Test Information

Title5.2.8 Host transport mode, ESP=3DES-CBC HMAC-SHA2-256
CommandLine./p2_HTR_E_Common.seq -pkt ./p2_HTR_E_ICMP_common.def test_type=ADVANCED support=3DES_CBC_HMAC_SHA2_256_SUPPORT ealgo=3des-cbc eauth=hmac-sha2-256 einkey=E_3descbc_in_key ainkey=A_hmacsha2256_in_key eoutkey=E_3descbc_out_key aoutkey=A_hmacsha2256_out_key ealgo_from=ealgo_3descbc_hmacsha2256_in ealgo_to=ealgo_3descbc_hmacsha2256_out -log 21.html -ti 5.2.8 Host transport mode, ESP=3DES-CBC HMAC-SHA2-256
TestVersionV6PC_P2_IPsec_1_10_0
ToolVersionREL_3_3_1
Start2010/08/06 11:37:07
Tn/usr/local/v6eval//etc//tn.def
Nu/usr/local/v6eval//etc//nut.def
Pkt./p2_HTR_E_ICMP_common.def
Systemlinux
TargetNameRHEL6.0-Beta2
HostNameIPv6Testee
Typehost

Test Sequence Execution Log

11:37:07Start

*** Target initialization phase ***
Target: Clear all SAD and SPD entries
11:37:07 vRemote(ipsecClearAll.rmt) ``/usr/local/v6eval//bin/linux//ipsecClearAll.rmt -t linux -u root -p redhat -d cuau0 -o 1 ''
Connected
prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) ''
rLogin: Wait for login prompt (0.2 sec)...
rLogin: Never got prompt; try again
rLogin: Wait for login prompt (50 sec)...

[root@IPv6Testee ~]# rLogin: Got command prompt
rLogin: Got command prompt
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
_rCommand: command prompt...
_rCommand: Try to get command prompt (30 sec.)
_rCommand: (\$|#) 

[root@IPv6Testee ~]# _rCommand: Do ``ip xfrm state deleteall; ip xfrm policy flush'' command
ip xfrm state deleteall; ip xfrm policy flush
[rCommand: Try to get command prompt (0.2 sec)
root@IPv6Testee ~]# rCommand: CmdOutput=``
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
~
[EOT]
11:37:07Start Capturing Packets (Link0)

Target: Set SAD entries: src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcin01 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256in01
11:37:07 vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSAD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" spi=0x1000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcin01 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256in01 ''
Connected
prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) ''
rLogin: Wait for login prompt (0.2 sec)...
rLogin: Never got prompt; try again
rLogin: Wait for login prompt (50 sec)...

[root@IPv6Testee ~]# rLogin: Got command prompt
rLogin: Got command prompt
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
_rCommand: command prompt...
_rCommand: Try to get command prompt (30 sec.)
_rCommand: (\$|#) 

[root@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000  enc des3_ede 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x6970763672656164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3'' command
/sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:00 00:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000  enc des3_ed e 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x69707636726 56164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ff e:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
RTNETLINK answers: Function not implemented
[root@IPv6Testee ~]# sendMessagesSync: never got /sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000  enc des3_ede 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x6970763672656164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
rCommand: Try to get command prompt (0.2 sec)
rCommand: CmdOutput=``/sbin/ip xfrm state add src 3ffe:501:ffff:0001:0000:0000:00 00:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp spi 0x1000  enc des3_ed e 0x6970763672656164796c6f676f33646573636263696e3031 auth sha2-256 0x69707636726 56164796c6f676f706832697073656373686132323536696e3031 mode transport sel src 3ff e:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
RTNETLINK answers: Function not implemented
[root@IPv6Testee ~]''
echo $?
2
[roorCommand: exit status: 2
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
t@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state list'' command
/sbin/ip xfrm state list
[root@rCommand: Try to get command prompt (0.2 sec)
IPv6Testee ~]# rCommand: CmdOutput=``
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
~
[EOT]

Target: Set SPD entries: src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" upperspec=any direction=in protocol=esp-auth mode=transport
11:37:14 vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSPD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0001:0000:0000:0000:0001" dst="3ffe:501:ffff:0:225:64ff:fea6:fea3" upperspec=any direction=in protocol=esp-auth mode=transport ''
Connected
prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) ''
rLogin: Wait for login prompt (0.2 sec)...
rLogin: Never got prompt; try again
rLogin: Wait for login prompt (50 sec)...

