diff --git a/gtests/net/packetdrill/tests/bsd/sctp/sctp_dup_cookie.pkt b/gtests/net/packetdrill/tests/bsd/sctp/sctp_dup_cookie.pkt
new file mode 100644
index 0000000000000000000000000000000000000000..426009b34c5dec10d565ff54ecdcab6a95c5b5f3
--- /dev/null
+++ b/gtests/net/packetdrill/tests/bsd/sctp/sctp_dup_cookie.pkt
@@ -0,0 +1,22 @@
+ 0.0 `sysctl -w net.inet.sctp.ecn_enable=1`
++0.0 `sysctl -w net.inet.sctp.pr_enable=0`
++0.0 `sysctl -w net.inet.sctp.asconf_enable=0`
++0.0 `sysctl -w net.inet.sctp.auth_enable=0`
++0.0 `sysctl -w net.inet.sctp.reconfig_enable=0`
++0.0 `sysctl -w net.inet.sctp.nrsack_enable=0`
++0.0 `sysctl -w net.inet.sctp.pktdrop_enable=0`
++0.0 socket(..., SOCK_STREAM, IPPROTO_SCTP) = 3
+// Check the handshake with en empty(!) cookie
++0.0 bind(3, ..., ...) = 0
++0.0 listen(3, 1) = 0
++0.0 < sctp: INIT[flgs=0, tag=1, a_rwnd=1500, os=1, is=1, tsn=0,
+                  ECN_CAPABLE[],
+                  COOKIE_PRESERVATIVE[incr=12345],
+                  SUPPORTED_ADDRESS_TYPES[types=[IPv4]]]
++0.0 > sctp: INIT_ACK[flgs=0, tag=2, a_rwnd=..., os=..., is=..., tsn=10,
+                      ECN_CAPABLE[],
+                      STATE_COOKIE[len=..., val=...]]
++0.1 < sctp: COOKIE_ECHO[flgs=0, len=..., val=...]
++0.0 > sctp: COOKIE_ACK[flgs=0]
++0.0 < sctp: COOKIE_ECHO[flgs=0, len=..., val=...]
++0.0 close(3) = 0