| thinking about whether to send my certificate:
|   I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_NONE 
|   sendcert: CERT_ALWAYSSEND and I did not get a certificate request 
|   so do not send cert.
"marajade--vpsn" #408: I did not send a certificate because I do not have one.
|  I am not sending a certificate request
| started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK
| actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK
| concluding with best_match=0 best=(nil) (lineno=-1)
| calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1536): 16198 usec
| DH shared secret:
|   0c 6a 00 29  fb dd 1e 78  57 9b 9d 90  58 f6 4e d7
|   a7 0d 92 ea  17 87 ae ce  72 50 cc ab  7a c2 02 4d
|   0c d9 95 9b  61 61 39 b3  43 d0 ee 31  89 3a 0a d9
|   62 a7 a2 b9  ea 12 36 54  ba 80 ed a3  22 70 4e e8
|   b3 09 66 52  5e 4e 32 b5  82 2c 5f 97  88 a3 2b c0
|   22 5d d6 e3  e3 f0 ca bf  99 39 5c 55  f2 2a 81 e9
|   ff 6f 30 36  27 fb 15 1f  c6 50 a9 fc  1f 5e be 09
|   1d b4 7d e2  1a 7c db f8  7b 94 3f 82  27 54 f6 34
|   32 d4 a3 26  5d 48 e6 a9  f4 12 cb 21  8f 7f 1a 4e
|   83 8e 73 4f  7d 28 53 f2  57 96 14 67  ee ee 01 b6
|   a0 9e ae 8e  f2 f9 ce 3e  1c a0 fd 2a  d0 38 b7 68
|   1f d6 dc 5b  1b d0 ff ce  6a 93 ec 6b  4e 7b a1 6c
| skeyid inputs (digi+NI+NR+shared) hasher: oakley_md5
| shared:   0c 6a 00 29  fb dd 1e 78  57 9b 9d 90  58 f6 4e d7
|   a7 0d 92 ea  17 87 ae ce  72 50 cc ab  7a c2 02 4d
|   0c d9 95 9b  61 61 39 b3  43 d0 ee 31  89 3a 0a d9
|   62 a7 a2 b9  ea 12 36 54  ba 80 ed a3  22 70 4e e8
|   b3 09 66 52  5e 4e 32 b5  82 2c 5f 97  88 a3 2b c0
|   22 5d d6 e3  e3 f0 ca bf  99 39 5c 55  f2 2a 81 e9
|   ff 6f 30 36  27 fb 15 1f  c6 50 a9 fc  1f 5e be 09
|   1d b4 7d e2  1a 7c db f8  7b 94 3f 82  27 54 f6 34
|   32 d4 a3 26  5d 48 e6 a9  f4 12 cb 21  8f 7f 1a 4e
|   83 8e 73 4f  7d 28 53 f2  57 96 14 67  ee ee 01 b6
|   a0 9e ae 8e  f2 f9 ce 3e  1c a0 fd 2a  d0 38 b7 68
|   1f d6 dc 5b  1b d0 ff ce  6a 93 ec 6b  4e 7b a1 6c
| ni:   e7 ff 90 49  25 b6 ff 99  59 ae 80 84  63 3e ec 2f
| nr:   a2 7d e9 af  fc 36 0b 6d  e8 4c 80 d6  87 9e 6d c6
| keyid:   7c 5d 2a 9b  82 bb 9d 69  28 ad 2f 9d  fe 69 4a f8
| DH_i:  53 41 5e 65  f1 c1 1c a9  2e 0c 82 d7  7a e1 4d 24
|   9d 5f c8 aa  68 99 02 0d  db 88 e9 59  0b e3 b1 7c
|   82 25 c0 c8  bf 63 2e fc  17 78 2c 41  0a d3 d6 f6
|   d0 6e b8 71  97 21 22 e4  46 8b 91 93  f9 45 fb 25
|   1b 10 eb 66  db 3d a5 c8  92 48 2e 8e  aa b8 4e 6a