[root@IPv6Testee ~]# rLogin: Got command prompt
rLogin: Got command prompt
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
_rCommand: command prompt...
_rCommand: Try to get command prompt (30 sec.)
_rCommand: (\$|#) 

[root@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3  tmpl src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transport action allow '' command
ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000: 0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3  tmpl src 3ffe:501:ffff:0001:00 00:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transpor t action allow 
[root@IPv6Testee ~]# sendMessagesSync: never got ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3  tmpl src 3ffe:501:ffff:0001:0000:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transport action allow 
rCommand: Try to get command prompt (0.2 sec)
rCommand: CmdOutput=``ip xfrm policy add dir in src 3ffe:501:ffff:0001:0000:0000: 0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3  tmpl src 3ffe:501:ffff:0001:00 00:0000:0000:0001 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3 proto esp mode transpor t action allow 
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
t@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy list'' command
ip xfrm policy list
srcrCommand: Try to get command prompt (0.2 sec)
 3ffe:501:ffff:1::1/128 dst 3ffe:501:fffrCommand: Try to get command prompt (30 sec)
f:0:225:64ff:fea6:fea3/128 
	dir in priority 0 ptype main 
	tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
		proto esp reqid 0 mode transport

[root@IPv6Testee ~]# 
[rCommand: CmdOutput=``
src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 
	dir in priority 0 ptype main 
	tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
		proto esp reqid 0 mode transport

[root@IPv6Testee ~]''
root@IPv6Testee ~]# echo $?
0
rCommand: exit status: 0
~
[EOT]

Target: Set SAD entries: src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" spi=0x2000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcout1 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256out1
11:37:20 vRemote(ipsecSetSAD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSAD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" spi=0x2000 mode=transport protocol=esp ealgo=3des-cbc ealgokey=ipv6readylogo3descbcout1 eauth=hmac-sha2-256 eauthkey=ipv6readylogoph2ipsecsha2256out1 ''
Connected
prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) ''
rLogin: Wait for login prompt (0.2 sec)...
rLogin: Never got prompt; try again
rLogin: Wait for login prompt (50 sec)...

[root@IPv6Testee ~]# rLogin: Got command prompt
rLogin: Got command prompt
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
_rCommand: command prompt...
_rCommand: Try to get command prompt (30 sec.)
_rCommand: (\$|#) 

[root@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000  enc des3_ede 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x6970763672656164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001'' command
/sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:f ea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000  enc des3_ed e 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x69707636726 56164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ff e:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001
RTNETLINK answers: Function not implemented
[root@IPv6Testee ~]# sendMessagesSync: never got /sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000  enc des3_ede 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x6970763672656164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001
rCommand: Try to get command prompt (0.2 sec)
rCommand: CmdOutput=``/sbin/ip xfrm state add src 3ffe:501:ffff:0:225:64ff:fea6:f ea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp spi 0x2000  enc des3_ed e 0x6970763672656164796c6f676f336465736362636f757431 auth sha2-256 0x69707636726 56164796c6f676f7068326970736563736861323235366f757431 mode transport sel src 3ff e:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001
RTNETLINK answers: Function not implemented
[root@IPv6Testee ~]''
echo $?
2
[roorCommand: exit status: 2
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
t@IPv6Testee ~]# _rCommand: Do ``/sbin/ip xfrm state list'' command
/sbin/ip xfrm state list
[root@rCommand: Try to get command prompt (0.2 sec)
IPv6Testee ~]# rCommand: CmdOutput=``
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
~
[EOT]

