HTR_E_In_SlideReceiveWindow - Host Transport Mode ESP (NULL), Inbound Sliding receive window check
Host
HTR_E_In_SlideReceiveWindow.seq [-tooloption ...] -pkt HTR_E_SlideReceiveWindow.def
-tooloption : v6eval tool option
See also HTR_E_common.def and HTR_common.def
For details of Network Topology, see 00README
Set NUT's SAD and SPD as following:
NET5 NET3
HOST1_NET5 -- Router -- NUT
-----transport----->
Security Association Database (SAD)
| source address | HOST1_NET5 |
| destination address | NUT_NET3 |
| SPI | 0x1000 |
| mode | transport |
| protocol | ESP |
| ESP algorithm | NULL |
| ESP authentication | HMAC-MD5 |
| ESP authentication key | TAHITEST89ABCDEF |
Security Policy Database (SPD)
| source address | HOST1_NET5 |
| destination address | NUT_NET3 |
| upper spec | any |
| direction | in |
| protocol | ESP |
| mode | transport |
Tester Target | | |-------------------------->| | ICMP Echo Request | | ( with ESP, SEQ=1 ) | | | |<------------------------- | | ICMP Echo Reply | | : | | continue | |receive window size+1 times| | : | | | |-------------------------->| | ICMP Echo Request | | ( with ESP, SEQ=1 ) | | | | (<----------------------) | | no ICMP Echo Reply? | | | v v
ICMP Echo Request with ESP
| IP Header | Source Address | HOST1_NET5 |
| Destination Address | NUT_NET3 | |
| ESP | SPI | 0x1000 |
| Sequence Number | 1->33->1 | |
| Receive window size | 32 | |
| Algorithm | NULL | |
| ESP authentication | HMAC-MD5 | |
| ESP authentication key | TAHITEST89ABCDEF | |
| Padding | Zero | |
| Padding Length | 0 | |
| ICMP | Type | 128 (Echo Request) |
| Data Length | 14 |
ICMP Echo Reply
| IP Header | Source Address | NUT_NET3 |
| Destination Address | HOST1_NET5 | |
| ICMP | Type | 129 (Echo Reply) |
| Data Length | 14 |
FYI
Nothing received: TUN ignores left side sequence packet of receive window.
ICMP Echo Reply received: TUN accepts left side sequence packet of receive window.
perldoc V6evalTool
IPSEC.html IPsec Test Common Utility