Title | Authentication Chunk is received with chunk length less than AUTH chunk header |
CommandLine | ./AuthWithBadChunkLength.seq -pkt ./AuthWithBadChunkLength.def -log 12.html -ti Authentication Chunk is received with chunk length less than AUTH chunk header |
TestVersion | REL_1_0_0 |
ToolVersion | REL_3_1_0 |
Start | 2009/02/13 13:49:27 |
Tn | .//../etc//tn.def |
Nu | .//../etc//nut.def |
Pkt | ./AuthWithBadChunkLength.def |
System | linux-v6 |
TargetName | RHEL5GA |
HostName | FNST |
Type | IPv4 |
13:49:28 | Start |
13:49:28 | Start Capturing Packets (Link0) |
=============== sctpCheckEnv =============== | |
13:49:29 |
vRemote(rcommand.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommand.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_sta tus; checksctp [1]+ Killed sctp_test -H 192.168.0.21 -P 4561 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 sctp_darn: no process killed sctp_status: no process killed SCTP supported [root@RHEL ~]# sendMessagesSync: never got killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp echo $? 0 [root@R~.~. ~. Disconnected. |
============== sctpPingToHost ============== | |
13:49:38 |
vSend(Link0,echo4_request_on_link0) Send Echo Request on Link0 |
13:49:38 | vRecv(Link0,echo4_reply_on_link0 arp_request_on_link0) timeout:5 cntLimit:0 seektime:0 Recv ARP Request on Link0 |
13:49:39 |
vSend(Link0,arp_reply_on_link0) Send ARP Reply on Link0 |
13:49:39 | vRecv(Link0,echo4_reply_on_link0) timeout:5 cntLimit:0 seektime:0 recv unexpect packet at 13:49:36 recv unexpect packet at 13:49:37 recv unexpect packet at 13:49:38 Recv Echo Reply on Link0 |
============== sctpStartServer ============= | |
13:49:39 |
vRemote(rcommandasync.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommandasync.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="sctp_test -H 192.168.0.21 -P 4562 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 &" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# ~. Disconnected. |
=============== vConnectAuth =============== | |
13:49:43 |
vSend(Link0,sctp_chunk_init_auth_snd) Send SCTP CHUNK_INIT |
13:49:43 | vRecv(Link0,sctp_chunk_init_ack_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_INIT_ACK |
13:49:44 |
vSend(Link0,sctp_chunk_cookie_echo_snd) Send SCTP CHUNK_COOKIE_ECHO |
13:49:44 | vRecv(Link0,sctp_chunk_cookie_ack_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_COOKIE_ACK |
================ Main Test ================= | |
13:49:44 |
vSend(Link0,sctp_chunk_auth_bad_len) !!! unable decode TSN size(4,0) ,in CHUNK_DATA at(4,0)/size(4) Send SCTP CHUNK_AUTH (Bad Chunk Length) |
13:49:44 | vRecv(Link0,sctp_chunk_abort arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_ABORT (Protocol Violation) |
OK | |
13:49:45 | End |
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 14847 calc(14847) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50238 calc(50238) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 1 | | | SenderHAddr = 0:c:29:f:17:34 | | | SenderPAddr = 192.168.0.21 | | | TargetHAddr = 0:0:0:0:0:0 | | | TargetPAddr = 192.168.0.100 | [Needless] (length:18) | | data = | | 00000000 00000000 00000000 00000000 0000 ===echo4_reply_on_link0================================= ng compare _HETHER_nut2tn.Type received:2054 = 2048 ng meta Frame_Ether.Packet_IPv4 != Frame_Ether.Packet_ARP ===arp_request_on_link0=================================
Frame_Ether (length:42) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 2 | | | SenderHAddr = 0:0:0:0:1:0 | | | SenderPAddr = 192.168.0.100 | | | TargetHAddr = 0:c:29:f:17:34 | | | TargetPAddr = 192.168.0.21
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 1 | | | SenderHAddr = 0:c:29:f:17:34 | | | SenderPAddr = 192.168.0.21 | | | TargetHAddr = 0:0:0:0:0:0 | | | TargetPAddr = 192.168.0.100 | [Needless] (length:18) | | data = | | 00000000 00000000 00000000 00000000 0000 ===echo4_reply_on_link0================================= ng compare _HETHER_nut2tn.Type received:2054 = 2048 ng meta Frame_Ether.Packet_IPv4 != Frame_Ether.Packet_ARP