Target: Set SPD entries: src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" upperspec=any direction=out protocol=esp-auth mode=transport
11:37:25 vRemote(ipsecSetSPD.rmt) ``/usr/local/v6eval//bin/linux//ipsecSetSPD.rmt -t linux -u root -p redhat -d cuau0 -o 1 src="3ffe:501:ffff:0:225:64ff:fea6:fea3" dst="3ffe:501:ffff:0001:0000:0000:0000:0001" upperspec=any direction=out protocol=esp-auth mode=transport ''
Connected
prompt_user: ``login: '', prompt_password: ``Password: '', prompt_command: ``(\$|#) ''
rLogin: Wait for login prompt (0.2 sec)...
rLogin: Never got prompt; try again
rLogin: Wait for login prompt (50 sec)...

[root@IPv6Testee ~]# rLogin: Got command prompt
rLogin: Got command prompt
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
_rCommand: command prompt...
_rCommand: Try to get command prompt (30 sec.)
_rCommand: (\$|#) 

[root@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001  tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transport action allow '' command
ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea 6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001  tmpl src 3ffe:501:ffff:0:225: 64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transpo rt action allow 
[root@IPv6Testee ~]# sendMessagesSync: never got ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001  tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transport action allow 
rCommand: Try to get command prompt (0.2 sec)
rCommand: CmdOutput=``ip xfrm policy add dir out src 3ffe:501:ffff:0:225:64ff:fea 6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001  tmpl src 3ffe:501:ffff:0:225: 64ff:fea6:fea3 dst 3ffe:501:ffff:0001:0000:0000:0000:0001 proto esp mode transpo rt action allow 
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
_rCommand: Try to get command prompt (0.2 sec.)
_rCommand: (\$|#) 
t@IPv6Testee ~]# _rCommand: Do ``ip xfrm policy list'' command
ip xfrm policy list
srcrCommand: Try to get command prompt (0.2 sec)
 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dst 3ffe:501:ffff:1::1/128 
	dir out priority 0 ptype main 
	tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:1::1
		proto esp reqid 0 mode transport
src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 
	dir in priority 0 ptype main 
	tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
		proto esp reqid 0 mode transport
[root@IPv6Testee ~]# rCommand: CmdOutput=``
src 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 dst 3ffe:501:ffff:1::1/128 
	dir out priority 0 ptype main 
	tmpl src 3ffe:501:ffff:0:225:64ff:fea6:fea3 dst 3ffe:501:ffff:1::1
		proto esp reqid 0 mode transport
src 3ffe:501:ffff:1::1/128 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3/128 
	dir in priority 0 ptype main 
	tmpl src 3ffe:501:ffff:1::1 dst 3ffe:501:ffff:0:225:64ff:fea6:fea3
		proto esp reqid 0 mode transport
[root@IPv6Testee ~]''
echo $?
0
[roorCommand: exit status: 0
~
[EOT]

Target: Enable and start IPsec function
11:37:30 vRemote(ipsecEnable.rmt) ``/usr/local/v6eval//bin/linux//ipsecEnable.rmt -t linux -u root -p redhat -d cuau0 -o 1 ''


*** Target testing phase ***
11:37:30Clear Captured Packets (Link0)
11:37:30 vSend(Link0,echo_request_from_host1_esp)
Send Echo Request with ESP from HOST-1(TN)
11:37:30 vRecv(Link0,echo_reply_to_host1_esp ns_to_router_linkaddr_w_linkaddr rs_from_nut rs_from_nut_wsll ns_to_router_wo_sllopt ns_to_router_linkaddr ns_to_router rs_from_nut_wunspec) timeout:3 cntLimit:0 seektime:0
vRecv() return status=1

TN received no echo reply from End-Node(NUT) to HOST-1(TN).
NG
11:37:33End

Packet Reverse Log