Title | 5.2.8 Host transport mode, ESP=3DES-CBC HMAC-SHA2-256 |
CommandLine | ./p2_HTR_E_Common.seq -pkt ./p2_HTR_E_ICMP_common.def test_type=ADVANCED support=3DES_CBC_HMAC_SHA2_256_SUPPORT ealgo=3des-cbc eauth=hmac-sha2-256 einkey=E_3descbc_in_key ainkey=A_hmacsha2256_in_key eoutkey=E_3descbc_out_key aoutkey=A_hmacsha2256_out_key ealgo_from=ealgo_3descbc_hmacsha2256_in ealgo_to=ealgo_3descbc_hmacsha2256_out -log 21.html -ti 5.2.8 Host transport mode, ESP=3DES-CBC HMAC-SHA2-256 |
TestVersion | V6PC_P2_IPsec_1_10_0 |
ToolVersion | REL_3_3_1 |
Start | 2010/08/06 11:37:07 |
Tn | /usr/local/v6eval//etc//tn.def |
Nu | /usr/local/v6eval//etc//nut.def |
Pkt | ./p2_HTR_E_ICMP_common.def |
System | linux |
TargetName | RHEL6.0-Beta2 |
HostName | IPv6Testee |
Type | host |
11:37:07 | Start |
*** Target initialization phase *** Target: Clear all SAD and SPD entries |
|
11:37:07 |
vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/linux//ipsecClearAll.rmt -t linux -u root -p redhat -d cuau0 -o 1 ''
Connected prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) '' rLogin: Wait for login prompt (0.2 sec)... rLogin: Never got prompt; try again rLogin: Wait for login prompt (50 sec)... [root@IPv6Testee ~]# rLogin: Got command prompt rLogin: Got command prompt _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) _rCommand: command prompt... _rCommand: Try to get command prompt (30 sec.) _rCommand: (\$|#) [root@IPv6Testee ~]# _rCommand: Do ``ip xfrm state deleteall; ip xfrm policy flush'' command ip xfrm state deleteall; ip xfrm policy flush [rCommand: Try to get command prompt (0.2 sec) root@IPv6Testee ~]# rCommand: CmdOutput=`` [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 ~ [EOT] |
11:37:07 | Start Capturing Packets (Link0) |
Target: Set SAD entries: src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcin01 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256in01 | |
11:37:07 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSAD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcin01 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256in01 ''
Connected prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) '' rLogin: Wait for login prompt (0.2 sec)... rLogin: Never got prompt; try again rLogin: Wait for login prompt (50 sec)... [root@IPv6Testee ~]# rLogin: Got command prompt rLogin: Got command prompt _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) _rCommand: command prompt... _rCommand: Try to get command prompt (30 sec.) _rCommand: (\$|#) [root@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000 enc des3_ede 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x6970763672656164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3'' command /sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:00 00:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000 enc des3_ed e 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x69707636726 56164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ff e:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 RTNETLINK answers: Function not implemented [root@IPv6Testee ~]# sendMessagesSync: never got /sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000 enc des3_ede 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x6970763672656164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 rCommand: Try to get command prompt (0.2 sec) rCommand: CmdOutput=``/sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:00 00:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000 enc des3_ed e 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x69707636726 56164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ff e:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 RTNETLINK answers: Function not implemented [root@IPv6Testee ~]'' echo $? 2 [roorCommand: exit status: 2 _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) t@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state list'' command /sbin/ip xfrm state list [root@rCommand: Try to get command prompt (0.2 sec) IPv6Testee ~]# rCommand: CmdOutput=`` [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 ~ [EOT] |
Target: Set SPD entries: src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" upperspec=any direction=in protocol=esp-auth mode=transport | |
11:37:14 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSPD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" upperspec=any direction=in protocol=esp-auth mode=transport ''
Connected prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) '' rLogin: Wait for login prompt (0.2 sec)... rLogin: Never got prompt; try again rLogin: Wait for login prompt (50 sec)... [root@IPv6Testee ~]# rLogin: Got command prompt rLogin: Got command prompt _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) _rCommand: command prompt... _rCommand: Try to get command prompt (30 sec.) _rCommand: (\$|#) [root@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 tmpl src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transport action allow '' command ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000: 0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 tmpl src 3ffe:501:ffff:0001:00 00:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transpor t action allow [root@IPv6Testee ~]# sendMessagesSync: never got ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 tmpl src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transport action allow rCommand: Try to get command prompt (0.2 sec) rCommand: CmdOutput=``ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000: 0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 tmpl src 3ffe:501:ffff:0001:00 00:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transpor t action allow [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) t@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy list'' command ip xfrm policy list srcrCommand: Try to get command prompt (0.2 sec) 3ffe:501:ffff:1::1/128 dst 3ffe:501:fffrCommand: Try to get command prompt (30 sec) f:0:225:64ff:fea6:fea3/128 dir in priority 0 ptype main tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp reqid 0 mode transport [root@IPv6Testee ~]# [rCommand: CmdOutput=`` src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dir in priority 0 ptype main tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp reqid 0 mode transport [root@IPv6Testee ~]'' root@IPv6Testee ~]# echo $? 0 rCommand: exit status: 0 ~ [EOT] |
Target: Set SAD entries: src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" spi=0x2000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcout1 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256out1 | |
