Title | ICMP Packet Too Big message is received with MTU less than default minimum PMTU |
CommandLine | ./PMTU_TooSlow.seq -pkt ./PMTU_TooSlow.def -log 9.html -ti ICMP Packet Too Big message is received with MTU less than default minimum PMTU |
TestVersion | REL_1_0_0 |
ToolVersion | REL_3_1_0 |
Start | 2009/02/13 13:17:06 |
Tn | .//../etc//tn.def |
Nu | .//../etc//nut.def |
Pkt | ./PMTU_TooSlow.def |
System | linux-v6 |
TargetName | RHEL5GA |
HostName | FNST |
Type | IPv4 |
13:17:07 | Start |
13:17:07 | Start Capturing Packets (Link0) |
=============== sctpCheckEnv =============== | |
13:17:07 |
vRemote(rcommand.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommand.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp" ''
Connected. Red Hat Enterprise Linux Server release 5.2 (Tikanga) Kernel 2.6.29-rc4 on an i686 RHEL login: root Password: Last login: Fri Feb 13 13:28:54 on ttyS0 [root@RHEL ~]# [root@RHEL ~]# killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_sta tus; checksctp sctp_test: no process killed sctp_darn: no process killed sctp_status: no process killed SCTP supported [root@RHEL ~]# sendMessagesSync: never got killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp echo $? 0 [root@RH~. Disconnected. |
============== sctpPingToHost ============== | |
13:17:17 |
vSend(Link0,echo4_request_on_link0) Send Echo Request on Link0 |
13:17:18 | vRecv(Link0,echo4_reply_on_link0 arp_request_on_link0) timeout:5 cntLimit:0 seektime:0 Recv ARP Request on Link0 |
13:17:18 |
vSend(Link0,arp_reply_on_link0) Send ARP Reply on Link0 |
13:17:18 | vRecv(Link0,echo4_reply_on_link0) timeout:5 cntLimit:0 seektime:0 Recv Echo Reply on Link0 |
============== sctpStartClient ============= | |
13:17:18 |
vRemote(rcommandasync.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommandasync.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="sleep 5 && sctp_test -H 192.168.0.21 -P 4492 -h 192.168.0.100 -p 3492 -T -s -c -800 -X 1 -x 1 -o 1 > /tmp/tstcmd.log 2>&1 &" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# sleep 5 && sctp_test -H 192.168.0.21 -P 4492 -h 192.1~. Disconnected. |
================= vListen ================== | |
13:17:22 | vRecv(Link0,sctp_chunk_init_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_INIT |
13:17:24 |
vSend(Link0,sctp_chunk_init_ack_snd) Send SCTP CHUNK_INIT_ACK |
================= vAccept ================== | |
13:17:24 | vRecv(Link0,sctp_chunk_cookie_echo_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_COOKIE_ECHO |
13:17:24 |
vSend(Link0,sctp_chunk_cookie_ack_snd) Send SCTP CHUNK_COOKIE_ACK |
================ Main Test ================= | |
13:17:24 | vRecv(Link0,sctp_chunk_data_big arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_DATA |
13:17:25 |
vSend(Link0,icmp_pkt_too_big) Send ICMPv4 Fragmentation Needed message |
== DATA chunk will be fragmented by IP layer == | |
13:17:25 | vRecv(Link0,sctp_chunk_data_frag_1st sctp_chunk_data_frag_2nd arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_DATA (1st fragment) |
13:17:25 | vRecv(Link0,sctp_chunk_data_frag_2nd arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_DATA (2nd fragment) |
13:17:25 |
vSend(Link0,sctp_chunk_sack_snd) Send SCTP CHUNK_SACK |
================ vShutdown ================= | |
13:17:25 | vRecv(Link0,sctp_chunk_shutdown_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_SHUTDOWN |
13:17:25 |
vSend(Link0,sctp_chunk_shutdown_ack_snd) Send SCTP CHUNK_SHUTDOWN_ACK |
13:17:25 | vRecv(Link0,sctp_chunk_shutdown_complete_rcv arp_request_on_link0 ) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_SHUTDOWN_COMPLETE |
OK == Need Reboot Remote System to restore Test Environment == Target: Reboot |
|
13:17:25 |
vRemote(reboot.rmt) ``/usr/local/v6eval//bin/linux-v6//reboot.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 ''
Connected. [1]+ Done sleep 5 && sctp_test -H 192.168.0.21 -P 4492 -h 192.168.0.100 -p 3492 -T -s -c -800 -X 1 -x 1 -o 1 > /tmp/tstcmd.log 2>&1 [root@RHEL ~]# [root@RHEL ~]# reboot Broadcast message from root (ttyS0) (Fri Feb 13 13:32:22 2009): The system is going down for reboot NOW! c Red Hat Enterprise Linux Server release 5.2 (Tikanga) Kernel 2.6.29-rc4 on an i686 RHEL login: ~.~. ~. Disconnected. |
13:19:51 | End |
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 14847 calc(14847) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | ICMPv4_EchoRequest (length:32) | | | Type = 8 | | | Code = 0 | | | Checksum = 50238 calc(50238) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = ff:ff:ff:ff:ff:ff | | SourceAddress = 0:c:29:f:17:34 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 1 | | | SenderHAddr = 0:c:29:f:17:34 | | | SenderPAddr = 192.168.0.21 | | | TargetHAddr = 0:0:0:0:0:0 | | | TargetPAddr = 192.168.0.100 | [Needless] (length:18) | | data = | | 00000000 00000000 00000000 00000000 0000 ===echo4_reply_on_link0================================= ng compare _HETHER_nut2tn.DestinationAddress received:ff:ff:ff:ff:ff:ff = 0:0:0:0:1:0 ng compare _HETHER_nut2tn.Type received:2054 = 2048 ng meta Frame_Ether.Packet_IPv4 != Frame_Ether.Packet_ARP ===arp_request_on_link0=================================
