Bug #4998
Updated by Junxiao Shi about 6 years ago
Steps to reproduce:
```
echo 0542073208036e646e080962726f6164636173740820$(makepasswd | openssl sha256 | awk '{print $2}')090214000a0483a975840c021388 \
| xxd -r -p | nc hobo.cs.arizona.edu 6363
```
This injects a malformed packets of structure:
```
Interest
Name
GenericNameComponent ndn
GenericNameComponent broadcast
GenericNameComponent [RANDOM]
Selectors
MetaInfo (empty)
Nonce 0x83a97584
InterestLifetime 5000
```
Expected: NFD drops the malformed packet.
Actual: persistent Interest loop occurs across the testbed.
This was [observed observed on global testbed](https://lists.netsec.colostate.edu/mailman/private/operators/2019-September/001359.html) testbed on 04 Sep 2019. Steps above were developed according to captured packet samples. samples