2010:04:01-00:29:54 whity pluto[13732]: | 
2010:04:01-00:29:54 whity pluto[13732]: | *received whack message
2010:04:01-00:29:54 whity pluto[13732]: | next event EVENT_RETRANSMIT in 3 seconds for #24
2010:04:01-00:29:57 whity pluto[13732]: | 
2010:04:01-00:29:57 whity pluto[13732]: | *time to handle event
2010:04:01-00:29:57 whity pluto[13732]: | event after this is EVENT_REINIT_SECRET in 1915 seconds
2010:04:01-00:29:57 whity pluto[13732]: | handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #24
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #24: max number of retransmissions (2) reached STATE_MAIN_I3.  Possible authentication failure: no acceptable response to our first encrypted message
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #24: starting keying attempt 25 of an unlimited number
2010:04:01-00:29:57 whity pluto[13732]: | creating state object #25 at 0x9c82588
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 13
2010:04:01-00:29:57 whity pluto[13732]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: initiating Main Mode to replace #24
2010:04:01-00:29:57 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   00 00 00 00  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SA
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:29:57 whity pluto[13732]: |    flags: none
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Security Association Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:29:57 whity pluto[13732]: | ****emit IPsec DOI SIT:
2010:04:01-00:29:57 whity pluto[13732]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
2010:04:01-00:29:57 whity pluto[13732]: | ike proposal: AES_CBC_256/HMAC_MD5/MODP_1536, 
2010:04:01-00:29:57 whity pluto[13732]: | ****emit ISAKMP Proposal Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    proposal number: 0
2010:04:01-00:29:57 whity pluto[13732]: |    protocol ID: PROTO_ISAKMP
2010:04:01-00:29:57 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:29:57 whity pluto[13732]: |    number of transforms: 1
2010:04:01-00:29:57 whity pluto[13732]: | *****emit ISAKMP Transform Payload (ISAKMP):
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    transform number: 0
2010:04:01-00:29:57 whity pluto[13732]: |    transform ID: KEY_IKE
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_LIFE_TYPE
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 1
2010:04:01-00:29:57 whity pluto[13732]: |     [1 is OAKLEY_LIFE_SECONDS]
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_LIFE_DURATION
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 7800
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_ENCRYPTION_ALGORITHM
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 7
2010:04:01-00:29:57 whity pluto[13732]: |     [7 is AES_CBC]
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_HASH_ALGORITHM
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 1
2010:04:01-00:29:57 whity pluto[13732]: |     [1 is HMAC_MD5]
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_KEY_LENGTH
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 256
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_AUTHENTICATION_METHOD
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 3
2010:04:01-00:29:57 whity pluto[13732]: |     [3 is RSA signature]
2010:04:01-00:29:57 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_GROUP_DESCRIPTION
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 5
2010:04:01-00:29:57 whity pluto[13732]: |     [5 is MODP_1536]
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Proposal Payload: 44
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Security Association Payload: 56
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [strongSwan]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  88 2f e5 6d  6f d2 0d bc  22 51 61 3b  2e be 5b eb
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [Cisco-Unity]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  12 f5 f2 8c  45 71 68 a9  70 2d 9f e2  74 cc 01 00
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [XAUTH]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  09 00 26 89  df d6 b7 12
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 12
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [Dead Peer Detection]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [RFC 3947]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:29:57 whity pluto[13732]: | V_ID  44 85 15 2d  18 b6 bb cd  0b e8 a8 46  95 79 dd cc
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Message: 256
2010:04:01-00:29:57 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  7e b1 34 4e  d7 dc 79 cf
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  d7 10 5f c2  19 4a 61 1d
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 11
2010:04:01-00:29:57 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | 
2010:04:01-00:29:57 whity pluto[13732]: | *received 176 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:29:57 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SA
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:29:57 whity pluto[13732]: |    flags: none
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: |    length: 176
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 19
2010:04:01-00:29:57 whity pluto[13732]: | state object not found
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 13
2010:04:01-00:29:57 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I1
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Security Association Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    length: 56
2010:04:01-00:29:57 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    length: 12
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: ignoring Vendor ID payload [strongSwan 4.2.3]
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: ignoring Vendor ID payload [Cisco-Unity]
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: received Vendor ID payload [XAUTH]
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: received Vendor ID payload [Dead Peer Detection]
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: received Vendor ID payload [RFC 3947]
2010:04:01-00:29:57 whity pluto[13732]: | ****parse IPsec DOI SIT:
