./wrongcacert ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
./wrongcacert ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
./wrongcacert ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
./wrongcacert adjusting ipsec.d to ../samples/wrongcert
./wrongcacert loading secrets from "../samples/gatewaycert.secrets"
./wrongcacert   loaded private key file '../samples/wrongcert/private/moonKey.pem' (1675 bytes)
./wrongcacert loaded private key for keyid: PPK_RSA:AwEAAaR8B
| processing whack message of size: A
| processing whack message of size: A
processing whack msg time: X size: Y
| find_host_pair: looking for me=<none>:500 %any him=<none>:500 any-match
| find_host_pair: concluded with <none>
| found_host_pair_conn (check_connection_end): %any:500 %any/%any:500 -> hp:none
| Added new connection rw-any with policy RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
./wrongcacert   loading certificate from moonCert.pem
./wrongcacert   loaded host cert file '../samples/wrongcert/certs/moonCert.pem' (1493 bytes)
| certificate is valid
| counting wild cards for @moon.strongswan.org is 0
| counting wild cards for (none) is 15
| based upon ID_wildcard policy, the connection is a template.
| orient rw-any checking against if: eth0 (AF_INET:132.213.238.7:500)
|     orient matched on IP
|   orient rw-any finished with: 1 [132.213.238.7]
| find_host_pair: looking for me=132.213.238.7:500 %any him=0.0.0.0:500 exact-match
| find_host_pair: concluded with <none>
| connect_to_host_pair: 132.213.238.7:500 %any 0.0.0.0:500 -> hp:none
| find_ID_host_pair: looking for me=@moon.strongswan.org him=<any> (exact)
|   concluded with <none>
./wrongcacert adding connection: "rw-any"
| 10.2.0.0/16===132.213.238.7[@moon.strongswan.org]...%any
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1; policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK
|   orient rw-any finished with: 1 [132.213.238.7]
RC=0 "rw-any": 10.2.0.0/16===132.213.238.7[@moon.strongswan.org]...%any; unrouted; eroute owner: #0
RC=0 "rw-any":     myip=unset; hisip=unset; mycert=moonCert.pem;
RC=0 "rw-any":   CAs: 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'...'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
RC=0 "rw-any":   ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; keyingtries: 1
RC=0 "rw-any":   policy: RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK+lKOD+rKOD; prio: 16,32; interface: eth0; kind=CK_TEMPLATE
0: input from parentI1.pcap
| *received 836 bytes from 93.184.216.34:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 44  22 00 01 fc
|   02 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  02 00 00 2c
|   02 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 28  03 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 02
|   03 00 00 08  02 00 00 02  00 00 00 08  04 00 00 0e
|   02 00 00 28  04 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 0e  02 00 00 2c  05 01 00 04
|   03 00 00 0c  01 00 00 0c  80 0e 00 80  03 00 00 08
|   03 00 00 02  03 00 00 08  02 00 00 02  00 00 00 08
|   04 00 00 05  02 00 00 2c  06 01 00 04  03 00 00 0c
|   01 00 00 0c  80 0e 00 80  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  07 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 05  02 00 00 28  08 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 05
|   02 00 00 28  09 01 00 04  03 00 00 08  01 00 00 03
|   03 00 00 08  03 00 00 02  03 00 00 08  02 00 00 02
|   00 00 00 08  04 00 00 02  02 00 00 28  0a 01 00 04