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 1 | | | SenderHAddr = 0:c:29:f:17:34 | | | SenderPAddr = 192.168.0.21 | | | TargetHAddr = 0:0:0:0:0:0 | | | TargetPAddr = 192.168.0.100 | [Needless] (length:18) | | data = | | 00000000 00000000 00000000 00000000 0000 ===echo4_reply_on_link0================================= ng compare _HETHER_nut2tn.Type received:2054 = 2048 ng meta Frame_Ether.Packet_IPv4 != Frame_Ether.Packet_ARP
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = ff:ff:ff:ff:ff:ff | | SourceAddress = 0:c:29:f:17:34 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 1 | | | SenderHAddr = 0:c:29:f:17:34 | | | SenderPAddr = 192.168.0.21 | | | TargetHAddr = 0:0:0:0:0:0 | | | TargetPAddr = 192.168.0.100 | [Needless] (length:18) | | data = | | 00000000 00000000 00000000 00000000 0000 ===echo4_reply_on_link0================================= ng compare _HETHER_nut2tn.DestinationAddress received:ff:ff:ff:ff:ff:ff = 0:0:0:0:1:0 ng compare _HETHER_nut2tn.Type received:2054 = 2048 ng meta Frame_Ether.Packet_IPv4 != Frame_Ether.Packet_ARP
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 22720 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 1 | | | HeaderChecksum = 41023 calc(41023) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52286 calc(52286) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===echo4_reply_on_link0=================================
Frame_Ether (length:126) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:112) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 112 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14656 calc(14656) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:92) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3562 | | | | DestinationPort = 4562 | | | | VerificationTag = 0 | | | | Checksum = 2119872424 calc(2119872424) | | | CHUNK_INIT (length:80) | | | | Type = 1 | | | | Flags = 0 | | | | Length = 80 | | | | InitiateTag = 1 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 100 | | | | NumOfInbound = 65535 | | | | TSN = 100 | | | | Random (length:36) | | | | | Type = 32770 | | | | | Length = 36 | | | | | RandomNumber = | | | | | 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 | | | | ChunkList (length:8) | | | | | Type = 32771 | | | | | Length = 6 | | | | | ChunkType = 193 | | | | | ChunkType = 128 | | | | | Padding = 0000 | | | | RequestedHMACAlgorithm (length:8) | | | | | Type = 32772 | | | | | Length = 8 | | | | | HMACIdentifier = 1 | | | | | HMACIdentifier = 3 | | | | SupportedExtensions (length:8) | | | | | Type = 32776 | | | | | Length = 7 | | | | | ChunkType = 15 | | | | | ChunkType = 193 | | | | | ChunkType = 128 | | | | | Padding = 00
Frame_Ether (length:394) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:380) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 380 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 46898 calc(46898) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:360) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4562 | | | | DestinationPort = 3562 | | | | VerificationTag = 1 | | | | Checksum = 245883657 calc(245883657) | | | CHUNK_INIT_ACK (length:348) | | | | Type = 2 | | | | Flags = 0 | | | | Length = 348 | | | | InitiateTag = 3762018505 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 10 | | | | NumOfInbound = 100 | | | | TSN = 698213652 | | | | StaleCookie (length:264) | | | | | Type = 7 | | | | | Length = 264 | | | | | Cookie = | | | | | b4ed0276 56aa1098 0b3c1905 9e73b3fc 00000000 00000000 00000000 00000000 | | | | | 00000000 c9d83be0 01000000 00000000 00000000 7bc49549 b6b20300 0a006400 | | | | | 14e59d29 02000dea c0a80064 00000000 00000000 00000000 00000000 00000000 | | | | | d2110000 00000000 80020024 c764b5ac f550eff5 e4a1f074 190dd220 0a5d868c | | | | | 6303a4c3 b55d7a99 deb76934 80040006 00018003 00040000 00000000 00000000 | | | | | 00000000 00000000 00000000 01000050 00000001 0000d600 0064ffff 00000064 | | | | | 80020024 00000000 00000000 00000000 00000000 00000000 00000000 00000000 | | | | | 00000000 