2010:04:01-00:29:57 whity pluto[13732]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
2010:04:01-00:29:57 whity pluto[13732]: | ****parse ISAKMP Proposal Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 44
2010:04:01-00:29:57 whity pluto[13732]: |    proposal number: 0
2010:04:01-00:29:57 whity pluto[13732]: |    protocol ID: PROTO_ISAKMP
2010:04:01-00:29:57 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:29:57 whity pluto[13732]: |    number of transforms: 1
2010:04:01-00:29:57 whity pluto[13732]: | *****parse ISAKMP Transform Payload (ISAKMP):
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 36
2010:04:01-00:29:57 whity pluto[13732]: |    transform number: 0
2010:04:01-00:29:57 whity pluto[13732]: |    transform ID: KEY_IKE
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_LIFE_TYPE
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 1
2010:04:01-00:29:57 whity pluto[13732]: |    [1 is OAKLEY_LIFE_SECONDS]
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_LIFE_DURATION
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 7800
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_ENCRYPTION_ALGORITHM
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 7
2010:04:01-00:29:57 whity pluto[13732]: |    [7 is AES_CBC]
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_HASH_ALGORITHM
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 1
2010:04:01-00:29:57 whity pluto[13732]: |    [1 is HMAC_MD5]
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_KEY_LENGTH
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 256
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_AUTHENTICATION_METHOD
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 3
2010:04:01-00:29:57 whity pluto[13732]: |    [3 is RSA signature]
2010:04:01-00:29:57 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:29:57 whity pluto[13732]: |    af+type: OAKLEY_GROUP_DESCRIPTION
2010:04:01-00:29:57 whity pluto[13732]: |    length/value: 5
2010:04:01-00:29:57 whity pluto[13732]: |    [5 is MODP_1536]
2010:04:01-00:29:57 whity pluto[13732]: | Oakley Transform 0 accepted
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: enabling possible NAT-traversal with method 3
2010:04:01-00:29:57 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:29:57 whity pluto[13732]: |    flags: none
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | size of DH secret exponent: 1529 bits
2010:04:01-00:29:57 whity pluto[13732]: | Public DH value sent:
...
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Key Exchange Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONCE
2010:04:01-00:29:57 whity pluto[13732]: | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload
2010:04:01-00:29:57 whity pluto[13732]: | keyex value  4d 2e ec 38  ad c8 c4 80  5d d6 18 f1  6b 46 a9 56
...
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Key Exchange Payload: 196
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Nonce Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload
2010:04:01-00:29:57 whity pluto[13732]: | Ni  48 f3 7f 6d  0d 20 84 bc  46 ae 89 3a  c6 b8 4c c5
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Nonce Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | sending NATD payloads
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP NAT-D Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
2010:04:01-00:29:57 whity pluto[13732]: | NAT-D  6a db aa 71  bc 91 f1 5c  1c b3 c1 d3  b8 0d 44 8d
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP NAT-D Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP NAT-D Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
2010:04:01-00:29:57 whity pluto[13732]: | NAT-D  42 40 07 1b  56 ae 53 c8  7a c3 7b 7e  cc 9a a5 31
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP NAT-D Payload: 20
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Message: 284
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 13
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 19
2010:04:01-00:29:57 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | 
2010:04:01-00:29:57 whity pluto[13732]: | *received 284 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:29:57 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:29:57 whity pluto[13732]: |    flags: none
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: |    length: 284
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 19
2010:04:01-00:29:57 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I2
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Key Exchange Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONCE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 196
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Nonce Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP NAT-D Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP NAT-D Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_ID
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:29:57 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:29:57 whity pluto[13732]: | DH public value received:
...
2010:04:01-00:29:57 whity pluto[13732]: | DH shared secret:
...
2010:04:01-00:29:57 whity pluto[13732]: | DH_i:  ...
...
2010:04:01-00:29:57 whity pluto[13732]: | DH_r:  ...
...
2010:04:01-00:29:57 whity pluto[13732]: | Skeyid:    ...
2010:04:01-00:29:57 whity pluto[13732]: | Skeyid_d:  ...
2010:04:01-00:29:57 whity pluto[13732]: | Skeyid_a:  ...
2010:04:01-00:29:57 whity pluto[13732]: | Skeyid_e:  ...
2010:04:01-00:29:57 whity pluto[13732]: | enc key:  ...
...
2010:04:01-00:29:57 whity pluto[13732]: | IV:  ...
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: NAT-Traversal: Result using RFC 3947: no NAT detected
2010:04:01-00:29:57 whity pluto[13732]: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 60 seconds
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Identification Payload (IPsec DOI):
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SIG
2010:04:01-00:29:57 whity pluto[13732]: |    ID type: ID_FQDN
2010:04:01-00:29:57 whity pluto[13732]: |    Protocol ID: 0
2010:04:01-00:29:57 whity pluto[13732]: |    port: 0
2010:04:01-00:29:57 whity pluto[13732]: | emitting 19 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
2010:04:01-00:29:57 whity pluto[13732]: | my identity  ...
...