Frame_Ether (length:42) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2054 | Packet_ARP (length:28) | | Hdr_ARP (length:28) | | | Hardware = 1 | | | Protocol = 2048 | | | HLEN = 6 | | | PLEN = 4 | | | Operation = 2 | | | SenderHAddr = 0:0:0:0:1:0 | | | SenderPAddr = 192.168.0.100 | | | TargetHAddr = 0:c:29:f:17:34 | | | TargetPAddr = 192.168.0.21
Frame_Ether (length:66) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:52) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 52 | | | Identifier = 8480 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 1 | | | HeaderChecksum = 55263 calc(55263) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | ICMPv4_EchoReply (length:32) | | | Type = 0 | | | Code = 0 | | | Checksum = 52286 calc(52286) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:24) | | | | data = | | | | 4563686f 44617461 4563686f 44617461 4563686f 44617461 ===echo4_reply_on_link0=================================
Frame_Ether (length:90) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:76) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 76 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47202 calc(47202) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:56) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4492 | | | | DestinationPort = 3492 | | | | VerificationTag = 0 | | | | Checksum = 3624939735 calc(3624939735) | | | CHUNK_INIT (length:44) | | | | Type = 1 | | | | Flags = 0 | | | | Length = 44 | | | | InitiateTag = 1100648709 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 10 | | | | NumOfInbound = 65535 | | | | TSN = 1083060133 | | | | SupportAddress (length:8) | | | | | Type = 12 | | | | | Length = 6 | | | | | AddrType = 5 | | | | | Padding = 0000 | | | | ENCCapable (length:4) | | | | | Type = 32768 | | | | | Length = 4 | | | | ForwardTSN (length:4) | | | | | Type = 49152 | | | | | Length = 4 | | | | AdaptationLayerIndication (length:8) | | | | | Type = 49158 | | | | | Length = 8 | | | | | Indication = 0 ===sctp_chunk_init_rcv=================================
Frame_Ether (length:166) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:152) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 152 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14616 calc(14616) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:132) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3492 | | | | DestinationPort = 4492 | | | | VerificationTag = 1100648709 | | | | Checksum = 1564091618 calc(1564091618) | | | CHUNK_INIT_ACK (length:120) | | | | Type = 2 | | | | Flags = 0 | | | | Length = 120 | | | | InitiateTag = 1 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 100 | | | | NumOfInbound = 65535 | | | | TSN = 100 | | | | StaleCookie (length:84) | | | | | Type = 7 | | | | | Length = 84 | | | | | Cookie = | | | | | 76650e8c 6fde9186 a767207e bae15ba8 00000000 00000000 00000000 00000000 | | | | | 00000000 c5f55ac4 30be5221 00000000 00000000 369c2046 e73c0700 0a000a00 | | | | | 0194cdd9 02000904 c0a80013 00000000 | | | | ENCCapable (length:4) | | | | | Type = 32768 | | | | | Length = 4 | | | | ForwardTSN (length:4) | | | | | Type = 49152 | | | | | Length = 4 | | | | AdaptationLayerIndication (length:8) | | | | | Type = 49158 | | | | | Length = 8 | | | | | Indication = 0
Frame_Ether (length:130) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:116) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 116 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47162 calc(47162) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:96) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4492 | | | | DestinationPort = 3492 | | | | VerificationTag = 1 | | | | Checksum = 1964196914 calc(1964196914) | | | CHUNK_COOKIE_ECHO (length:84) | | | | Type = 10 | | | | Flags = 0 | | | | Length = 84 | | | | Cookie = | | | | 76650e8c 6fde9186 a767207e bae15ba8 00000000 00000000 00000000 00000000 | | | | 00000000 c5f55ac4 30be5221 00000000 00000000 369c2046 e73c0700 0a000a00 | | | | 0194cdd9 02000904 c0a80013 00000000 ===sctp_chunk_cookie_echo_rcv=================================
Frame_Ether (length:50) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14732 calc(14732) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3492 | | | | DestinationPort = 4492 | | | | VerificationTag = 1100648709 | | | | Checksum = 2193505780 calc(2193505780) | | | CHUNK_COOKIE_ACK (length:4) | | | | Type = 11 | | | | Flags = 0 | | | | Length = 4
Frame_Ether (length:862) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:848) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 848 | | | Identifier = 1 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 46429 calc(46429) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:828) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4492 | | | | DestinationPort = 3492 | | | | VerificationTag = 1 | | | | Checksum = 722498674 calc(722498674) | | | CHUNK_DATA (length:816) | | | | Type = 0 | | | | Reserved = 0 | | | | IFlag = 0 | | | | UFlag = 0 | | | | BFlag = 1 | | | | EFlag = 1 | | | | Length = 816 | | | | TSN = 1083060133 | | | | Identifier = 0 | | | | SequenceNumber = 0 | | | | Protocol = 1823166532 | | | | Payload (length:800) | | | | | data = | | | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373800 ===sctp_chunk_data_big=================================
