NAME

 HTR_E_In_AuthKey - Host Transport Mode ESP Inbound Invalid Authentication Key
 


TARGET

 Host


SYNOPSIS

 HTR_E_In_AuthKey.seq [-tooloption ...] -pkt HTR_E_AuthKey.def
 -tooloption : v6eval tool option
 See also HTR_E_common.def and HTR_common.def


INITIALIZATION

For details of Network Topology, see 00README

Set NUT's SAD and SPD as following:

 NET5 NET3
 HOST1_NET5 -- Router -- NUT
 -----transport----->

Security Association Database (SAD)

source address HOST1_NET5
destination address NUT_NET3
SPI 0x1000
mode transport
protocol ESP
ESP algorithm DES-CBC
ESP algorithm key 01234567
ESP authentication HMAC-MD5
ESP authentication key 0123456789ABCDEF

Security Policy Database (SPD)

source address HOST1_NET5
destination address NUT_NET3
upper spec any
direction in
protocol ESP
mode transport


TEST PROCEDURE

 Tester Target
 | |
 |-------------------------->|
 | ICMP Echo Request |
 | (with ESP) |
 | |
 | (<----------------------) | | No ICMP Echo Reply | | | v v 
  1. Send ICMP Echo Request with ESP
  2. Receive nothing

ICMP Echo Request with ESP

IP Header Source Address HOST1_NET5
Destination Address NUT_NET3
ESP SPI 0x1000
Algorithm DES-CBC
Key 01234567
Authentication Algorithm HMAC-MD5
Authentication Key foo0foo1foo2foo3
ICMP Type 128 (Echo Request)

ICMP Echo Reply

IP Header Source Address NUT_NET3
Destination Address HOST1_NET5
ICMP Type 129 (Echo Reply)


JUDGEMENT

 PASS: Nothing received
 FAIL: ICMP Echo Reply received


SEE ALSO

 perldoc V6evalTool
 IPSEC.html IPsec Test Common Utility

AltStyle によって変換されたページ (->オリジナル) /