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 27
2010:04:01-00:29:57 whity pluto[13732]: | our certificate policy is ALWAYS_SEND
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: we don't have a cert
2010:04:01-00:29:57 whity pluto[13732]: | hashing 52 bytes of SA
2010:04:01-00:29:57 whity pluto[13732]: | ***emit ISAKMP Signature Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: | emitting 256 raw bytes of SIG_I into ISAKMP Signature Payload
2010:04:01-00:29:57 whity pluto[13732]: | SIG_I  83 d3 30 c5  d0 5c 91 65  4d 0f bd 88  f9 65 70 33
...
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Signature Payload: 260
2010:04:01-00:29:57 whity pluto[13732]: | encrypting:
...
2010:04:01-00:29:57 whity pluto[13732]: | emitting 1 zero bytes of encryption padding into ISAKMP Message
2010:04:01-00:29:57 whity pluto[13732]: | encrypting using AES_CBC
2010:04:01-00:29:57 whity pluto[13732]: | next IV:  e8 94 c3 cf  9e 01 e1 fd  29 a9 81 95  fb be 0b 89
2010:04:01-00:29:57 whity pluto[13732]: | emitting length of ISAKMP Message: 316
2010:04:01-00:29:57 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #25
2010:04:01-00:29:57 whity pluto[13732]: | 
2010:04:01-00:29:57 whity pluto[13732]: | *received 60 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:29:57 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:29:57 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: |    responder cookie:
2010:04:01-00:29:57 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_HASH
2010:04:01-00:29:57 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:29:57 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_INFO
2010:04:01-00:29:57 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:29:57 whity pluto[13732]: |    message ID:  c5 93 62 e4
2010:04:01-00:29:57 whity pluto[13732]: |    length: 60
2010:04:01-00:29:57 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:29:57 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:29:57 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:29:57 whity pluto[13732]: | state hash entry 19
2010:04:01-00:29:57 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I3
2010:04:01-00:29:57 whity pluto[13732]: | last Phase 1 IV:  e8 94 c3 cf  9e 01 e1 fd  29 a9 81 95  fb be 0b 89
2010:04:01-00:29:57 whity pluto[13732]: | computed Phase 2 IV:
2010:04:01-00:29:57 whity pluto[13732]: |   19 7c 9b e5  d3 64 56 42  a9 53 f9 03  24 70 5f 35
2010:04:01-00:29:57 whity pluto[13732]: | received encrypted packet from xxx.xxx.xxx.xxx:500
2010:04:01-00:29:57 whity pluto[13732]: | decrypting 32 bytes using algorithm AES_CBC
2010:04:01-00:29:57 whity pluto[13732]: | decrypted:
...
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Hash Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_N
2010:04:01-00:29:57 whity pluto[13732]: |    length: 20
2010:04:01-00:29:57 whity pluto[13732]: | ***parse ISAKMP Notification Payload:
2010:04:01-00:29:57 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:29:57 whity pluto[13732]: |    length: 12
2010:04:01-00:29:57 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:29:57 whity pluto[13732]: |    protocol ID: 1
2010:04:01-00:29:57 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:29:57 whity pluto[13732]: |    Notify Message Type: INVALID_KEY_INFORMATION
2010:04:01-00:29:57 whity pluto[13732]: | next IV:  ...
2010:04:01-00:29:57 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: ignoring informational payload, type INVALID_KEY_INFORMATION
2010:04:01-00:29:57 whity pluto[13732]: | info:
2010:04:01-00:29:57 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #25
2010:04:01-00:30:07 whity pluto[13732]: | 
2010:04:01-00:30:07 whity pluto[13732]: | *time to handle event
2010:04:01-00:30:07 whity pluto[13732]: | event after this is EVENT_NAT_T_KEEPALIVE in 50 seconds
2010:04:01-00:30:07 whity pluto[13732]: | handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25
2010:04:01-00:30:07 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #25
2010:04:01-00:30:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 20 seconds for #25
2010:04:01-00:30:07 whity pluto[13732]: | 
2010:04:01-00:30:07 whity pluto[13732]: | *received 60 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:30:07 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:30:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:30:07 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:30:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:30:07 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:30:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_HASH
2010:04:01-00:30:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:30:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_INFO
2010:04:01-00:30:07 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:30:07 whity pluto[13732]: |    message ID:  bf 6f 46 df