11:37:20 |
vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSAD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" spi=0x2000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcout1 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256out1 ''
Connected prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) '' rLogin: Wait for login prompt (0.2 sec)... rLogin: Never got prompt; try again rLogin: Wait for login prompt (50 sec)... [root@IPv6Testee ~]# rLogin: Got command prompt rLogin: Got command prompt _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) _rCommand: command prompt... _rCommand: Try to get command prompt (30 sec.) _rCommand: (\$|#) [root@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000 enc des3_ede 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x6970763672656164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001'' command /sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:f ea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000 enc des3_ed e 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x69707636726 56164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ff e:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 RTNETLINK answers: Function not implemented [root@IPv6Testee ~]# sendMessagesSync: never got /sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000 enc des3_ede 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x6970763672656164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 rCommand: Try to get command prompt (0.2 sec) rCommand: CmdOutput=``/sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:f ea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000 enc des3_ed e 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x69707636726 56164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ff e:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 RTNETLINK answers: Function not implemented [root@IPv6Testee ~]'' echo $? 2 [roorCommand: exit status: 2 _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) t@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state list'' command /sbin/ip xfrm state list [root@rCommand: Try to get command prompt (0.2 sec) IPv6Testee ~]# rCommand: CmdOutput=`` [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 ~ [EOT] |
Target: Set SPD entries: src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" upperspec=any direction=out protocol=esp-auth mode=transport | |
11:37:25 |
vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSPD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" upperspec=any direction=out protocol=esp-auth mode=transport ''
Connected prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) '' rLogin: Wait for login prompt (0.2 sec)... rLogin: Never got prompt; try again rLogin: Wait for login prompt (50 sec)... [root@IPv6Testee ~]# rLogin: Got command prompt rLogin: Got command prompt _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) _rCommand: command prompt... _rCommand: Try to get command prompt (30 sec.) _rCommand: (\$|#) [root@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transport action allow '' command ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea 6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 tmpl src 3ffe:501:ffff:0:225: 64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transpo rt action allow [root@IPv6Testee ~]# sendMessagesSync: never got ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transport action allow rCommand: Try to get command prompt (0.2 sec) rCommand: CmdOutput=``ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea 6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 tmpl src 3ffe:501:ffff:0:225: 64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transpo rt action allow [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 _rCommand: Try to get command prompt (0.2 sec.) _rCommand: (\$|#) t@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy list'' command ip xfrm policy list srcrCommand: Try to get command prompt (0.2 sec) 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dst 3ffe:501:ffff:1::1/128 dir out priority 0 ptype main tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:1::1 proto esp reqid 0 mode transport src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dir in priority 0 ptype main tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp reqid 0 mode transport [root@IPv6Testee ~]# rCommand: CmdOutput=`` src 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dst 3ffe:501:ffff:1::1/128 dir out priority 0 ptype main tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:1::1 proto esp reqid 0 mode transport src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dir in priority 0 ptype main tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp reqid 0 mode transport [root@IPv6Testee ~]'' echo $? 0 [roorCommand: exit status: 0 ~ [EOT] |
Target: Enable and start IPsec function | |
11:37:30 | vRemote(ipsecEnable.rmt) ``/usr/local/v6eval//bin/linux//ipsecEnable.rmt -t linux -u root -p redhat -d cuau0 -o 1 '' |
*** Target testing phase *** |
|
11:37:30 | Clear Captured Packets (Link0) |
11:37:30 |
vSend(Link0,echo_request_from_host1_esp) Send Echo Request with ESP from HOST-1(TN) |
11:37:30 | vRecv(Link0,echo_reply_to_host1_esp ns_to_router_linkaddr_w_linkaddr rs_from_nut rs_from_nut_wsll ns_to_router_wo_sllopt ns_to_router_linkaddr ns_to_router rs_from_nut_wunspec) timeout:3 cntLimit:0 seektime:0 vRecv() return status=1 |
TN received no echo reply from End-Node(NUT) to HOST-1(TN). NG |
|
11:37:33 | End |
Frame_Ether (length:106) | Hdr_Ether (length:14) | | DestinationAddress = 00:25:64:a6:fe:a3 | | SourceAddress = 00:00:00:00:00:0f | | Type = 34525 | Packet_IPv6 (length:92) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 52 | | | NextHeader = 50 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:1::1 | | | DestinationAddress = 3ffe:501:ffff:0:225:64ff:fea6:fea3 | | Hdr_ESP (length:52) | | | SPI = 4096 | | | SequenceNumber = 1 | | | algorithm = ealgo_3descbc_hmacsha2256_in | | | IVEC = 00000000 00000000 | | | Decrypted (length:24) | | | | ESPPayload (length:22) | | | | | ICMPv6_EchoRequest (length:22) | | | | | | Type = 128 | | | | | | Code = 0 | | | | | | Checksum = 5829 calc(5829) | | | | | | Identifier = 0 | | | | | | SequenceNumber = 0 | | | | | | Payload (length:14) | | | | | | | data = 5061644c 656e2069 73205a65 726f | | | | Padding = | | | | PadLength = 0 | | | | NextHeader = 58 | | | ICV = 98bc973f d5649039 14dfdd7d calc(98bc973f d5649039 14dfdd7d)