Bug #4998
Updated by Junxiao Shi over 5 years ago
Steps to reproduce: ``` echo 0542073208036e646e080962726f6164636173740820$(makepasswd | openssl sha256 | awk '{print $2}')090214000a0483a975840c021388 \ | xxd -r -p | nc hobo.cs.arizona.edu 6363 ``` This injects a malformed packets of structure: ``` Interest Name GenericNameComponent ndn GenericNameComponent broadcast GenericNameComponent [RANDOM] Selectors MetaInfo (empty) Nonce 0x83a97584 InterestLifetime 5000 ``` Expected: NFD drops the malformed packet. Actual: persistent Interest loop occurs across the testbed. This was [observed observed on global testbed](https://lists.netsec.colostate.edu/mailman/private/operators/2019-September/001359.html) testbed on 04 Sep 2019. Steps above were developed according to captured packet samples. samples