2010:04:01-00:30:07 whity pluto[13732]: |    length: 60
2010:04:01-00:30:07 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:30:07 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:30:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:30:07 whity pluto[13732]: | state hash entry 19
2010:04:01-00:30:07 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I3
2010:04:01-00:30:07 whity pluto[13732]: | last Phase 1 IV:  d7 b5 bf 36  b6 38 c8 df  c9 ad 14 ca  5a 51 bc 80
2010:04:01-00:30:07 whity pluto[13732]: | computed Phase 2 IV:
2010:04:01-00:30:07 whity pluto[13732]: |   cd 82 99 65  39 f0 16 ae  c9 65 6d 62  a5 e6 91 c7
2010:04:01-00:30:07 whity pluto[13732]: | received encrypted packet from xxx.xxx.xxx.xxx:500
2010:04:01-00:30:07 whity pluto[13732]: | decrypting 32 bytes using algorithm AES_CBC
2010:04:01-00:30:07 whity pluto[13732]: | decrypted:
2010:04:01-00:30:07 whity pluto[13732]: |   e6 34 18 b2  97 13 72 b2  3c 68 d2 dd  b7 0b e0 33
2010:04:01-00:30:07 whity pluto[13732]: |   e6 77 97 49  00 00 00 0c  00 00 00 01  01 00 00 11
2010:04:01-00:30:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: next payload type of ISAKMP Hash Payload has an unknown value: 230
2010:04:01-00:30:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: malformed payload in packet
2010:04:01-00:30:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 20 seconds for #25
2010:04:01-00:30:07 whity pluto[13732]: | 
2010:04:01-00:30:07 whity pluto[13732]: | *received 284 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:30:07 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:30:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:30:07 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:30:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:30:07 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:30:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:30:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:30:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:30:07 whity pluto[13732]: |    flags: none
2010:04:01-00:30:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:30:07 whity pluto[13732]: |    length: 284
2010:04:01-00:30:07 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:30:07 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:30:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:30:07 whity pluto[13732]: | state hash entry 19
2010:04:01-00:30:07 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I3
2010:04:01-00:30:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: discarding duplicate packet; already STATE_MAIN_I3
2010:04:01-00:30:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 20 seconds for #25
2010:04:01-00:30:27 whity pluto[13732]: | 
2010:04:01-00:30:27 whity pluto[13732]: | *time to handle event
2010:04:01-00:30:27 whity pluto[13732]: | event after this is EVENT_NAT_T_KEEPALIVE in 30 seconds
2010:04:01-00:30:27 whity pluto[13732]: | handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25
2010:04:01-00:30:27 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #25
2010:04:01-00:30:27 whity pluto[13732]: | next event EVENT_NAT_T_KEEPALIVE in 30 seconds
2010:04:01-00:30:27 whity pluto[13732]: | 
2010:04:01-00:30:27 whity pluto[13732]: | *received 60 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:30:27 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:30:27 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:30:27 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:30:27 whity pluto[13732]: |    responder cookie:
2010:04:01-00:30:27 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:30:27 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_HASH
2010:04:01-00:30:27 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:30:27 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_INFO
2010:04:01-00:30:27 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:30:27 whity pluto[13732]: |    message ID:  44 a1 e9 e3
2010:04:01-00:30:27 whity pluto[13732]: |    length: 60
2010:04:01-00:30:27 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:30:27 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:30:27 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:30:27 whity pluto[13732]: | state hash entry 19
2010:04:01-00:30:27 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I3
2010:04:01-00:30:27 whity pluto[13732]: | last Phase 1 IV:  ...
2010:04:01-00:30:27 whity pluto[13732]: | computed Phase 2 IV:
2010:04:01-00:30:27 whity pluto[13732]: |   ...
2010:04:01-00:30:27 whity pluto[13732]: | received encrypted packet from xxx.xxx.xxx.xxx:500
2010:04:01-00:30:27 whity pluto[13732]: | decrypting 32 bytes using algorithm AES_CBC
2010:04:01-00:30:27 whity pluto[13732]: | decrypted:
...