|   03 00 00 08  01 00 00 03  03 00 00 08  03 00 00 01
|   03 00 00 08  02 00 00 01  00 00 00 08  04 00 00 02
|   02 00 00 2c  0b 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 02  00 00 00 2c
|   0c 01 00 04  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  03 00 00 01  03 00 00 08  02 00 00 01
|   00 00 00 08  04 00 00 02  28 00 01 08  00 0e 00 00
|   3d a6 6a 81  e2 92 09 be  18 4f a0 1e  5c ed ea 7c
|   7d 7b 3a 21  3e 15 0d 53  5d 17 6a be  1b c5 70 ab
|   34 47 bc 09  14 7c aa 91  9c 8f 81 dc  1e f9 87 cd
|   6a ec fa f3  a5 9e 37 bc  ac 3d fd e1  32 8e e8 b3
|   fe d3 8b f4  7b 50 34 13  33 7a 93 ea  e9 3c 0e 8b
|   bd 48 18 9c  9e 03 70 f2  55 ce 45 22  9f c7 c9 48
|   43 a3 e2 64  b5 5d 43 38  c8 fe f1 d3  06 43 f0 0a
|   e8 6d 61 8c  60 78 d9 98  d3 1b 3b 5e  f5 a6 e8 2f
|   ef 56 ac b4  33 bd 1e 62  b2 3e 0b 17  af 6c b8 31
|   08 d7 19 5a  7b c4 54 c2  13 47 98 c2  cc d2 16 29
|   75 6c 03 fb  1e 9c 9d 21  0c a1 e6 c2  f3 f2 49 2c
|   f6 06 73 c1  96 1e ce 58  81 01 1c cb  16 dc f9 fc
|   c7 93 08 75  58 16 57 71  69 96 66 b7  a9 81 7f f7
|   37 4d 7c 41  38 62 a6 39  00 81 ca 3d  1d fc f7 b5
|   08 38 d4 34  70 22 6c 21  d2 5b 20 a1  d2 ba 2a d1
|   89 f3 20 79  ce ac 1e c2  ec 7d ae 76  94 40 39 a0
|   2b 00 00 14  20 98 9d 37  a8 14 a6 4d  8f f0 7c 08
|   d3 20 e9 e3  00 00 00 10  4f 45 70 6c  75 74 6f 75
|   6e 69 74 30
|  processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34), msgid: 00000000
| I am IKE SA Responder
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  00 00 00 00  00 00 00 00
| state hash entry 4
| v2 state object not found
| considering state entry: 0
|   reject:state needed and state unavailable
| considering state entry: 1
|   reject:state needed and state unavailable
| considering state entry: 2
|   reject:state needed and state unavailable
| considering state entry: 3
| Now lets proceed with state specific processing
| find_host_connection2 called from ikev2parent_inI1outR1, me=132.213.238.7:500 him=93.184.216.34:500 policy=IKEv2ALLOW/-
| find_host_pair: looking for me=132.213.238.7:500 %address him=93.184.216.34:500 any-match
| find_host_pair: comparing to me=132.213.238.7:500 %any him=0.0.0.0:500
| find_host_pair: concluded with rw-any
| found_host_pair_conn (find_host_connection2): 132.213.238.7:500 %address/93.184.216.34:500 -> hp:rw-any
| searching for connection with policy = IKEv2ALLOW/-
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+!IKEv1+IKEv2ALLOW+IKEv2Init+SAREFTRACK (rw-any)
| find_host_connection2 returns rw-any (ike=none/none)
./wrongcacert tentatively considering connection: rw-any
| creating state object #1 at Z
| orient rw-any checking against if: eth0 (AF_INET:132.213.238.7:500)
|     orient matched on IP
|   orient rw-any finished with: 1 [132.213.238.7]
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| inserting state object #1 bucket: 5
| will not send/process a dcookie
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2SA
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
| ***emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE
|    critical bit: none
| ****emit IKEv2 Proposal Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    prop #: 1
|    proto ID: 1
|    spi size: 0
|    # transforms: 4
| *****emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 1
|    transform ID: 12
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: KEY_LENGTH
|    length/value: 128
|     [128 is 128??]
