitleInbound ESP packet (Invalid Authentication Key)
CommandLine./HTR_E_In_AuthKey.seq -pkt ./HTR_E_AuthKey.def -log 48.html -ti Inbound ESP packet (Invalid Authentication Key)
TestVersionREL_1_1
ToolVersionREL_1_1
Start2000/07/31 18:41:38
Tn/usr/local/v6eval//etc//tn.def
Nu/usr/local/v6eval//etc//nut.def
Pkt./HTR_E_AuthKey.def
Systemkame-freebsd
TargetNameFreeBSD-3.4 Release + KAME-stable-20000704
HostNametarget1.toba.tahi.org
Typehost

Test Sequence Execution Log

18:41:38Start

*** Target initialization phase ***
Target: Clear all SAD and SPD entries
18:41:38 vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected

target1# 
target1# /usr/local/v6/sbin/setkey -c
spdflush;
flush;
^D
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush;
echo $status
0
target1# ~
[EOT]

Target: Set SAD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 eauth=hmac-md5 eauthkey=0123456789ABCDEF
18:41:45 vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 eauth=hmac-md5 eauthkey=0123456789ABCDEF ''
connected

target1# 
target1# /usr/local/v6/sbin/setkey -c
add 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0
    esp 0x1000
    -m transport
    -E des-cbc "01234567"
    -A hmac-md5 "0123456789ABCDEF"
;
dump;
^D
3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 
        esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000)
        E: des-cbc  30313233 34353637
        A: hmac-md5  30313233 34353637 38394142 43444546
        replay=0 flags=0x00000040 state=mature seq=0 pid=455
        created: Jul 31 18:40:57 2000   current: Jul 31 18:40:57 2000
        diff: 0(s)      hard: 0(s)      soft: 0(s)
        last:                           hard: 0(s)      soft: 0(s)
        current: 0(bytes)       hard: 0(bytes)  soft: 0(bytes)
        allocated: 0    hard: 0 soft: 0
        refcnt=1
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0    esp 0x1000    -m transport    -E des-cbc "01234567"    -A hmac-md5 "0123456789ABCDEF";dump;
echo $status
0
target1# ~
[EOT]

Target: Set SPD entries: src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" upperspec=any direction=in protocol=esp mode=transport
18:41:55 vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" dst="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" upperspec=any direction=in protocol=esp mode=transport ''
connected

target1# 
target1# /usr/local/v6/sbin/setkey -c
spdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0
       any
       -P in ipsec
       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:200:ff:fe00:b0b0/require
;
spddump;
^D
3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] 3ffe:501:ffff:ff03:200:ff:fe00:b0b0[any] any
        in ipsec
        esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:200:ff:fe00:b0b0/require
        spid=52 seq=0 pid=456
        refcnt=1
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0       any       -P in ipsec       esp/transport/3ffe:501:ffff:ff05:200:ff:fe00:c1c1-3ffe:501:ffff:ff03:200:ff:fe00:b0b0/require;spddump;
echo $status
0
target1# ~
[EOT]

*** Target testing phase ***
18:42:04Start Capturing Packets (Link0)
18:42:04 vSend(Link0,echo_request_from_host1_esp)
send echo_request_from_host1_esp
18:42:04 vRecv(Link0,ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0
recv echo_reply_to_host1
18:42:04 vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0
recv ns_to_router
18:42:09 vSend(Link0,na_from_router)
send na_from_router

NC about Router was PROBE state, but now it's REACHABLE.
18:42:09 vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1
18:42:15 vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received echo reply from NUT to HOST1.
18:42:21 vSend(Link0,echo_request_from_host1_esp_2)
send echo_request_from_host1_esp_2
18:42:21 vRecv(Link0,ns_to_router echo_reply_to_host1_2) timeout:6 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply packet from NUT to HOST1.
TN ignored the invalid authentication key
OK
18:42:27End

Packet Reverse Log