2010:04:01-00:30:27 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: next payload type of ISAKMP Hash Payload has an unknown value: 192
2010:04:01-00:30:27 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: malformed payload in packet
2010:04:01-00:30:27 whity pluto[13732]: | next event EVENT_NAT_T_KEEPALIVE in 30 seconds
2010:04:01-00:30:27 whity pluto[13732]: | 
2010:04:01-00:30:27 whity pluto[13732]: | *received 284 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:30:27 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:30:27 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:30:27 whity pluto[13732]: |   23 26 0a 99  69 d7 43 de
2010:04:01-00:30:27 whity pluto[13732]: |    responder cookie:
2010:04:01-00:30:27 whity pluto[13732]: |   1e cb 22 d8  62 18 df e4
2010:04:01-00:30:27 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:30:27 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:30:27 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:30:27 whity pluto[13732]: |    flags: none
2010:04:01-00:30:27 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:30:27 whity pluto[13732]: |    length: 284
2010:04:01-00:30:27 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:30:27 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:30:27 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:30:27 whity pluto[13732]: | state hash entry 19
2010:04:01-00:30:27 whity pluto[13732]: | state object #25 found, in STATE_MAIN_I3
2010:04:01-00:30:27 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: discarding duplicate packet; already STATE_MAIN_I3
2010:04:01-00:30:27 whity pluto[13732]: | next event EVENT_NAT_T_KEEPALIVE in 30 seconds
2010:04:01-00:30:39 whity pluto[13732]: | 
2010:04:01-00:30:39 whity pluto[13732]: | *received whack message
2010:04:01-00:30:39 whity pluto[13732]: | next event EVENT_NAT_T_KEEPALIVE in 18 seconds
2010:04:01-00:30:57 whity pluto[13732]: | 
2010:04:01-00:30:57 whity pluto[13732]: | *time to handle event
2010:04:01-00:30:57 whity pluto[13732]: | event after this is EVENT_RETRANSMIT in 10 seconds
2010:04:01-00:30:57 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #25
2010:04:01-00:31:07 whity pluto[13732]: | 
2010:04:01-00:31:07 whity pluto[13732]: | *time to handle event
2010:04:01-00:31:07 whity pluto[13732]: | event after this is EVENT_REINIT_SECRET in 1845 seconds
2010:04:01-00:31:07 whity pluto[13732]: | handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: max number of retransmissions (2) reached STATE_MAIN_I3.  Possible authentication failure: no acceptable response to our first encrypted message
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #25: starting keying attempt 26 of an unlimited number
2010:04:01-00:31:07 whity pluto[13732]: | creating state object #26 at 0x9c82830
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 24
2010:04:01-00:31:07 whity pluto[13732]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: initiating Main Mode to replace #25
2010:04:01-00:31:07 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   00 00 00 00  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SA
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:07 whity pluto[13732]: |    flags: none
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Security Association Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:31:07 whity pluto[13732]: | ****emit IPsec DOI SIT:
2010:04:01-00:31:07 whity pluto[13732]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
2010:04:01-00:31:07 whity pluto[13732]: | ike proposal: AES_CBC_256/HMAC_MD5/MODP_1536, 
2010:04:01-00:31:07 whity pluto[13732]: | ****emit ISAKMP Proposal Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    proposal number: 0
2010:04:01-00:31:07 whity pluto[13732]: |    protocol ID: PROTO_ISAKMP
2010:04:01-00:31:07 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:31:07 whity pluto[13732]: |    number of transforms: 1
2010:04:01-00:31:07 whity pluto[13732]: | *****emit ISAKMP Transform Payload (ISAKMP):
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    transform number: 0
2010:04:01-00:31:07 whity pluto[13732]: |    transform ID: KEY_IKE
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_LIFE_TYPE
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 1
2010:04:01-00:31:07 whity pluto[13732]: |     [1 is OAKLEY_LIFE_SECONDS]
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_LIFE_DURATION
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 7800
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_ENCRYPTION_ALGORITHM
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 7
2010:04:01-00:31:07 whity pluto[13732]: |     [7 is AES_CBC]
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_HASH_ALGORITHM
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 1
2010:04:01-00:31:07 whity pluto[13732]: |     [1 is HMAC_MD5]
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_KEY_LENGTH
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 256
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_AUTHENTICATION_METHOD
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 3
2010:04:01-00:31:07 whity pluto[13732]: |     [3 is RSA signature]
2010:04:01-00:31:07 whity pluto[13732]: | ******emit ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_GROUP_DESCRIPTION
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 5
2010:04:01-00:31:07 whity pluto[13732]: |     [5 is MODP_1536]
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Proposal Payload: 44
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Security Association Payload: 56
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [strongSwan]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
...
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [Cisco-Unity]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
...
