Title | Select SPD entry (policy=discard,none) |
CommandLine | ./HTR_C_Out_SPD_discard_none.seq -pkt ./HTR_A_SPD_discard_none.def -log 59.html -ti Select SPD entry (policy=discard,none) |
TestVersion | REL_1_1 |
ToolVersion | REL_1_1 |
Start | 2000/07/31 18:50:54 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ./HTR_A_SPD_discard_none.def |
System | kame-freebsd |
TargetName | FreeBSD-3.4 Release + KAME-stable-20000704 |
HostName | target1.toba.tahi.org |
Type | host |
18:50:54 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
18:50:54 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdflush; flush; ^D target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF | |
18:51:01 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" spi=0x1000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=0123456789ABCDEF ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 ah 0x1000 -m transport -A hmac-md5 "0123456789ABCDEF" ; dump; ^D 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000) A: hmac-md5 30313233 34353637 38394142 43444546 replay=0 flags=0x00000040 state=mature seq=0 pid=499 created: Jul 31 18:50:13 2000 current: Jul 31 18:50:13 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 ah 0x1000 -m transport -A hmac-md5 "0123456789ABCDEF";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" upperspec=any direction=out policy=discard | |
18:51:11 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c1c1" upperspec=any direction=out policy=discard ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 any -P out discard ; spddump; ^D 3ffe:501:ffff:ff03:200:ff:fe00:b0b0[any] 3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] any out discard spid=64 seq=0 pid=500 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 any -P out discard;spddump; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c2c2" spi=0x2000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=foo0foo1foo2foo3 | |
18:51:21 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c2c2" spi=0x2000 mode=transport protocol=ah aalgo=hmac-md5 aalgokey=foo0foo1foo2foo3 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 ah 0x2000 -m transport -A hmac-md5 "foo0foo1foo2foo3" ; dump; ^D 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 ah mode=transport spi=8192(0x00002000) reqid=0(0x00000000) A: hmac-md5 666f6f30 666f6f31 666f6f32 666f6f33 replay=0 flags=0x00000040 state=mature seq=1 pid=501 created: Jul 31 18:50:33 2000 current: Jul 31 18:50:33 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 ah mode=transport spi=4096(0x00001000) reqid=0(0x00000000) A: hmac-md5 30313233 34353637 38394142 43444546 replay=0 flags=0x00000040 state=mature seq=0 pid=501 created: Jul 31 18:50:13 2000 current: Jul 31 18:50:33 2000 diff: 20(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 ah 0x2000 -m transport -A hmac-md5 "foo0foo1foo2foo3";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c2c2" upperspec=any direction=out policy=none | |
18:51:31 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="3ffe:501:ffff:ff03:200:ff:fe00:b0b0" dst="3ffe:501:ffff:ff05:200:ff:fe00:c2c2" upperspec=any direction=out policy=none ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 any -P out none ; spddump; ^D 3ffe:501:ffff:ff03:200:ff:fe00:b0b0[any] 3ffe:501:ffff:ff05:200:ff:fe00:c1c1[any] any out discard spid=64 seq=1 pid=502 refcnt=1 3ffe:501:ffff:ff03:200:ff:fe00:b0b0[any] 3ffe:501:ffff:ff05:200:ff:fe00:c2c2[any] any out none spid=65 seq=0 pid=502 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 any -P out none;spddump; echo $status 0 target1# ~ [EOT] |
*** Target testing phase *** |
|
18:51:40 | Start Capturing Packets (Link0) |
Subtest No.1: Disard the packet if policy=discard |
|
18:51:40 |
vSend(Link0,echo_request_from_host1) send echo_request_from_host1 |
18:51:40 | vRecv(Link0,ns_to_router echo_reply_to_host1) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received no echo reply from NUT to HOST2. Ping over 1st SPD entry (policy=discard) is available. Subtest No.1 PASS Subtest No.2: Pass the packet without IPsec process if policy=none |
|
18:51:46 |
vSend(Link0,echo_request_from_host2) send echo_request_from_host2 |
18:51:46 | vRecv(Link0,ns_to_router echo_reply_to_host2) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host2 |
18:51:46 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 recv ns_to_router |
18:51:51 |
vSend(Link0,na_from_router) send na_from_router |
NC about Router was PROBE state, but now it's REACHABLE. | |
18:51:51 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
18:51:57 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST2. Ping over 2nd SPD entry (policy=none) is available. Subtest No.2 PASS Subtest Results |1| Disard the packet if policy=discard | PASS | |2| Pass the packet without IPsec process if policy=none | PASS | OK |
|
18:52:03 | End |
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c1c1 | | | DestinationAddress = 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 | | ICMPv6_EchoRequest (length:16) | | | Type = 128 | | | Code = 0 | | | Checksum = 7333 calc(7333) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:8) | | | | data = 4563686f 44617461
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 | | | DestinationAddress = 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 | | ICMPv6_EchoRequest (length:16) | | | Type = 128 | | | Code = 0 | | | Checksum = 7076 calc(7076) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:8) | | | | data = 4563686f 44617461
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 | | | DestinationAddress = 3ffe:501:ffff:ff05:200:ff:fe00:c2c2 | | ICMPv6_EchoReply (length:16) | | | Type = 129 | | | Code = 0 | | | Checksum = 6820 calc(6820) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:8) | | | | data = 4563686f 44617461 ===ns_to_router================================= ng compare _HDR_IPV6_ns_to_router.HopLimit received:64 = 255 ng compare _HDR_IPV6_ns_to_router.DestinationAddress received:3ffe:501:ffff:ff05:200:ff:fe00:c2c2 = oneof(v6("3ffe:501:ffff:ff03:200:ff:fe00:a0a0"),v6merge("FF02:0:0:0:0:1:FF00:0000",104,v6("3ffe:501:ffff:ff03:200:ff:fe00:a0a0"))) ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.ICMPv6_EchoReply ===echo_reply_to_host2=================================
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 | | | DestinationAddress = 3ffe:501:ffff:ff03:200:ff:fe00:a0a0 | | ICMPv6_NS (length:32) | | | Type = 135 | | | Code = 0 | | | Checksum = 60641 calc(60641) | | | Reserved = 0 | | | TargetAddress = 3ffe:501:ffff:ff03:200:ff:fe00:a0a0 | | | Opt_ICMPv6_SLL (length:8) | | | | Type = 1 | | | | Length = 1 | | | | LinkLayerAddress = 0:a0:24:95:a4:91 ===ns_to_router=================================
Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 34525 | Packet_IPv6 (length:72) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 32 | | | NextHeader = 58 | | | HopLimit = 255 | | | SourceAddress = 3ffe:501:ffff:ff03:200:ff:fe00:a0a0 | | | DestinationAddress = 3ffe:501:ffff:ff03:200:ff:fe00:b0b0 | | ICMPv6_NA (length:32) | | | Type = 136 | | | Code = 0 | | | Checksum = 13319 calc(13319) | | | RFlag = 1 | | | SFlag = 1 | | | OFlag = 1 | | | Reserved = 0 | | | TargetAddress = 3ffe:501:ffff:ff03:200:ff:fe00:a0a0 | | | Opt_ICMPv6_TLL (length:8) | | | | Type = 2 | | | | Length = 1 | | | | LinkLayerAddress = 0:0:0:0:a0:a0