Title | SHUTDOWN-COMPLETE chunk is received with invalid Verification Tag |
CommandLine | ./ShutCompWithBadTag.seq -pkt ./ShutCompWithBadTag.def -log 35.html -ti SHUTDOWN-COMPLETE chunk is received with invalid Verification Tag |
TestVersion | REL_1_0_0 |
ToolVersion | REL_3_1_0 |
Start | 2009/02/13 11:08:52 |
Tn | .//../etc//tn.def |
Nu | .//../etc//nut.def |
Pkt | ./ShutCompWithBadTag.def |
System | linux-v6 |
TargetName | RHEL5GA |
HostName | FNST |
Type | IPv4 |
11:08:52 | Start |
11:08:52 | Start Capturing Packets (Link0) |
=============== sctpCheckEnv =============== | |
11:08:52 |
vRemote(rcommand.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommand.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_sta tus; checksctp [1]+ Killed sctp_test -H 192.168.0.21 -P 4388 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 sctp_darn: no process killed sctp_status: no process killed SCTP supported [root@RHEL ~]# sendMessagesSync: never got killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp echo $? 0 ~. Disconnected. |
============== sctpPingToHost ============== | |
11:09:02 |
vSend(Link0,echo4_request_on_link0) Send Echo Request on Link0 |
11:09:02 | vRecv(Link0,echo4_reply_on_link0 arp_request_on_link0) timeout:5 cntLimit:0 seektime:0 Recv Echo Reply on Link0 |
============== sctpStartServer ============= | |
11:09:02 |
vRemote(rcommandasync.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommandasync.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="sctp_test -H 192.168.0.21 -P 4389 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 &" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# sctp_test -H 192.168.~. Disconnected. |
================= vConnect ================= | |
11:09:06 |
vSend(Link0,sctp_chunk_init_snd) Send SCTP CHUNK_INIT |
11:09:07 | vRecv(Link0,sctp_chunk_init_ack_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_INIT_ACK |
11:09:09 |
vSend(Link0,sctp_chunk_cookie_echo_snd) Send SCTP CHUNK_COOKIE_ECHO |
11:09:09 | vRecv(Link0,sctp_chunk_cookie_ack_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_COOKIE_ACK |
================== vClose ================== | |
11:09:09 |
vSend(Link0,sctp_chunk_shutdown_snd) Send SCTP CHUNK_SHUTDOWN |
11:09:09 | vRecv(Link0,sctp_chunk_shutdown_ack_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_SHUTDOWN_ACK |
================ Main Test ================= | |
11:09:09 |
vSend(Link0,sctp_chunk_shutdown_complete_flag0) Send SCTP CHUNK_SHUTDOWN_COMPLETE (with invalid Tag and TFlag=0) |
11:09:10 | vRecv(Link0,sctp_chunk_shutdown_ack_rcv arp_request_on_link0 ) timeout:15 cntLimit:0 seektime:0 Recv SCTP CHUNK_SHUTDOWN_ACK |
11:09:12 |
vSend(Link0,sctp_chunk_shutdown_complete_flag1) Send SCTP CHUNK_SHUTDOWN_COMPLETE (with invalid Tag and TFlag=1) |
11:09:12 | vRecv(Link0,sctp_chunk_shutdown_ack_rcv arp_request_on_link0 ) timeout:15 cntLimit:0 seektime:0 Recv SCTP CHUNK_SHUTDOWN_ACK |
11:09:18 |
vSend(Link0,sctp_chunk_shutdown_complete_snd) Send SCTP CHUNK_SHUTDOWN_COMPLETE |
OK | |
11:09:18 | End |
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 14847 calc(14847) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50238 calc(50238) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 21575 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 1 | | | HeaderChecksum = 42168 calc(42168) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52286 calc(52286) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===echo4_reply_on_link0=================================
Frame_Ether (length:82) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:68) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 68 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14700 calc(14700) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:48) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 0 | | | | Checksum = 3882069028 calc(3882069028) | | | CHUNK_INIT (length:36) | | | | Type = 1 | | | | Flags = 0 | | | | Length = 36 | | | | InitiateTag = 1 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 100 | | | | NumOfInbound = 65535 | | | | TSN = 100 | | | | ENCCapable (length:4) | | | | | Type = 32768 | | | | | Length = 4 | | | | ForwardTSN (length:4) | | | | | Type = 49152 | | | | | Length = 4 | | | | AdaptationLayerIndication (length:8) | | | | | Type = 49158 | | | | | Length = 8 | | | | | Indication = 0
Frame_Ether (length:314) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:300) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 300 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 46978 calc(46978) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:280) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4389 | | | | DestinationPort = 3389 | | | | VerificationTag = 1 | | | | Checksum = 1359004984 calc(1359004984) | | | CHUNK_INIT_ACK (length:268) | | | | Type = 2 | | | | Flags = 0 | | | | Length = 268 | | | | InitiateTag = 40915201 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 10 | | | | NumOfInbound = 100 | | | | TSN = 2159398246 | | | | StaleCookie (length:232) | | | | | Type = 7 | | | | | Length = 232 | | | | | Cookie = | | | | | 10766124 d79835d7 d1ed1347 3e84be87 00000000 00000000 00000000 