| *received 136 bytes from 216.191.140.38:500 on eth0 (port=500)
|   c8 c9 8b 44  19 84 5a 59  d0 23 4f 16  d3 3e 23 d4
|   01 10 02 00  00 00 00 00  00 00 00 88  0d 00 00 34
|   00 00 00 01  00 00 00 01  00 00 00 28  00 01 00 01
|   00 00 00 20  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 01  80 03 00 03  80 04 00 05
|   0d 00 00 10  4f 45 45 46  42 79 7f 64  75 7c 5f 5b
|   0d 00 00 14  af ca d7 13  68 a1 f1 c9  6b 86 96 fc
|   77 57 01 00  00 00 00 14  4a 13 1c 81  07 03 58 45
|   5c 57 28 f2  0e 95 45 2f
| **parse ISAKMP Message:
|    initiator cookie:
|   c8 c9 8b 44  19 84 5a 59
|    responder cookie:
|   d0 23 4f 16  d3 3e 23 d4
|    next payload type: ISAKMP_NEXT_SA
|    ISAKMP version: ISAKMP Version 1.0
|    exchange type: ISAKMP_XCHG_IDPROT
|    flags: none
|    message ID:  00 00 00 00
|    length: 136
|  processing packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| ICOOKIE:  c8 c9 8b 44  19 84 5a 59
| RCOOKIE:  d0 23 4f 16  d3 3e 23 d4
| peer:  d8 bf 8c 26
| state hash entry 3
| state object not found
| ICOOKIE:  c8 c9 8b 44  19 84 5a 59
| RCOOKIE:  00 00 00 00  00 00 00 00
| peer:  d8 bf 8c 26
| state hash entry 21
| peer and cookies match on #408, provided msgid 00000000 vs 00000000
| state object #408 found, in STATE_MAIN_I1
| processing connection marajade--vpsn
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID
|    length: 52
|    DOI: ISAKMP_DOI_IPSEC
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID
|    length: 16
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID
|    length: 20
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 20
"marajade--vpsn" #408: received Vendor ID payload [Libreswan (this version) 2.CVSHEAD  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
"marajade--vpsn" #408: received Vendor ID payload [Dead Peer Detection]
"marajade--vpsn" #408: received Vendor ID payload [RFC 3947] method set to=110 
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 40
|    proposal number: 0
|    protocol ID: PROTO_ISAKMP
|    SPI size: 0
|    number of transforms: 1
| *****parse ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE
|    length: 32
|    transform number: 0
|    transform ID: KEY_IKE
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_LIFE_TYPE
|    length/value: 1
|    [1 is OAKLEY_LIFE_SECONDS]
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_LIFE_DURATION
|    length/value: 3600
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_ENCRYPTION_ALGORITHM
|    length/value: 5
|    [5 is OAKLEY_3DES_CBC]
| ike_alg_enc_ok(ealg=5,key_len=0): blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_HASH_ALGORITHM
|    length/value: 1
|    [1 is OAKLEY_MD5]
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_AUTHENTICATION_METHOD
|    length/value: 3
|    [3 is OAKLEY_RSA_SIG]
| ******parse ISAKMP Oakley attribute:
|    af+type: OAKLEY_GROUP_DESCRIPTION
|    length/value: 5
|    [5 is OAKLEY_GROUP_MODP1536]
| Oakley Transform 0 accepted
| sender checking NAT-t: 1 and 110
"marajade--vpsn" #408: enabling possible NAT-traversal with method 3
| 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1
| asking helper 0 to do build_kenonce op on seq: 408
| inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #408
| complete state transition with STF_SUSPEND
| next event EVENT_RETRANSMIT in 2 seconds for #407
! helper -1 doing build_kenonce op id: 408
| helper 0 has work (cnt now 0)
| helper 0 replies to sequence 408
| calling callback function 0x8068170