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [XAUTH]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  09 00 26 89  df d6 b7 12
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 12
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [Dead Peer Detection]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [RFC 3947]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
2010:04:01-00:31:07 whity pluto[13732]: | V_ID  44 85 15 2d  18 b6 bb cd  0b e8 a8 46  95 79 dd cc
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Vendor ID Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Message: 256
2010:04:01-00:31:07 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  23 26 0a 99  69 d7 43 de
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  1e cb 22 d8  62 18 df e4
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 19
2010:04:01-00:31:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | 
2010:04:01-00:31:07 whity pluto[13732]: | *received 176 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:31:07 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SA
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:07 whity pluto[13732]: |    flags: none
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: |    length: 176
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:07 whity pluto[13732]: | state object not found
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 24
2010:04:01-00:31:07 whity pluto[13732]: | state object #26 found, in STATE_MAIN_I1
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Security Association Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    length: 56
2010:04:01-00:31:07 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    length: 12
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_VID
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Vendor ID Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: ignoring Vendor ID payload [strongSwan 4.2.3]
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: ignoring Vendor ID payload [Cisco-Unity]
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: received Vendor ID payload [XAUTH]
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: received Vendor ID payload [Dead Peer Detection]
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: received Vendor ID payload [RFC 3947]
2010:04:01-00:31:07 whity pluto[13732]: | ****parse IPsec DOI SIT:
2010:04:01-00:31:07 whity pluto[13732]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
2010:04:01-00:31:07 whity pluto[13732]: | ****parse ISAKMP Proposal Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 44
2010:04:01-00:31:07 whity pluto[13732]: |    proposal number: 0
2010:04:01-00:31:07 whity pluto[13732]: |    protocol ID: PROTO_ISAKMP
2010:04:01-00:31:07 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:31:07 whity pluto[13732]: |    number of transforms: 1
2010:04:01-00:31:07 whity pluto[13732]: | *****parse ISAKMP Transform Payload (ISAKMP):
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 36
2010:04:01-00:31:07 whity pluto[13732]: |    transform number: 0
2010:04:01-00:31:07 whity pluto[13732]: |    transform ID: KEY_IKE
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_LIFE_TYPE
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 1
2010:04:01-00:31:07 whity pluto[13732]: |    [1 is OAKLEY_LIFE_SECONDS]
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_LIFE_DURATION
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 7800
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_ENCRYPTION_ALGORITHM
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 7
2010:04:01-00:31:07 whity pluto[13732]: |    [7 is AES_CBC]
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_HASH_ALGORITHM
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 1
2010:04:01-00:31:07 whity pluto[13732]: |    [1 is HMAC_MD5]
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_KEY_LENGTH
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 256
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_AUTHENTICATION_METHOD
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 3
2010:04:01-00:31:07 whity pluto[13732]: |    [3 is RSA signature]
2010:04:01-00:31:07 whity pluto[13732]: | ******parse ISAKMP Oakley attribute:
2010:04:01-00:31:07 whity pluto[13732]: |    af+type: OAKLEY_GROUP_DESCRIPTION
2010:04:01-00:31:07 whity pluto[13732]: |    length/value: 5
2010:04:01-00:31:07 whity pluto[13732]: |    [5 is MODP_1536]
2010:04:01-00:31:07 whity pluto[13732]: | Oakley Transform 0 accepted
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: enabling possible NAT-traversal with method 3
2010:04:01-00:31:07 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:07 whity pluto[13732]: |    flags: none
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | size of DH secret exponent: 1533 bits
2010:04:01-00:31:07 whity pluto[13732]: | Public DH value sent:
...
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Key Exchange Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONCE
2010:04:01-00:31:07 whity pluto[13732]: | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload
2010:04:01-00:31:07 whity pluto[13732]: | keyex value  e5 94 43 fd  e1 0e 10 f4  2e 0b bd a1  ec 48 ed bf
...
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Key Exchange Payload: 196
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Nonce Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload
2010:04:01-00:31:07 whity pluto[13732]: | Ni  b3 c9 10 22  9f 1a d4 06  4f b9 64 da  82 73 da ab
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Nonce Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | sending NATD payloads
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP NAT-D Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
2010:04:01-00:31:07 whity pluto[13732]: | NAT-D  e9 9d 56 08  59 f6 01 61  32 db c2 0d  39 23 e6 59
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP NAT-D Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP NAT-D Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
2010:04:01-00:31:07 whity pluto[13732]: | NAT-D  99 e7 3d 6f  14 07 2b 6e  f9 ad b7 1a  28 dd 5c 0f
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP NAT-D Payload: 20
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Message: 284
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  00 00 00 00  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 24
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:07 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | 
2010:04:01-00:31:07 whity pluto[13732]: | *received 284 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:31:07 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:07 whity pluto[13732]: |    flags: none
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: |    length: 284
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:07 whity pluto[13732]: | state object #26 found, in STATE_MAIN_I2
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Key Exchange Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONCE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 196
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Nonce Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP NAT-D Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NAT-D
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP NAT-D Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | **emit ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_ID
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:07 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:07 whity pluto[13732]: | DH public value received:
...
2010:04:01-00:31:07 whity pluto[13732]: | DH shared secret:
...
2010:04:01-00:31:07 whity pluto[13732]: | DH_i:  e5 94 43 fd  e1 0e 10 f4  2e 0b bd a1  ec 48 ed bf
...
2010:04:01-00:31:07 whity pluto[13732]: | DH_r:  7c 80 00 c6  c7 20 df c2  1b ce 0b 73  81 10 da 79
...
2010:04:01-00:31:07 whity pluto[13732]: | Skeyid:    ...
2010:04:01-00:31:07 whity pluto[13732]: | Skeyid_d:  ...
2010:04:01-00:31:07 whity pluto[13732]: | Skeyid_a:  ...