00000000 | | | | | 00000000 01517002 01000000 00000000 00000000 d29e9549 9f4a0800 0a006400 | | | | | 66cdb580 02000d3d c0a80064 00000000 00000000 00000000 00000000 00000000 | | | | | 25110100 00000000 80020024 be9ecf37 afd74250 d6e0f05c c422846b a75d6d2a | | | | | 7a3ca02c 8dcca2a5 387cff82 00000000 00000000 00000000 00000000 00000000 | | | | | 00000000 00000000 00000000 01000024 00000001 0000d600 0064ffff 00000064 | | | | | 80000004 c0000004 c0060008 00000000 00000000 00000000 00000000 00000000 | | | | | 00000000 | | | | ENCCapable (length:4) | | | | | Type = 32768 | | | | | Length = 4 | | | | ForwardTSN (length:4) | | | | | Type = 49152 | | | | | Length = 4 | | | | AdaptationLayerIndication (length:8) | | | | | Type = 49158 | | | | | Length = 8 | | | | | Indication = 0 ===sctp_chunk_init_ack_rcv=================================
Frame_Ether (length:278) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:264) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 264 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14504 calc(14504) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:244) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 40915201 | | | | Checksum = 1971147132 calc(1971147132) | | | CHUNK_COOKIE_ECHO (length:232) | | | | Type = 10 | | | | Flags = 0 | | | | Length = 232 | | | | Cookie = | | | | 10766124 d79835d7 d1ed1347 3e84be87 00000000 00000000 00000000 00000000 | | | | 00000000 01517002 01000000 00000000 00000000 d29e9549 9f4a0800 0a006400 | | | | 66cdb580 02000d3d c0a80064 00000000 00000000 00000000 00000000 00000000 | | | | 25110100 00000000 80020024 be9ecf37 afd74250 d6e0f05c c422846b a75d6d2a | | | | 7a3ca02c 8dcca2a5 387cff82 00000000 00000000 00000000 00000000 00000000 | | | | 00000000 00000000 00000000 01000024 00000001 0000d600 0064ffff 00000064 | | | | 80000004 c0000004 c0060008 00000000 00000000 00000000 00000000 00000000 | | | | 00000000
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47242 calc(47242) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4389 | | | | DestinationPort = 3389 | | | | VerificationTag = 1 | | | | Checksum = 735905515 calc(735905515) | | | CHUNK_COOKIE_ACK (length:4) | | | | Type = 11 | | | | Flags = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_cookie_ack_rcv=================================
Frame_Ether (length:54) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:40) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 40 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14728 calc(14728) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:20) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 40915201 | | | | Checksum = 718188747 calc(718188747) | | | CHUNK_SHUTDOWN (length:8) | | | | Type = 7 | | | | Flags = 0 | | | | Length = 8 | | | | TSN = 2159398245
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 39071 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 8171 calc(8171) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4389 | | | | DestinationPort = 3389 | | | | VerificationTag = 1 | | | | Checksum = 307504265 calc(307504265) | | | CHUNK_SHUTDOWN_ACK (length:4) | | | | Type = 8 | | | | Flags = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_shutdown_ack_rcv=================================
Frame_Ether (length:50) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14732 calc(14732) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 40915302 | | | | Checksum = 1181325086 calc(1181325086) | | | CHUNK_SHUTDOWN_COMPLETE (length:4) | | | | Type = 14 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 4
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 39072 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 8170 calc(8170) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4389 | | | | DestinationPort = 3389 | | | | VerificationTag = 1 | | | | Checksum = 307504265 calc(307504265) | | | CHUNK_SHUTDOWN_ACK (length:4) | | | | Type = 8 | | | | Flags = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_shutdown_ack_rcv=================================
Frame_Ether (length:50) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14732 calc(14732) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 40915302 | | | | Checksum = 956028603 calc(956028603) | | | CHUNK_SHUTDOWN_COMPLETE (length:4) | | | | Type = 14 | | | | Reserved = 0 | | | | TFlag = 1 | | | | Length = 4
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 39073 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 8169 calc(8169) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4389 | | | | DestinationPort = 3389 | | | | VerificationTag = 1 | | | | Checksum = 307504265 calc(307504265) | | | CHUNK_SHUTDOWN_ACK (length:4) | | | | Type = 8 | | | | Flags = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_shutdown_ack_rcv=================================
Frame_Ether (length:50) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14732 calc(14732) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3389 | | | | DestinationPort = 4389 | | | | VerificationTag = 40915201 | | | | Checksum = 1874404066 calc(1874404066) | | | CHUNK_SHUTDOWN_COMPLETE (length:4) | | | | Type = 14 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 4