|   1f 61 4d d9  a1 10 28 3f  1d 71 78 e0  70 fd 02 37
|   29 b0 d5 27  30 ff 1d 82  c5 99 54 3b  2c 07 3b f0
|   6a ed c4 c3  8b 49 53 d4  be 1c 69 88  f5 a0 22 aa
|   ae eb 32 1b  cb aa 73 47  00 0f 0d c7  5e 2c 4f 47
|   37 5d e4 40  84 03 fb 3d  7f bb a3 4b  3e 41 21 fd
|   cb 6f f8 19  1a c8 b6 0d  4e 16 6c 60  77 c2 0f 8e
|   dd fc 06 74  41 58 a0 f6  d5 44 bb 19  c6 0d 51 27
| DH_r:  f6 80 f2 11  ac b0 24 70  8e 23 14 5d  cb 53 fb 60
|   f0 65 8f da  de e8 16 ec  38 02 53 3a  3d 49 9d 0d
|   c5 dc e0 23  ab bd 8f 9c  b3 e2 2d 33  43 29 5a 65
|   58 ee 3a 59  53 17 ab 94  c5 78 45 15  91 49 df 2a
|   ab a6 12 d9  bd 01 12 c0  a0 5e 75 d3  56 48 b4 83
|   8c c4 3d 64  a5 b1 9e fc  d6 17 36 7f  ac f7 a3 08
|   4c 4c 74 23  6d 88 dc d3  4c b1 5f 64  dd dc 20 ad
|   a5 51 ef 9a  e8 ec 6a 00  3e 69 f5 c1  9b 32 84 be
|   75 13 d8 2b  cb 34 3d cd  d6 5b 18 fc  cc 5f c5 0c
|   96 8e 4c a5  fa 9e 00 d3  1e a9 ce 75  2a 59 33 3d
|   a3 6f e0 bd  c2 2d 53 19  01 bb 8b 7f  cd fb 41 b9
|   8b 08 68 66  c8 4b 2c c9  49 3a 22 b5  7b c9 8e 31
| Skeyid:    7c 5d 2a 9b  82 bb 9d 69  28 ad 2f 9d  fe 69 4a f8
| Skeyid_d:  f0 f5 e2 31  c4 59 0e 25  6d 56 aa dd  51 53 2d 4d
| Skeyid_a:  1d 2c 8b 8f  82 47 e5 4c  0e 36 5d 9d  56 b7 ef df
| Skeyid_e:  1d 53 2b f6  b8 ad fd 64  bd df cc a8  4d 54 9a 55
| enc key:  0c c4 0b 85  56 b7 d2 ee  69 df db 3e  e2 ce b6 96
|   eb 9d fe ca  5a a2 92 28
| IV:  4a a9 62 4b  13 f4 59 1a  cd 9f ac 99  7e b5 76 81
| _natd_hash: hasher=0x80e91e0(16)
| _natd_hash: icookie=
|   c8 c9 8b 44  19 84 5a 59
| _natd_hash: rcookie=
|   d0 23 4f 16  d3 3e 23 d4
| _natd_hash: ip=  cd 96 c8 f7
| _natd_hash: port=500
| _natd_hash: hash=  1e 32 60 d5  cf 6b ad a2  96 70 22 6c  77 6b 4e 24
| _natd_hash: hasher=0x80e91e0(16)
| _natd_hash: icookie=
|   c8 c9 8b 44  19 84 5a 59
| _natd_hash: rcookie=
|   d0 23 4f 16  d3 3e 23 d4
| _natd_hash: ip=  d8 bf 8c 26
| _natd_hash: port=500
| _natd_hash: hash=  6d e9 ea f1  ea a1 35 fe  b1 5c 57 83  da 33 30 02
| NAT_TRAVERSAL hash=0 (me:0) (him:0)
| expected NAT-D(me):  1e 32 60 d5  cf 6b ad a2  96 70 22 6c  77 6b 4e 24
| expected NAT-D(him):
|   6d e9 ea f1  ea a1 35 fe  b1 5c 57 83  da 33 30 02
| received NAT-D:  1e 32 60 d5  cf 6b ad a2  96 70 22 6c  77 6b 4e 24
| NAT_TRAVERSAL hash=1 (me:1) (him:0)
| expected NAT-D(me):  1e 32 60 d5  cf 6b ad a2  96 70 22 6c  77 6b 4e 24
| expected NAT-D(him):
|   6d e9 ea f1  ea a1 35 fe  b1 5c 57 83  da 33 30 02
