| thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_NONE | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. "marajade--vpsn" #408: I did not send a certificate because I do not have one. | I am not sending a certificate request | started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | concluding with best_match=0 best=(nil) (lineno=-1) | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1536): 16198 usec | DH shared secret: | 0c 6a 00 29 fb dd 1e 78 57 9b 9d 90 58 f6 4e d7 | a7 0d 92 ea 17 87 ae ce 72 50 cc ab 7a c2 02 4d | 0c d9 95 9b 61 61 39 b3 43 d0 ee 31 89 3a 0a d9 | 62 a7 a2 b9 ea 12 36 54 ba 80 ed a3 22 70 4e e8 | b3 09 66 52 5e 4e 32 b5 82 2c 5f 97 88 a3 2b c0 | 22 5d d6 e3 e3 f0 ca bf 99 39 5c 55 f2 2a 81 e9 | ff 6f 30 36 27 fb 15 1f c6 50 a9 fc 1f 5e be 09 | 1d b4 7d e2 1a 7c db f8 7b 94 3f 82 27 54 f6 34 | 32 d4 a3 26 5d 48 e6 a9 f4 12 cb 21 8f 7f 1a 4e | 83 8e 73 4f 7d 28 53 f2 57 96 14 67 ee ee 01 b6 | a0 9e ae 8e f2 f9 ce 3e 1c a0 fd 2a d0 38 b7 68 | 1f d6 dc 5b 1b d0 ff ce 6a 93 ec 6b 4e 7b a1 6c | skeyid inputs (digi+NI+NR+shared) hasher: oakley_md5 | shared: 0c 6a 00 29 fb dd 1e 78 57 9b 9d 90 58 f6 4e d7 | a7 0d 92 ea 17 87 ae ce 72 50 cc ab 7a c2 02 4d | 0c d9 95 9b 61 61 39 b3 43 d0 ee 31 89 3a 0a d9 | 62 a7 a2 b9 ea 12 36 54 ba 80 ed a3 22 70 4e e8 | b3 09 66 52 5e 4e 32 b5 82 2c 5f 97 88 a3 2b c0 | 22 5d d6 e3 e3 f0 ca bf 99 39 5c 55 f2 2a 81 e9 | ff 6f 30 36 27 fb 15 1f c6 50 a9 fc 1f 5e be 09 | 1d b4 7d e2 1a 7c db f8 7b 94 3f 82 27 54 f6 34 | 32 d4 a3 26 5d 48 e6 a9 f4 12 cb 21 8f 7f 1a 4e | 83 8e 73 4f 7d 28 53 f2 57 96 14 67 ee ee 01 b6 | a0 9e ae 8e f2 f9 ce 3e 1c a0 fd 2a d0 38 b7 68 | 1f d6 dc 5b 1b d0 ff ce 6a 93 ec 6b 4e 7b a1 6c | ni: e7 ff 90 49 25 b6 ff 99 59 ae 80 84 63 3e ec 2f | nr: a2 7d e9 af fc 36 0b 6d e8 4c 80 d6 87 9e 6d c6 | keyid: 7c 5d 2a 9b 82 bb 9d 69 28 ad 2f 9d fe 69 4a f8 | DH_i: 53 41 5e 65 f1 c1 1c a9 2e 0c 82 d7 7a e1 4d 24 | 9d 5f c8 aa 68 99 02 0d db 88 e9 59 0b e3 b1 7c | 82 25 c0 c8 bf 63 2e fc 17 78 2c 41 0a d3 d6 f6 | d0 6e b8 71 97 21 22 e4 46 8b 91 93 f9 45 fb 25 | 1b 10 eb 66 db 3d a5 c8 92 48 2e 8e aa b8 4e 6a | 1f 61 4d d9 a1 10 28 3f 1d 71 78 e0 70 fd 02 37 | 29 b0 d5 27 30 ff 1d 82 c5 99 54 3b 2c 07 3b f0 | 6a ed c4 c3 8b 49 53 d4 be 1c 69 88 f5 a0 22 aa | ae eb 32 1b cb aa 73 47 00 0f 0d c7 5e 2c 4f 47 | 37 5d e4 40 84 03 fb 3d 7f bb a3 4b 3e 41 21 fd | cb 6f f8 19 1a c8 b6 0d 4e 16 6c 60 77 c2 0f 8e | dd fc 06 74 41 58 a0 f6 d5 44 bb 19 c6 0d 51 27 | DH_r: f6 80 f2 11 ac b0 24 70 8e 23 14 5d cb 53 fb 60 | f0 65 8f da de e8 16 ec 38 02 53 3a 3d 49 9d 0d | c5 dc e0 23 ab bd 8f 9c b3 e2 2d 33 43 29 5a 65 | 58 ee 3a 59 53 17 ab 94 c5 78 45 15 91 49 df 2a | ab a6 12 d9 bd 01 12 c0 a0 5e 75 d3 56 48 b4 83 | 8c c4 3d 64 a5 b1 9e fc d6 17 36 7f ac f7 a3 08 | 4c 4c 74 23 6d 88 dc d3 4c b1 5f 64 dd dc 20 ad | a5 51 ef 9a e8 ec 6a 00 3e 69 f5 c1 9b 32 84 be | 75 13 d8 2b cb 34 3d cd d6 5b 18 fc cc 5f c5 0c | 96 8e 4c a5 fa 9e 00 d3 1e a9 ce 75 2a 59 33 3d | a3 6f e0 bd c2 2d 53 19 01 bb 8b 7f cd fb 41 b9 | 8b 08 68 66 c8 4b 2c c9 49 3a 22 b5 7b c9 8e 31 | Skeyid: 7c 5d 2a 9b 82 bb 9d 69 28 ad 2f 9d fe 69 4a f8 | Skeyid_d: f0 f5 e2 31 c4 59 0e 25 6d 56 aa dd 51 53 2d 4d | Skeyid_a: 1d 2c 8b 8f 82 47 e5 4c 0e 36 5d 9d 56 b7 ef df | Skeyid_e: 1d 53 2b f6 b8 ad fd 64 bd df cc a8 4d 54 9a 55 | enc key: 0c c4 0b 85 56 b7 d2 ee 69 df db 3e e2 ce b6 96 | eb 9d fe ca 5a a2 92 28 | IV: 4a a9 62 4b 13 f4 59 1a cd 9f ac 99 7e b5 76 81 | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= cd 96 c8 f7 | _natd_hash: port=500 | _natd_hash: hash= 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= d8 bf 8c 26 | _natd_hash: port=500 | _natd_hash: hash= 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | NAT_TRAVERSAL hash=0 (me:0) (him:0) | expected NAT-D(me): 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | expected NAT-D(him): | 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | received NAT-D: 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | NAT_TRAVERSAL hash=1 (me:1) (him:0) | expected NAT-D(me): 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | expected NAT-D(him): | 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | received NAT-D: 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | NAT_TRAVERSAL hash=2 (me:1) (him:1) "marajade--vpsn" #408: NAT-Traversal: Result using 3: no NAT detected | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_SIG | ID type: ID_FQDN | Protocol ID: 0 | port: 0 | emitting 21 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 6d 61 72 61 6a 61 64 65 2e 73 61 6e 64 65 6c 6d | 61 6e 2e 63 61 | emitting length of ISAKMP Identification Payload (IPsec DOI): 29 | hashing 144 bytes of SA | started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA | actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA | best_match 0>1 best=0x81092f8 (line=1) | concluding with best_match=1 best=0x81092f8 (lineno=1) | signing hash with RSA Key *AQO2bOzfW | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload | SIG_I 0c a8 40 82 cf 9b 67 77 93 cd 98 53 f2 cb ff e3 | 03 fe ad b9 50 16 0d 69 4b db 84 53 a8 a7 8b 48 | bb f1 5b 72 7a 91 d8 1a 89 75 34 61 ed 0d 0a cf | d1 c4 b4 0d 3b 38 fc e7 30 c6 66 5b ca 09 9e 53 | fa 3c c4 c9 70 e3 9e 09 53 ec 69 d6 02 c4 0f b3 | 37 60 25 d6 28 3f 19 c9 c1 31 74 a5 18 bb f1 0c | cd a3 df 19 c7 14 b0 75 c6 f0 10 53 67 8a 5d eb | a9 a4 82 5f 92 fb aa 0b 63 8e ec 91 18 ce 42 4e | 4c 41 b9 c2 cb 46 ee 21 06 7a 20 e0 b5 96 6a 0d | 56 b0 58 27 14 49 62 1a 34 5f 9f 30 de 25 1f a4 | c4 d7 30 ad ba 73 22 9c a1 fb f5 67 80 5d a0 dd | 27 a0 d9 49 5e c9 08 e0 82 19 8f 50 7d ff 98 bf | 5e e2 f1 8a 50 e0 ae f6 82 c7 84 af 1c a6 aa 2d | e1 ab ab 71 67 ca d0 44 c3 67 da 42 bb 66 e1 ec | e8 cc 3a 7c 01 b4 fa e6 3e 86 f5 ed bf 3c cd 