2010:04:01-00:31:07 whity pluto[13732]: | Skeyid_e:  ...
2010:04:01-00:31:07 whity pluto[13732]: | enc key:  ...
...
2010:04:01-00:31:07 whity pluto[13732]: | IV:  ...
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: NAT-Traversal: Result using RFC 3947: no NAT detected
2010:04:01-00:31:07 whity pluto[13732]: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 60 seconds
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Identification Payload (IPsec DOI):
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_SIG
2010:04:01-00:31:07 whity pluto[13732]: |    ID type: ID_FQDN
2010:04:01-00:31:07 whity pluto[13732]: |    Protocol ID: 0
2010:04:01-00:31:07 whity pluto[13732]: |    port: 0
2010:04:01-00:31:07 whity pluto[13732]: | emitting 19 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
2010:04:01-00:31:07 whity pluto[13732]: | my identity  77 68 69 74  79 2e 69 73  2d 61 2d 67  65 65 6b 2e
2010:04:01-00:31:07 whity pluto[13732]: |   6f 72 67
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 27
2010:04:01-00:31:07 whity pluto[13732]: | our certificate policy is ALWAYS_SEND
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: we don't have a cert
2010:04:01-00:31:07 whity pluto[13732]: | hashing 52 bytes of SA
2010:04:01-00:31:07 whity pluto[13732]: | ***emit ISAKMP Signature Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: | emitting 256 raw bytes of SIG_I into ISAKMP Signature Payload
2010:04:01-00:31:07 whity pluto[13732]: | SIG_I  8b 85 0f 50  ea 19 59 2b  34 f7 39 45  a9 be 25 3c
...
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Signature Payload: 260
2010:04:01-00:31:07 whity pluto[13732]: | encrypting:
...
2010:04:01-00:31:07 whity pluto[13732]: | emitting 1 zero bytes of encryption padding into ISAKMP Message
2010:04:01-00:31:07 whity pluto[13732]: | encrypting using AES_CBC
2010:04:01-00:31:07 whity pluto[13732]: | next IV:  9f 4b a4 e3  c3 c1 f5 07  4c e6 65 fc  df ab 10 52
2010:04:01-00:31:07 whity pluto[13732]: | emitting length of ISAKMP Message: 316
2010:04:01-00:31:07 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #26
2010:04:01-00:31:07 whity pluto[13732]: | 
2010:04:01-00:31:07 whity pluto[13732]: | *received 60 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:31:07 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:31:07 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:07 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_HASH
2010:04:01-00:31:07 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:07 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_INFO
2010:04:01-00:31:07 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:31:07 whity pluto[13732]: |    message ID:  ab a5 01 84
2010:04:01-00:31:07 whity pluto[13732]: |    length: 60
2010:04:01-00:31:07 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:07 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:07 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:07 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:07 whity pluto[13732]: | state object #26 found, in STATE_MAIN_I3
2010:04:01-00:31:07 whity pluto[13732]: | last Phase 1 IV:  ...
2010:04:01-00:31:07 whity pluto[13732]: | computed Phase 2 IV:
...
2010:04:01-00:31:07 whity pluto[13732]: | received encrypted packet from xxx.xxx.xxx.xxx:500
2010:04:01-00:31:07 whity pluto[13732]: | decrypting 32 bytes using algorithm AES_CBC
2010:04:01-00:31:07 whity pluto[13732]: | decrypted:
...
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Hash Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_N
2010:04:01-00:31:07 whity pluto[13732]: |    length: 20
2010:04:01-00:31:07 whity pluto[13732]: | ***parse ISAKMP Notification Payload:
2010:04:01-00:31:07 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_NONE
2010:04:01-00:31:07 whity pluto[13732]: |    length: 12
2010:04:01-00:31:07 whity pluto[13732]: |    DOI: ISAKMP_DOI_IPSEC
2010:04:01-00:31:07 whity pluto[13732]: |    protocol ID: 1
2010:04:01-00:31:07 whity pluto[13732]: |    SPI size: 0
2010:04:01-00:31:07 whity pluto[13732]: |    Notify Message Type: INVALID_KEY_INFORMATION
2010:04:01-00:31:07 whity pluto[13732]: | next IV:  ...