| received NAT-D:  6d e9 ea f1  ea a1 35 fe  b1 5c 57 83  da 33 30 02
| NAT_TRAVERSAL hash=2 (me:1) (him:1)
"marajade--vpsn" #408: NAT-Traversal: Result using 3: no NAT detected
| inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_SIG
|    ID type: ID_FQDN
|    Protocol ID: 0
|    port: 0
| emitting 21 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
| my identity  6d 61 72 61  6a 61 64 65  2e 73 61 6e  64 65 6c 6d
|   61 6e 2e 63  61
| emitting length of ISAKMP Identification Payload (IPsec DOI): 29
| hashing 144 bytes of SA
| started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA
| actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA
| best_match 0>1 best=0x81092f8 (line=1)
| concluding with best_match=1 best=0x81092f8 (lineno=1)
| signing hash with RSA Key *AQO2bOzfW
| ***emit ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE
| emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload
| SIG_I  0c a8 40 82  cf 9b 67 77  93 cd 98 53  f2 cb ff e3
|   03 fe ad b9  50 16 0d 69  4b db 84 53  a8 a7 8b 48
|   bb f1 5b 72  7a 91 d8 1a  89 75 34 61  ed 0d 0a cf
|   d1 c4 b4 0d  3b 38 fc e7  30 c6 66 5b  ca 09 9e 53
|   fa 3c c4 c9  70 e3 9e 09  53 ec 69 d6  02 c4 0f b3
|   37 60 25 d6  28 3f 19 c9  c1 31 74 a5  18 bb f1 0c
|   cd a3 df 19  c7 14 b0 75  c6 f0 10 53  67 8a 5d eb
|   a9 a4 82 5f  92 fb aa 0b  63 8e ec 91  18 ce 42 4e
|   4c 41 b9 c2  cb 46 ee 21  06 7a 20 e0  b5 96 6a 0d
|   56 b0 58 27  14 49 62 1a  34 5f 9f 30  de 25 1f a4
|   c4 d7 30 ad  ba 73 22 9c  a1 fb f5 67  80 5d a0 dd
|   27 a0 d9 49  5e c9 08 e0  82 19 8f 50  7d ff 98 bf
|   5e e2 f1 8a  50 e0 ae f6  82 c7 84 af  1c a6 aa 2d
|   e1 ab ab 71  67 ca d0 44  c3 67 da 42  bb 66 e1 ec
|   e8 cc 3a 7c  01 b4 fa e6  3e 86 f5 ed  bf 3c cd 0e
|   69 ee 7a 7e  cd 4c b1 37  21 92 99 0d  64 b7 51 f7
|   55 ab 97 9b  8f 8b 4e 3c  37 4c 4d b6  0d 25 82 90
|   2d ed
| emitting length of ISAKMP Signature Payload: 278
| encrypting:
|   09 00 00 1d  02 00 00 00  6d 61 72 61  6a 61 64 65
|   2e 73 61 6e  64 65 6c 6d  61 6e 2e 63  61 00 00 01
|   16 0c a8 40  82 cf 9b 67  77 93 cd 98  53 f2 cb ff
|   e3 03 fe ad  b9 50 16 0d  69 4b db 84  53 a8 a7 8b
|   48 bb f1 5b  72 7a 91 d8  1a 89 75 34  61 ed 0d 0a
|   cf d1 c4 b4  0d 3b 38 fc  e7 30 c6 66  5b ca 09 9e
|   53 fa 3c c4  c9 70 e3 9e  09 53 ec 69  d6 02 c4 0f
|   b3 37 60 25  d6 28 3f 19  c9 c1 31 74  a5 18 bb f1
|   0c cd a3 df  19 c7 14 b0  75 c6 f0 10  53 67 8a 5d
