| *received 136 bytes from 216.191.140.38:500 on eth0 (port=500) | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 01 10 02 00 00 00 00 00 00 00 00 88 0d 00 00 34 | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01 | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 01 80 03 00 03 80 04 00 05 | 0d 00 00 10 4f 45 45 46 42 79 7f 64 75 7c 5f 5b | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc | 77 57 01 00 00 00 00 14 4a 13 1c 81 07 03 58 45 | 5c 57 28 f2 0e 95 45 2f | **parse ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | length: 136 | processing packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | state object not found | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: 00 00 00 00 00 00 00 00 | peer: d8 bf 8c 26 | state hash entry 21 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I1 | processing connection marajade--vpsn | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID | length: 52 | DOI: ISAKMP_DOI_IPSEC | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID | length: 16 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID | length: 20 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | length: 20 "marajade--vpsn" #408: received Vendor ID payload [Libreswan (this version) 2.CVSHEAD X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR] "marajade--vpsn" #408: received Vendor ID payload [Dead Peer Detection] "marajade--vpsn" #408: received Vendor ID payload [RFC 3947] method set to=110 | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | length: 40 | proposal number: 0 | protocol ID: PROTO_ISAKMP | SPI size: 0 | number of transforms: 1 | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE | length: 32 | transform number: 0 | transform ID: KEY_IKE | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ike_alg_enc_ok(ealg=5,key_len=0): blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1 | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | Oakley Transform 0 accepted | sender checking NAT-t: 1 and 110 "marajade--vpsn" #408: enabling possible NAT-traversal with method 3 | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1 | asking helper 0 to do build_kenonce op on seq: 408 | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #408 | complete state transition with STF_SUSPEND | next event EVENT_RETRANSMIT in 2 seconds for #407 ! helper -1 doing build_kenonce op id: 408 | helper 0 has work (cnt now 0) | helper 0 replies to sequence 408 | calling callback function 0x8068170