Project

General

Profile

Bug #4998

Updated by Junxiao Shi over 1 year ago

Steps to reproduce: 

 ``` 
 echo 0542073208036e646e080962726f6164636173740820$(makepasswd | openssl sha256 | awk '{print $2}')090214000a0483a975840c021388 \ 
 | xxd -r -p | nc hobo.cs.arizona.edu 6363 
 ``` 

 This injects a malformed packets of structure: 

 ``` 
 Interest 
   Name 
     GenericNameComponent ndn 
     GenericNameComponent broadcast 
     GenericNameComponent [RANDOM] 
   Selectors 
     MetaInfo (empty) 
   Nonce 0x83a97584 
   InterestLifetime 5000 
 ``` 

 Expected: NFD drops the malformed packet. 
 Actual: persistent Interest loop occurs across the testbed. 

 This was [observed observed on global testbed](https://lists.netsec.colostate.edu/mailman/private/operators/2019-September/001359.html) testbed on 04 Sep 2019. Steps above were developed according to captured packet samples. samples

Back