|   eb a9 a4 82  5f 92 fb aa  0b 63 8e ec  91 18 ce 42
|   4e 4c 41 b9  c2 cb 46 ee  21 06 7a 20  e0 b5 96 6a
|   0d 56 b0 58  27 14 49 62  1a 34 5f 9f  30 de 25 1f
|   a4 c4 d7 30  ad ba 73 22  9c a1 fb f5  67 80 5d a0
|   dd 27 a0 d9  49 5e c9 08  e0 82 19 8f  50 7d ff 98
|   bf 5e e2 f1  8a 50 e0 ae  f6 82 c7 84  af 1c a6 aa
|   2d e1 ab ab  71 67 ca d0  44 c3 67 da  42 bb 66 e1
|   ec e8 cc 3a  7c 01 b4 fa  e6 3e 86 f5  ed bf 3c cd
|   0e 69 ee 7a  7e cd 4c b1  37 21 92 99  0d 64 b7 51
|   f7 55 ab 97  9b 8f 8b 4e  3c 37 4c 4d  b6 0d 25 82
|   90 2d ed
| IV:
|   4a a9 62 4b  13 f4 59 1a  cd 9f ac 99  7e b5 76 81
| emitting 5 zero bytes of encryption padding into ISAKMP Message
| encrypting using OAKLEY_3DES_CBC
| next IV:  3c 13 5f 77  7b 75 24 f9
| emitting length of ISAKMP Message: 340
| complete state transition with STF_OK
"marajade--vpsn" #408: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
| sending reply packet to 216.191.140.38:500 (from port=500)
| sending 340 bytes for STATE_MAIN_I2 through eth0:500 to 216.191.140.38:500:
|   c8 c9 8b 44  19 84 5a 59  d0 23 4f 16  d3 3e 23 d4
|   05 10 02 01  00 00 00 00  00 00 01 54  47 7a e8 6a
|   e5 03 c9 4c  b3 ed 80 2b  5f 08 56 14  5b 46 30 7b
|   d1 00 07 f1  6e 40 e1 b7  51 a4 ff 55  7f 0f d2 74
|   23 e2 54 77  4b 7a ca 80  0c 29 87 ea  64 bd 75 4f
|   66 52 6a 58  69 c1 1d e1  bd 53 11 7e  7a 10 87 44
|   94 39 eb cf  92 aa fb 93  78 a5 26 b9  a7 25 07 ef
|   cd 27 43 7f  d3 fc 49 00  90 2c 0b 02  c0 e5 19 2d
|   07 eb ee f7  cc b2 ab a8  8f 79 e4 a4  98 0b b2 8d
|   02 12 60 d8  af 68 25 fd  d6 bf 4b a1  c1 58 1c 93
|   ce 32 8b 07  89 fb 34 dc  8b cd 01 e8  72 7d 88 4c
|   76 09 21 b1  f7 98 29 93  15 e4 9d 61  bc 15 43 75
|   f1 53 21 cb  39 cf 55 a7  7c df c4 cd  6c 55 1f c2
|   55 2b df 5f  b0 ff 60 91  a4 13 76 58  0e 0c 45 1a
|   43 f8 30 eb  a3 3f 02 4b  a4 80 f9 11  7e 7a f6 70
|   12 d7 31 39  5a 32 0f 76  ec a7 3a 63  62 a9 f0 91
|   ad e3 48 94  69 e3 48 c6  7b c7 13 d1  17 25 a9 7d
|   24 4a d9 78  94 e9 12 9d  14 85 a6 3f  4c af b4 9b
|   7f c8 12 30  fc 56 0c e2  e1 7c 97 bb  59 9c 11 66
|   43 7a fa 44  a7 21 c9 4b  e3 9e d0 83  57 a5 bd eb
|   b7 f3 77 9f  29 0b 4a 81  97 b3 5c 85  3c 13 5f 77
|   7b 75 24 f9
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #408
"marajade--vpsn" #408: STATE_MAIN_I3: sent MI3, expecting MR3
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 1 to unpend
| next event EVENT_RETRANSMIT in 2 seconds for #407
|  