2010:04:01-00:31:07 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: ignoring informational payload, type INVALID_KEY_INFORMATION
2010:04:01-00:31:07 whity pluto[13732]: | info:
2010:04:01-00:31:07 whity pluto[13732]: | next event EVENT_RETRANSMIT in 10 seconds for #26
2010:04:01-00:31:17 whity pluto[13732]: | 
2010:04:01-00:31:17 whity pluto[13732]: | *received 284 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:31:17 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:31:17 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:17 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:17 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:17 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:17 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_KE
2010:04:01-00:31:17 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:17 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_IDPROT
2010:04:01-00:31:17 whity pluto[13732]: |    flags: none
2010:04:01-00:31:17 whity pluto[13732]: |    message ID:  00 00 00 00
2010:04:01-00:31:17 whity pluto[13732]: |    length: 284
2010:04:01-00:31:17 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:17 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:17 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:17 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:17 whity pluto[13732]: | state object #26 found, in STATE_MAIN_I3
2010:04:01-00:31:17 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: discarding duplicate packet; already STATE_MAIN_I3
2010:04:01-00:31:17 whity pluto[13732]: | next event EVENT_RETRANSMIT in 0 seconds for #26
2010:04:01-00:31:17 whity pluto[13732]: | 
2010:04:01-00:31:17 whity pluto[13732]: | *time to handle event
2010:04:01-00:31:17 whity pluto[13732]: | event after this is EVENT_NAT_T_KEEPALIVE in 50 seconds
2010:04:01-00:31:17 whity pluto[13732]: | handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26
2010:04:01-00:31:17 whity pluto[13732]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #26
2010:04:01-00:31:17 whity pluto[13732]: | next event EVENT_RETRANSMIT in 20 seconds for #26
2010:04:01-00:31:17 whity pluto[13732]: | 
2010:04:01-00:31:17 whity pluto[13732]: | *received 60 bytes from xxx.xxx.xxx.xxx:500 on eth1
2010:04:01-00:31:17 whity pluto[13732]: | **parse ISAKMP Message:
2010:04:01-00:31:17 whity pluto[13732]: |    initiator cookie:
2010:04:01-00:31:17 whity pluto[13732]: |   33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:17 whity pluto[13732]: |    responder cookie:
2010:04:01-00:31:17 whity pluto[13732]: |   8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:17 whity pluto[13732]: |    next payload type: ISAKMP_NEXT_HASH
2010:04:01-00:31:17 whity pluto[13732]: |    ISAKMP version: ISAKMP Version 1.0
2010:04:01-00:31:17 whity pluto[13732]: |    exchange type: ISAKMP_XCHG_INFO
2010:04:01-00:31:17 whity pluto[13732]: |    flags: ISAKMP_FLAG_ENCRYPTION
2010:04:01-00:31:17 whity pluto[13732]: |    message ID:  5a 07 77 0b
2010:04:01-00:31:17 whity pluto[13732]: |    length: 60
2010:04:01-00:31:17 whity pluto[13732]: | ICOOKIE:  33 a3 c4 a8  f8 e2 19 d9
2010:04:01-00:31:17 whity pluto[13732]: | RCOOKIE:  8f 54 43 12  e0 e5 bc 21
2010:04:01-00:31:17 whity pluto[13732]: | peer:  c3 8d 4c 82
2010:04:01-00:31:17 whity pluto[13732]: | state hash entry 6
2010:04:01-00:31:17 whity pluto[13732]: | state object #26 found, in STATE_MAIN_I3
2010:04:01-00:31:17 whity pluto[13732]: | last Phase 1 IV:  ...
2010:04:01-00:31:17 whity pluto[13732]: | computed Phase 2 IV:
2010:04:01-00:31:17 whity pluto[13732]: |   ...
2010:04:01-00:31:17 whity pluto[13732]: | received encrypted packet from xxx.xxx.xxx.xxx:500
2010:04:01-00:31:17 whity pluto[13732]: | decrypting 32 bytes using algorithm AES_CBC
2010:04:01-00:31:17 whity pluto[13732]: | decrypted:
...
2010:04:01-00:31:17 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: next payload type of ISAKMP Hash Payload has an unknown value: 82
2010:04:01-00:31:17 whity pluto[13732]: "S_REF_ACC_LOC_57b1e5a541034cb7a5126fc55dd0891b891b_0_0" #26: malformed payload in packet
2010:04:01-00:31:17 whity pluto[13732]: | next event EVENT_RETRANSMIT in 20 seconds for #26
2010:04:01-00:31:24 whity pluto[13732]: | 
2010:04:01-00:31:24 whity pluto[13732]: | *received whack message
2010:04:01-00:31:24 whity pluto[13732]: | next event EVENT_RETRANSMIT in 13 seconds for #26
2010:04:01-00:31:29 whity pluto[13732]: | 
2010:04:01-00:31:29 whity pluto[13732]: | *received whack message
2010:04:01-00:31:29 whity pluto[13732]: | next event EVENT_RETRANSMIT in 8 seconds for #26
2010:04:01-00:31:30 whity pluto[13732]: | 
2010:04:01-00:31:30 whity pluto[13732]: | *received whack message
2010:04:01-00:31:30 whity pluto[13732]: | next event EVENT_RETRANSMIT in 7 seconds for #26