0e | 69 ee 7a 7e cd 4c b1 37 21 92 99 0d 64 b7 51 f7 | 55 ab 97 9b 8f 8b 4e 3c 37 4c 4d b6 0d 25 82 90 | 2d ed | emitting length of ISAKMP Signature Payload: 278 | encrypting: | 09 00 00 1d 02 00 00 00 6d 61 72 61 6a 61 64 65 | 2e 73 61 6e 64 65 6c 6d 61 6e 2e 63 61 00 00 01 | 16 0c a8 40 82 cf 9b 67 77 93 cd 98 53 f2 cb ff | e3 03 fe ad b9 50 16 0d 69 4b db 84 53 a8 a7 8b | 48 bb f1 5b 72 7a 91 d8 1a 89 75 34 61 ed 0d 0a | cf d1 c4 b4 0d 3b 38 fc e7 30 c6 66 5b ca 09 9e | 53 fa 3c c4 c9 70 e3 9e 09 53 ec 69 d6 02 c4 0f | b3 37 60 25 d6 28 3f 19 c9 c1 31 74 a5 18 bb f1 | 0c cd a3 df 19 c7 14 b0 75 c6 f0 10 53 67 8a 5d | eb a9 a4 82 5f 92 fb aa 0b 63 8e ec 91 18 ce 42 | 4e 4c 41 b9 c2 cb 46 ee 21 06 7a 20 e0 b5 96 6a | 0d 56 b0 58 27 14 49 62 1a 34 5f 9f 30 de 25 1f | a4 c4 d7 30 ad ba 73 22 9c a1 fb f5 67 80 5d a0 | dd 27 a0 d9 49 5e c9 08 e0 82 19 8f 50 7d ff 98 | bf 5e e2 f1 8a 50 e0 ae f6 82 c7 84 af 1c a6 aa | 2d e1 ab ab 71 67 ca d0 44 c3 67 da 42 bb 66 e1 | ec e8 cc 3a 7c 01 b4 fa e6 3e 86 f5 ed bf 3c cd | 0e 69 ee 7a 7e cd 4c b1 37 21 92 99 0d 64 b7 51 | f7 55 ab 97 9b 8f 8b 4e 3c 37 4c 4d b6 0d 25 82 | 90 2d ed | IV: | 4a a9 62 4b 13 f4 59 1a cd 9f ac 99 7e b5 76 81 | emitting 5 zero bytes of encryption padding into ISAKMP Message | encrypting using OAKLEY_3DES_CBC | next IV: 3c 13 5f 77 7b 75 24 f9 | emitting length of ISAKMP Message: 340 | complete state transition with STF_OK "marajade--vpsn" #408: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | sending reply packet to 216.191.140.38:500 (from port=500) | sending 340 bytes for STATE_MAIN_I2 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 05 10 02 01 00 00 00 00 00 00 01 54 47 7a e8 6a | e5 03 c9 4c b3 ed 80 2b 5f 08 56 14 5b 46 30 7b | d1 00 07 f1 6e 40 e1 b7 51 a4 ff 55 7f 0f d2 74 | 23 e2 54 77 4b 7a ca 80 0c 29 87 ea 64 bd 75 4f | 66 52 6a 58 69 c1 1d e1 bd 53 11 7e 7a 10 87 44 | 94 39 eb cf 92 aa fb 93 78 a5 26 b9 a7 25 07 ef | cd 27 43 7f d3 fc 49 00 90 2c 0b 02 c0 e5 19 2d | 07 eb ee f7 cc b2 ab a8 8f 79 e4 a4 98 0b b2 8d | 02 12 60 d8 af 68 25 fd d6 bf 4b a1 c1 58 1c 93 | ce 32 8b 07 89 fb 34 dc 8b cd 01 e8 72 7d 88 4c | 76 09 21 b1 f7 98 29 93 15 e4 9d 61 bc 15 43 75 | f1 53 21 cb 39 cf 55 a7 7c df c4 cd 6c 55 1f c2 | 55 2b df 5f b0 ff 60 91 a4 13 76 58 0e 0c 45 1a | 43 f8 30 eb a3 3f 02 4b a4 80 f9 11 7e 7a f6 70 | 12 d7 31 39 5a 32 0f 76 ec a7 3a 63 62 a9 f0 91 | ad e3 48 94 69 e3 48 c6 7b c7 13 d1 17 25 a9 7d | 24 4a d9 78 94 e9 12 9d 14 85 a6 3f 4c af b4 9b | 7f c8 12 30 fc 56 0c e2 e1 7c 97 bb 59 9c 11 66 | 43 7a fa 44 a7 21 c9 4b e3 9e d0 83 57 a5 bd eb | b7 f3 77 9f 29 0b 4a 81 97 b3 5c 85 3c 13 5f 77 | 7b 75 24 f9 | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #408 "marajade--vpsn" #408: STATE_MAIN_I3: sent MI3, expecting MR3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 1 to unpend | next event EVENT_RETRANSMIT in 2 seconds for #407 |