Title | Connect two SA bundles with different spi, different IPsrc |
CommandLine | ../ipsec/HTR_A_In_2SA_DspiDipsrc.seq -pkt ../ipsec/HTR_A_2SA_DspiDip.def -cpp=-include ./ipsecaddr.def -log 10.html -ti Connect two SA bundles with different spi, different IPsrc |
TestVersion | REL_1_1 |
ToolVersion | REL_1_1 |
Start | 2000/07/31 19:01:59 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ../ipsec/HTR_A_2SA_DspiDip.def |
System | kame-freebsd |
TargetName | FreeBSD-3.4 Release + KAME-stable-20000704 |
HostName | target1.toba.tahi.org |
Type | host |
19:02:00 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
19:02:00 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdflush; flush; ^D target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="192.168.105.31" dst="192.168.103.20" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF | |
19:02:06 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.31" dst="192.168.103.20" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 192.168.105.31 192.168.103.20 ah 0x1000 -m transport -A hmac-md5 "0123456789ABCDEF" ; dump; ^D 192.168.105.31 192.168.103.20 ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000) A: hmac-md5 30313233 34353637 38394142 43444546 replay=0 flags=0x00000040 state=mature seq=0 pid=310 created: Jul 31 19:01:17 2000 current: Jul 31 19:01:17 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.105.31 192.168.103.20 ah 0x1000 -m transport -A hmac-md5 "0123456789ABCDEF";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="192.168.105.31" dst="192.168.103.20" upperspec=any direction=in protocol=ah mode=transport | |
19:02:16 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.31" dst="192.168.103.20" upperspec=any direction=in protocol=ah mode=transport ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 192.168.105.31 192.168.103.20 any -P in ipsec ah/transport/192.168.105.31-192.168.103.20/require ; spddump; ^D 192.168.105.31[any] 192.168.103.20[any] any in ipsec ah/transport/192.168.105.31-192.168.103.20/require spid=9 seq=0 pid=311 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 192.168.105.31 192.168.103.20 any -P in ipsec ah/transport/192.168.105.31-192.168.103.20/require;spddump; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="192.168.105.32" dst="192.168.103.20" spi=0x2000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=foo0foo1foo2foo3 | |
19:02:25 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.32" dst="192.168.103.20" spi=0x2000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=foo0foo1foo2foo3 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 192.168.105.32 192.168.103.20 ah 0x2000 -m transport -A hmac-md5 "foo0foo1foo2foo3" ; dump; ^D 192.168.105.32 192.168.103.20 ah mode=transport spi=8192(0x00002000) reqid=0(0x00000000) A: hmac-md5 666f6f30 666f6f31 666f6f32 666f6f33 replay=0 flags=0x00000040 state=mature seq=1 pid=312 created: Jul 31 19:01:36 2000 current: Jul 31 19:01:36 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 192.168.105.31 192.168.103.20 ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000) A: hmac-md5 30313233 34353637 38394142 43444546 replay=0 flags=0x00000040 state=mature seq=0 pid=312 created: Jul 31 19:01:17 2000 current: Jul 31 19:01:36 2000 diff: 19(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.105.32 192.168.103.20 ah 0x2000 -m transport -A hmac-md5 "foo0foo1foo2foo3";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="192.168.105.32" dst="192.168.103.20" upperspec=any direction=in protocol=ah mode=transport | |
19:02:35 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.105.32" dst="192.168.103.20" upperspec=any direction=in protocol=ah mode=transport ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 192.168.105.32 192.168.103.20 any -P in ipsec ah/transport/192.168.105.32-192.168.103.20/require ; spddump; ^D 192.168.105.31[any] 192.168.103.20[any] any in ipsec ah/transport/192.168.105.31-192.168.103.20/require spid=9 seq=1 pid=313 refcnt=1 192.168.105.32[any] 192.168.103.20[any] any in ipsec ah/transport/192.168.105.32-192.168.103.20/require spid=10 seq=0 pid=313 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 192.168.105.32 192.168.103.20 any -P in ipsec ah/transport/192.168.105.32-192.168.103.20/require;spddump; echo $status 0 target1# ~ [EOT] |
*** Target testing phase *** |
|
19:02:44 | Start Capturing Packets (Link0) |
19:02:44 |
vSend(Link0,echo_request_from_host1_ah) send echo_request_from_host1_ah |
19:02:44 | vRecv(Link0,ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1 |
19:02:44 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST1. Ping over 1st SA bundle is available. |
|
19:02:50 |
vSend(Link0,echo_request_from_host2_ah) send echo_request_from_host2_ah |
19:02:50 | vRecv(Link0,ns_to_router echo_reply_to_host2) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host2 |
19:02:50 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST2. Ping over 2nd SA bundle is available. Ping over coexisting two SA bundles are available. OK |
|
19:02:56 | End |
Frame_Ether (length:90) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 2048 | Packet_IPv4 (length:76) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 76 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 51 | | | HeaderChecksum = 27130 calc(27130) | | | SourceAddress = 192.168.105.31 | | | DestinationAddress = 192.168.103.20 | | Hdr_AH (length:24) | | | NextHeader = 1 | | | PayloadLength = 4 | | | Reserved = 0 | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = aalgo_hmacmd5_012 | | | ICV = 806b1461 b29ffd12 44ce38af calc(806b1461 b29ffd12 44ce38af) | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50239 calc(50239) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:24) | | | | data = 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 58 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 27146 calc(27146) | | | SourceAddress = 192.168.103.20 | | | DestinationAddress = 192.168.105.31 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52287 calc(52287) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:24) | | | | data = 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===ns_to_router================================= ng compare _HETHER_nut2broadcast.DestinationAddress received:0:0:0:0:a0:a0 = ff:ff:ff:ff:ff:ff ng compare _HETHER_nut2broadcast.Type received:2048 = 2054 ng meta Frame_Ether.Packet_ARP != Frame_Ether.Packet_IPv4 ===echo_reply_to_host1=================================
Frame_Ether (length:90) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 2048 | Packet_IPv4 (length:76) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 76 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 51 | | | HeaderChecksum = 27129 calc(27129) | | | SourceAddress = 192.168.105.32 | | | DestinationAddress = 192.168.103.20 | | Hdr_AH (length:24) | | | NextHeader = 1 | | | PayloadLength = 4 | | | Reserved = 0 | | | SPI = 8192 | | | SequenceNumber = 1 | | | algorithm = aalgo_hmacmd5_foo | | | ICV = 53f18882 775caa9c 3afc67d4 calc(53f18882 775caa9c 3afc67d4) | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50239 calc(50239) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:24) | | | | data = 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 59 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 27144 calc(27144) | | | SourceAddress = 192.168.103.20 | | | DestinationAddress = 192.168.105.32 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52287 calc(52287) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:24) | | | | data = 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===ns_to_router================================= ng compare _HETHER_nut2broadcast.DestinationAddress received:0:0:0:0:a0:a0 = ff:ff:ff:ff:ff:ff ng compare _HETHER_nut2broadcast.Type received:2048 = 2054 ng meta Frame_Ether.Packet_ARP != Frame_Ether.Packet_IPv4 ===echo_reply_to_host2=================================