Frame_Ether (length:106) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:92) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 92 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 1 | | | HeaderChecksum = 14807 calc(14807) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | ICMPv4_DestinationUnreachable (length:72) | | | Type = 3 | | | Code = 4 | | | Checksum = 29242 calc(29242) | | | Unused = 20 | | | Payload (length:64) | | | | data = | | | | 45000350 00000000 ff843660 c0a80015 c0a80064 118c0da4 00000001 2b107472 | | | | 00030330 408e2fa5 00000000 6cab5044 30313233 34353637 38393031 32333435
Frame_Ether (length:586) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:572) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 572 | | | Identifier = 2 | | | Reserved = 0 | | | DF = 0 | | | MF = 1 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 54896 calc(54896) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Payload (length:552) | | | data = | | | 118c0da4 00000001 2b107472 00030330 408e2fa5 00000000 6cab5044 30313233 | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 ===sctp_chunk_data_frag_1st=================================
Frame_Ether (length:310) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:296) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 296 | | | Identifier = 2 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 69 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 63295 calc(63295) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Payload (length:276) | | | data = | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | 30313233 34353637 38393031 32333435 36373839 30313233 34353637 38393031 | | | 32333435 36373839 30313233 34353637 38393031 32333435 36373839 30313233 | | | 34353637 38393031 32333435 36373839 30313233 34353637 38393031 32333435 | | | 36373839 30313233 34353637 38393031 32333435 36373839 30313233 34353637 | | | 38393031 32333435 36373839 30313233 34353637 38393031 32333435 36373839 | | | 30313233 34353637 38393031 32333435 36373800 ===sctp_chunk_data_frag_2nd=================================
Frame_Ether (length:62) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:48) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 48 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14720 calc(14720) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:28) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3492 | | | | DestinationPort = 4492 | | | | VerificationTag = 1100648709 | | | | Checksum = 2831751870 calc(2831751870) | | | CHUNK_SACK (length:16) | | | | Type = 3 | | | | Flags = 0 | | | | Length = 16 | | | | ACK = 1083060133 | | | | AdvRecvWindow = 54784 | | | | NumOfGapAck = 0 | | | | NumOfDupTSN = 0
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:40) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 40 | | | Identifier = 3 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47235 calc(47235) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:20) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4492 | | | | DestinationPort = 3492 | | | | VerificationTag = 1 | | | | Checksum = 3993253802 calc(3993253802) | | | CHUNK_SHUTDOWN (length:8) | | | | Type = 7 | | | | Flags = 0 | | | | Length = 8 | | | | TSN = 99 | [Needless] (length:6) | | data = 00000000 0000 ===sctp_chunk_shutdown_rcv=================================
Frame_Ether (length:50) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 0 | | | TotalLength = 36 | | | Identifier = 0 | | | Reserved = 0 | | | DF = 0 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 255 | | | Protocol = 132 | | | HeaderChecksum = 14732 calc(14732) | | | SourceAddress = 192.168.0.100 | | | DestinationAddress = 192.168.0.21 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3492 | | | | DestinationPort = 4492 | | | | VerificationTag = 1100648709 | | | | Checksum = 3140951958 calc(3140951958) | | | CHUNK_SHUTDOWN_ACK (length:4) | | | | Type = 8 | | | | Flags = 0 | | | | Length = 4
Frame_Ether (length:60) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 2048 | Packet_IPv4 (length:36) | | Hdr_IPv4 (length:20) | | | Version = 4 | | | IHL = 5 | | | TypeOfService = 2 | | | TotalLength = 36 | | | Identifier = 4 | | | Reserved = 0 | | | DF = 1 | | | MF = 0 | | | FragmentOffset = 0 | | | TTL = 64 | | | Protocol = 132 | | | HeaderChecksum = 47238 calc(47238) | | | SourceAddress = 192.168.0.21 | | | DestinationAddress = 192.168.0.100 | | Upp_SCTP (length:16) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4492 | | | | DestinationPort = 3492 | | | | VerificationTag = 1 | | | | Checksum = 1389666899 calc(1389666899) | | | CHUNK_SHUTDOWN_COMPLETE (length:4) | | | | Type = 14 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 4 | [Needless] (length:10) | | data = 00000000 00000000 0000 ===sctp_chunk_shutdown_complete_rcv=================================