Behavior Engineering for Hindrance                     R. Denis-Courmont
Avoidance                                                          Nokia
Internet-Draft                                            August 7, 2007
Intended status: Informational
Expires: February 8, 2008


                      Test vectors for RFC3489bis
             draft-denis-behave-rfc3489bis-test-vectors-00

Status of This Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on February 8, 2008.

Copyright Notice

   Copyright (C) The IETF Trust (2007).

Abstract

   This document includes test vectors for the MESSAGE-INTEGRITY and
   FINGERPRINT attributes of the STUN protocol.

1.  Introduction

   The Session Traversal Utilities for NAT
   (STUN)[I-D.ietf-behave-rfc3489bis] protocol defines two different



Denis-Courmont          Expires February 8, 2008                [Page 1]


Internet-Draft              STUN test vectors                August 2007


   hashes that may be included in messages exchanged by peers
   implementing that protocol:

   FINGERPRINT attribute:  a 32-bits Circular Redundancy Check.
   MESSAGE-INTEGRITY attribute:  a HMAC-SHA1 authentication code.

   This document documents sample properly-formatted STUN messages
   including these hashes, for the sake of testing implementations of
   the STUN protocol.

   HELP: we need other implementors to double-check these!

2.  Test vectors

   All included vectors are represented as a series of hexadecimal
   values in network byte order.  Each pair of hexadecimal digits
   represents one byte.

   Messages follow the ICE Connectivity Checks use case of STUN, (see
   [I-D.ietf-mmusic-ice]).  They include both FINGERPRINT and MESSAGE-
   INTEGRITY attributes.

2.1.  Sample request

   This request uses the following parameters:
   Username:  "evtj:h6vY" (without quotes)
   Password:  "VOkJxbRl1RmTxUk/WvJxBt" (without quotes)
























Denis-Courmont          Expires February 8, 2008                [Page 2]


Internet-Draft              STUN test vectors                August 2007


          00 01 00 44     Request type and message length
          21 12 a4 42     Message cookie
          b7 e7 a7 01  }
          bc 34 d6 86  }  Transaction ID
          fa 87 df ae  }
          00 24 00 04
          6e 00 01 ff
          80 29 00 08
          93 2f f9 b1
          51 26 3b 36
          00 06 00 09     USERNAME attribute header
          65 76 74 6a  }
          3a 68 36 76  }  Username (9 bytes) and padding (3 bytes)
          59 20 20 20  }
          00 08 00 14     MESSAGE-INTEGRITY attribute header
          4b 7f 4a 40  }
          6b f9 8f 1b  }
          43 e9 7b 7e  }  HMAC-SHA1 fingerprint
          5f ef 68 d7  }
          da b8 a4 b9  }
          80 28 00 04     FINGERPRINT attribute header
          f8 20 22 bc     CRC32 fingerprint

2.2.  Sample response

   This response used the following parameter:
   Password:  "VOkJxbRl1RmTxUk/WvJxBt" (without quotes)

             01 01 00 3c     Response type and message length
             21 12 a4 42     Message cookie
             b7 e7 a7 01  }
             bc 34 d6 86  }  Transaction ID
             fa 87 df ae  }
             80 22 00 0a
             6e 69 63 65
             20 30 2e 30
             2e 31 20 20
             00 20 00 08
             00 01 a1 47
             5e 12 a4 43
             00 08 00 14     MESSAGE-INTEGRITY attribute header
             d5 4d 8c de  }
             56 94 52 e5  }
             58 38 d5 5e  }  HMAC-SHA1 fingerprint
             aa 9a 4f c0  }
             55 44 07 ca  }
             80 28 00 04     FINGERPRINT attribute header
             b1 77 7f ca     CRC32 fingerprint



Denis-Courmont          Expires February 8, 2008                [Page 3]


Internet-Draft              STUN test vectors                August 2007


3.  Security Considerations

   There are no security considerations.

4.  IANA Considerations

   This document raises no IANA considerations.

5.  Normative References

   [I-D.ietf-behave-rfc3489bis]  Rosenberg, J., Huitema, C., Mahy, R.,
                                 Matthews, P., and D. Wing, "Session
                                 Traversal Utilities for (NAT) (STUN)",
                                 draft-ietf-behave-rfc3489bis-08 (work
                                 in progress), July 2007.

   [I-D.ietf-mmusic-ice]         Rosenberg, J., "Interactive
                                 Connectivity Establishment (ICE): A
                                 Protocol for Network Address
                                 Translator (NAT) Traversal for Offer/
                                 Answer Protocols",
                                 draft-ietf-mmusic-ice-17 (work in
                                 progress), July 2007.

Author's Address

   Remi Denis-Courmont
   Nokia Corporation
   P.O. Box 407
   NOKIA GROUP  00045
   FI

   Phone: +358 50 487 6315
   EMail: remi.denis-courmont@nokia.com

















Denis-Courmont          Expires February 8, 2008                [Page 4]


Internet-Draft              STUN test vectors                August 2007


Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).







Denis-Courmont          Expires February 8, 2008                [Page 5]