80030006 c1800000 80040008 00010003 80080007 0fc18000 00000000 | | | | | 00000000 | | | | SupportedExtensions (length:8) | | | | | Type = 32776 | | | | | Length = 5 | | | | | ChunkType = 15 | | | | | Padding = 000000 | | | | AdaptationLayerIndication (length:8) | | | | | Type = 49158 | | | | | Length = 8 | | | | | Indication = 0 | | | | Random (length:36) | | | | | Type = 32770 | | | | | Length = 36 | | | | | RandomNumber = | | | | | c764b5ac f550eff5 e4a1f074 190dd220 0a5d868c 6303a4c3 b55d7a99 deb76934 | | | | RequestedHMACAlgorithm (length:8) | | | | | Type = 32772 | | | | | Length = 6 | | | | | HMACIdentifier = 1 | | | | | Padding = 0000 | | | | ChunkList (length:4) | | | | | Type = 32771 | | | | | Length = 4 ===sctp_chunk_init_ack_rcv=================================
Frame_Ether (length:310) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:296) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 296 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14472 calc(14472) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:276) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3562 | | | | DestinationPort = 4562 | | | | VerificationTag = 3762018505 | | | | Checksum = 54709536 calc(54709536) | | | CHUNK_COOKIE_ECHO (length:264) | | | | Type = 10 | | | | Flags = 0 | | | | Length = 264 | | | | Cookie = | | | | b4ed0276 56aa1098 0b3c1905 9e73b3fc 00000000 00000000 00000000 00000000 | | | | 00000000 c9d83be0 01000000 00000000 00000000 7bc49549 b6b20300 0a006400 | | | | 14e59d29 02000dea c0a80064 00000000 00000000 00000000 00000000 00000000 | | | | d2110000 00000000 80020024 c764b5ac f550eff5 e4a1f074 190dd220 0a5d868c | | | | 6303a4c3 b55d7a99 deb76934 80040006 00018003 00040000 00000000 00000000 | | | | 00000000 00000000 00000000 01000050 00000001 0000d600 0064ffff 00000064 | | | | 80020024 00000000 00000000 00000000 00000000 00000000 00000000 00000000 | | | | 00000000 80030006 c1800000 80040008 00010003 80080007 0fc18000 00000000 | | | | 00000000
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47242 calc(47242) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4562 | | | | DestinationPort = 3562 | | | | VerificationTag = 1 | | | | Checksum = 1629352013 calc(1629352013) | | | CHUNK_COOKIE_ACK (length:4) | | | | Type = 11 | | | | Flags = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_cookie_ack_rcv=================================
Frame_Ether (length:74) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:60) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 60 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14708 calc(14708) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:40) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3562 | | | | DestinationPort = 4562 | | | | VerificationTag = 3762018505 | | | | Checksum = 2889996260 calc() | | | CHUNK_AUTH (length:8) | | | | Type = 15 | | | | Flags = 0 | | | | Length = 8 | | | | SharedKeyIdentifier = 0 | | | | HMACIdentifier = 1 | | | | HMAC = | | | CHUNK_DATA (length:4) | | | | Type = 0 | | | | Reserved = 0 | | | | IFlag = 0 | | | | UFlag = 0 | | | | BFlag = 0 | | | | EFlag = 0 | | | | Length = 0 | | | [Needless] (length:16) | | | | data = 00000000 00000000 00000000 00000000
Frame_Ether (length:98) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:84) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 84 | | | Identifier = 33382 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 13812 calc(13812) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:64) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4562 | | | | DestinationPort = 3562 | | | | VerificationTag = 1 | | | | Checksum = 1926366505 calc(1926366505) | | | CHUNK_ABORT (length:52) | | | | Type = 6 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 52 | | | | ProtocolViolation (length:48) | | | | | Code = 13 | | | | | Length = 48 | | | | | Information = | | | | | 54686520 666f6c6c 6f77696e 67206368 756e6b20 68616420 696e7661 6c696420 | | | | | 6c656e67 74683a00 000f0008 ===sctp_chunk_abort=================================