| Title | Outbound AH-ESP combination |
| CommandLine | ../ipsec/HTR_C_Out_ah_esp.seq -pkt ../ipsec/HTR_C_ah_esp.def -cpp=-include ./ipsecaddr.def -log 48.html -ti Outbound AH-ESP combination |
| TestVersion | REL_1_1 |
| ToolVersion | REL_1_1 |
| Start | 2000/07/31 19:24:41 |
| Tn | /usr/local/v6eval//etc//tn.def |
| Nu | /usr/local/v6eval//etc//nut.def |
| Pkt | ../ipsec/HTR_C_ah_esp.def |
| System | kame-freebsd |
| TargetName | FreeBSD-3.4 Release + KAME-stable-20000704 |
| HostName | target1.toba.tahi.org |
| Type | host |
| 19:24:41 | Start |
|
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
| 19:24:41 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdflush; flush; ^D target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush; echo $status 0 target1# ~ [EOT] |
| Target: Set SAD entries: src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF | |
| 19:24:48 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF ''
connected
target1#
target1# /usr/local/v6/sbin/setkey -c
add 192.168.103.20 192.168.105.31
ah 0x1000
-m transport
-A hmac-md5 "0123456789ABCDEF"
;
dump;
^D
192.168.103.20 192.168.105.31
ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000)
A: hmac-md5 30313233 34353637 38394142 43444546
replay=0 flags=0x00000040 state=mature seq=0 pid=440
created: Jul 31 19:23:59 2000 current: Jul 31 19:23:59 2000
diff: 0(s) hard: 0(s) soft: 0(s)
last: hard: 0(s) soft: 0(s)
current: 0(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.103.20 192.168.105.31 ah 0x1000 -m transport -A hmac-md5 "0123456789ABCDEF";dump;
echo $status
0
target1# ~
[EOT]
|
| Target: Set SAD entries: src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 | |
| 19:24:57 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 ''
connected
target1#
target1# /usr/local/v6/sbin/setkey -c
add 192.168.103.20 192.168.105.31
esp 0x1000
-m transport
-E des-cbc "01234567"
;
dump;
^D
192.168.103.20 192.168.105.31
esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000)
E: des-cbc 30313233 34353637
replay=0 flags=0x00000040 state=mature seq=1 pid=441
created: Jul 31 19:24:08 2000 current: Jul 31 19:24:08 2000
diff: 0(s) hard: 0(s) soft: 0(s)
last: hard: 0(s) soft: 0(s)
current: 0(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1
192.168.103.20 192.168.105.31
ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000)
A: hmac-md5 30313233 34353637 38394142 43444546
replay=0 flags=0x00000040 state=mature seq=0 pid=441
created: Jul 31 19:23:59 2000 current: Jul 31 19:24:08 2000
diff: 9(s) hard: 0(s) soft: 0(s)
last: hard: 0(s) soft: 0(s)
current: 0(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 0 hard: 0 soft: 0
refcnt=1
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.103.20 192.168.105.31 esp 0x1000 -m transport -E des-cbc "01234567";dump;
echo $status
0
target1# ~
[EOT]
|
| Target: Set SPD entries: src="192.168.103.20" dst="192.168.105.31" upperspec=any direction=out protocol=ah-esp mode=transport | |
| 19:25:06 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.103.20" dst="192.168.105.31" upperspec=any direction=out protocol=ah-esp mode=transport ''
connected
target1#
target1# /usr/local/v6/sbin/setkey -c
spdadd 192.168.103.20 192.168.105.31
any
-P out ipsec
esp/transport/192.168.103.20-192.168.105.31/require
ah/transport/192.168.103.20-192.168.105.31/require
;
spddump;
^D
192.168.103.20[any] 192.168.105.31[any] any
out ipsec
esp/transport/192.168.103.20-192.168.105.31/require
ah/transport/192.168.103.20-192.168.105.31/require
spid=49 seq=0 pid=442
refcnt=1
target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 192.168.103.20 192.168.105.31 any -P out ipsec esp/transport/192.168.103.20-192.168.105.31/require ah/transport/192.168.103.20-192.168.105.31/require;spddump;
echo $status
0
target1# ~
[EOT]
|
|
*** Target testing phase *** |
|
| 19:25:15 | Start Capturing Packets (Link0) |
| 19:25:15 |
vSend(Link0,echo_request_from_host1) send echo_request_from_host1 |
| 19:25:15 | vRecv(Link0,ns_to_router echo_reply_to_host1_ah_esp) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1_ah_esp |
| 19:25:15 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
|
TN received echo reply from NUT to HOST1. OK |
|
| 19:25:21 | End |
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 27204 calc(27204) | | | SourceAddress = 192.168.105.31 | | | DestinationAddress = 192.168.103.20 | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50239 calc(50239) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:24) | | | | data = 4563686f 44617461 4563686f 44617461 4563686f 44617461
===ALGORITHM LISTS BEGIN====================
--------------------------------------------
frame=echo_reply_to_host1_ah_esp
AH=aalgo_hmacmd5_012
auth=hmacmd5(30313233 34353637 38394142 43444546)
ESP=ealgo_descbc_012
crypt=descbc(30313233 34353637)
--------------------------------------------
===ALGORITHM LISTS END======================
Frame_Ether (length:114)
| Hdr_Ether (length:14)
| | DestinationAddress = 0:0:0:0:a0:a0
| | SourceAddress = 0:a0:24:95:a4:91
| | Type = 2048
| Packet_IPv4 (length:100)
| | Hdr_IPv4 (length:20)
| | | Version = 4
| | | IHL = 5
| | | TypeOfService = 0
| | | TotalLength = 100
| | | Identifier = 101
| | | Reserved = 0
| | | DF = 0
| | | MF = 0
| | | FragmentOffset = 0
| | | TTL = 255
| | | Protocol = 51
| | | HeaderChecksum = 27005 calc(27005)
| | | SourceAddress = 192.168.103.20
| | | DestinationAddress = 192.168.105.31
| | Hdr_AH (length:24)
| | | NextHeader = 50
| | | PayloadLength = 4
| | | Reserved = 0
| | | SPI = 4096
| | | SequenceNumber = 1
| | | algorithm = aalgo_hmacmd5_012
| | | ICV = 5ce0fe51 23f80f0f 781180dc calc(5ce0fe51 23f80f0f 781180dc)
| | Hdr_ESP (length:56)
| | | SPI = 4096
| | | SequenceNumber = 1
| | | algorithm = ealgo_descbc_012
| | | IVEC = d0489dc0 40000000
| | | Decrypted (length:40)
| | | | ESPPayload (length:32)
| | | | | ICMPv4_EchoReply (length:32)
| | | | | | Type = 0
| | | | | | Code = 0
| | | | | | Checksum = 52287 calc(52287)
| | | | | | Identifier = 0
| | | | | | SequenceNumber = 0
| | | | | | Payload (length:24)
| | | | | | | data =
4563686f 44617461 4563686f 44617461 4563686f 44617461
| | | | Padding = 01020304 0506
| | | | PadLength = 6
| | | | NextHeader = 1
| | | ICV = calc()
===echo_reply_to_host1_ah_esp=================================
applied algorithms={aalgo_hmacmd5_012,ealgo_descbc_012}