Title | Outbound ESP packet (DES-CBC, HMAC-SHA1) |
CommandLine | ../ipsec/HTR_E_Out_descbc_hmacsha1.seq -pkt ../ipsec/HTR_E_descbc_hmacsha1.def -cpp=-include ./ipsecaddr.def -log 21.html -ti Outbound ESP packet (DES-CBC, HMAC-SHA1) |
TestVersion | REL_1_1 |
ToolVersion | REL_1_1 |
Start | 2000/07/31 19:09:12 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ../ipsec/HTR_E_descbc_hmacsha1.def |
System | kame-freebsd |
TargetName | FreeBSD-3.4 Release + KAME-stable-20000704 |
HostName | target1.toba.tahi.org |
Type | host |
19:09:12 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
19:09:12 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecClearAll.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdflush; flush; ^D target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdflush;flush; echo $status 0 target1# ~ [EOT] |
Target: Set SAD entries: src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 eauth=hmac-sha1 eauthkey=0123456789ABCDEF0123 | |
19:09:18 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSAD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.103.20" dst="192.168.105.31" spi=0x1000 mode=transport protocol=esp ealgo=des-cbc ealgokey=01234567 eauth=hmac-sha1 eauthkey=0123456789ABCDEF0123 ''
connected target1# target1# /usr/local/v6/sbin/setkey -c add 192.168.103.20 192.168.105.31 esp 0x1000 -m transport -E des-cbc "01234567" -A hmac-sha1 "0123456789ABCDEF0123" ; dump; ^D 192.168.103.20 192.168.105.31 esp mode=transport spi=4096(0x00001000) reqid=0(0x00000000) E: des-cbc 30313233 34353637 A: hmac-sha1 30313233 34353637 38394142 43444546 30313233 replay=0 flags=0x00000040 state=mature seq=0 pid=349 created: Jul 31 19:08:28 2000 current: Jul 31 19:08:28 2000 diff: 0(s) hard: 0(s) soft: 0(s) last: hard: 0(s) soft: 0(s) current: 0(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 0 hard: 0 soft: 0 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cadd 192.168.103.20 192.168.105.31 esp 0x1000 -m transport -E des-cbc "01234567" -A hmac-sha1 "0123456789ABCDEF0123";dump; echo $status 0 target1# ~ [EOT] |
Target: Set SPD entries: src="192.168.103.20" dst="192.168.105.31" upperspec=any direction=out protocol=esp mode=transport | |
19:09:27 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/kame-freebsd/ipsecSetSPD.rmt -t kame-freebsd -u root -p v6eval -d cuaa0c -o 1 src="192.168.103.20" dst="192.168.105.31" upperspec=any direction=out protocol=esp mode=transport ''
connected target1# target1# /usr/local/v6/sbin/setkey -c spdadd 192.168.103.20 192.168.105.31 any -P out ipsec esp/transport/192.168.103.20-192.168.105.31/require ; spddump; ^D 192.168.103.20[any] 192.168.105.31[any] any out ipsec esp/transport/192.168.103.20-192.168.105.31/require spid=21 seq=0 pid=350 refcnt=1 target1# target1# sendMessagesSync: never got /usr/local/v6/sbin/setkey -cspdadd 192.168.103.20 192.168.105.31 any -P out ipsec esp/transport/192.168.103.20-192.168.105.31/require;spddump; echo $status 0 target1# ~ [EOT] |
*** Target testing phase *** |
|
19:09:36 | Start Capturing Packets (Link0) |
19:09:36 |
vSend(Link0,echo_request_from_host1) send echo_request_from_host1 |
19:09:36 | vRecv(Link0,ns_to_router echo_reply_to_host1_esp) timeout:6 cntLimit:0 seektime:0 recv echo_reply_to_host1_esp |
19:09:36 | vRecv(Link0,ns_to_router) timeout:6 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received echo reply from NUT to HOST1. OK |
|
19:09:42 | End |
Frame_Ether (length:56) | Hdr_Ether (length:14) | | DestinationAddress = 0:a0:24:95:a4:91 | | SourceAddress = 0:0:0:0:a0:a0 | | Type = 2048 | Packet_IPv4 (length:42) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 42 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 27214 calc(27214) | | | SourceAddress = 192.168.105.31 | | | DestinationAddress = 192.168.103.20 | | ICMPv4_EchoRequest (length:22) | | | Type = 8 | | | Code = 0 | | | Checksum = 32133 calc(32133) | | | Identifier = 0 | | | SequenceNumber = 0 | | | Payload (length:14) | | | | data = 5061644c 656e2069 73205a65 726f
===ALGORITHM LISTS BEGIN==================== -------------------------------------------- frame=echo_reply_to_host1_esp ESP=ealgo_descbc_012_hmacsha1_012 crypt=descbc(30313233 34353637) auth=hmacsha1(30313233 34353637 38394142 43444546 30313233) -------------------------------------------- ===ALGORITHM LISTS END====================== Frame_Ether (length:86) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:a0:a0 | | SourceAddress = 0:a0:24:95:a4:91 | | Type = 2048 | Packet_IPv4 (length:72) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 72 | | | Identifier = 72 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 50 | | | HeaderChecksum = 27063 calc(27063) | | | SourceAddress = 192.168.103.20 | | | DestinationAddress = 192.168.105.31 | | Hdr_ESP (length:52) | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = ealgo_descbc_012_hmacsha1_012 | | | IVEC = d0489dc0 40000000 | | | Decrypted (length:24) | | | | ESPPayload (length:22) | | | | | ICMPv4_EchoReply (length:22) | | | | | | Type = 0 | | | | | | Code = 0 | | | | | | Checksum = 34181 calc(34181) | | | | | | Identifier = 0 | | | | | | SequenceNumber = 0 | | | | | | Payload (length:14) | | | | | | | data = 5061644c 656e2069 73205a65 726f | | | | Padding = | | | | PadLength = 0 | | | | NextHeader = 1 | | | ICV = fe0329ac 45981f7e d5d1c2ff calc(fe0329ac 45981f7e d5d1c2ff) ===echo_reply_to_host1_esp================================= applied algorithms={ealgo_descbc_012_hmacsha1_012}