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 3
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_T
|    transform type: 2
|    transform ID: 2
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    transform type: 4
|    transform ID: 14
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 44
| emitting length of IKEv2 Security Association Payload: 48
| ***emit IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni
|    critical bit: none
|    transform type: 14
| emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0  b8 55 c2 00
|   31 15 65 84  8b f9 dc a4  5f 49 d4 c5  f0 98 8e 9b
|   31 85 6e 27  5a c2 75 09  07 37 05 b5  b1 53 18 07
|   81 e8 1d 07  c6 19 1c de  dc 1f 2c 26  d2 0b 59 f9
|   67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d  8e d0 30 08
|   0b ed 95 b0  65 2f 5c a6  36 7e 92 2d  da cb 88 54
|   e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29  be 2c a4 55
|   68 01 45 bc  56 a9 84 b9  2b 1b bf 9a  fc 84 67 5f
|   d3 04 79 90  b7 fa 89 5b  04 06 d5 9a  50 92 16 4b
|   d6 33 40 be  2a 44 94 74  33 a7 a5 c1  1f 88 5b eb
|   4e d2 bb 94  b9 22 db e3  b6 5a 8c f9  d6 43 5d 5e
|   5d c9 19 b8  c8 81 53 01  95 09 02 7b  c0 2a b0 c8
|   5d 2c 69 78  6c e8 f6 5d  e4 90 43 83  fd f7 98 5e
|   cc 92 5c 79  7b 62 ae 98  db 4f 7f e0  68 7c cd 29
|   69 0a ad a3  e8 37 d7 41  b4 79 b3 a5  38 a2 8d a0
|   69 ff bd aa  ba d5 54 70  40 ab b5 fc  26 6d ae ce
| emitting length of IKEv2 Key Exchange Payload: 264
| ***emit IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2V
|    critical bit: none
| emitting 16 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  c6 ba 31 9f  88 5b e7 b7  a2 93 85 dc  bb c6 15 84
| emitting length of IKEv2 Nonce Payload: 20
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE
| emitting 12 raw bytes of Vendor ID into ISAKMP Vendor ID Payload
| Vendor ID  4f 45 70 6c  75 74 6f 75  6e 69 74 30
| emitting length of ISAKMP Vendor ID Payload: 16
| emitting length of ISAKMP Message: 376
| complete v2 state transition with STF_OK
./wrongcacert transition from state STATE_IKEv2_START to state STATE_PARENT_R1
./wrongcacert STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=aes_128 integ=sha1_96 prf=oakley_sha group=modp2048} (msgid: 00000000)
| sending reply packet to 93.184.216.34:500 (from port 500)
sending 376 bytes for STATE_IKEv2_START through eth0:500 to 93.184.216.34:500 (using #1)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   21 20 22 20  00 00 00 00  00 00 01 78  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 00 80  03 00 00 08  03 00 00 02  03 00 00 08
|   02 00 00 02  00 00 00 08  04 00 00 0e  28 00 01 08
|   00 0e 00 00  a5 9a 13 6c  b8 87 48 57  e1 22 6e a0
|   b8 55 c2 00  31 15 65 84  8b f9 dc a4  5f 49 d4 c5
|   f0 98 8e 9b  31 85 6e 27  5a c2 75 09  07 37 05 b5
|   b1 53 18 07  81 e8 1d 07  c6 19 1c de  dc 1f 2c 26
|   d2 0b 59 f9  67 6a ee 3c  e5 fa 72 3f  54 96 1e 7d
|   8e d0 30 08  0b ed 95 b0  65 2f 5c a6  36 7e 92 2d
|   da cb 88 54  e3 97 fa 16  6f 9e 7c a6  0c 43 2f 29
|   be 2c a4 55  68 01 45 bc  56 a9 84 b9  2b 1b bf 9a
|   fc 84 67 5f  d3 04 79 90  b7 fa 89 5b  04 06 d5 9a
|   50 92 16 4b  d6 33 40 be  2a 44 94 74  33 a7 a5 c1
|   1f 88 5b eb  4e d2 bb 94  b9 22 db e3  b6 5a 8c f9
|   d6 43 5d 5e  5d c9 19 b8  c8 81 53 01  95 09 02 7b
|   c0 2a b0 c8  5d 2c 69 78  6c e8 f6 5d  e4 90 43 83
|   fd f7 98 5e  cc 92 5c 79  7b 62 ae 98  db 4f 7f e0
|   68 7c cd 29  69 0a ad a3  e8 37 d7 41  b4 79 b3 a5
|   38 a2 8d a0  69 ff bd aa  ba d5 54 70  40 ab b5 fc
|   26 6d ae ce  2b 00 00 14  c6 ba 31 9f  88 5b e7 b7
|   a2 93 85 dc  bb c6 15 84  00 00 00 10  4f 45 70 6c
|   75 74 6f 75  6e 69 74 30
1: output to OUTPUT/parentR2.pcap
1: input from parentI2.pcap
| *received 1564 bytes from 93.184.216.34:500 on eth0 (port=500)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 23 08  00 00 00 01  00 00 06 1c  23 00 06 00
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   04 64 22 ca  bd 8e 1c 3e  68 57 42 0a  71 2c c0 97
|   44 e7 d8 17  b2 e9 29 61  7c 54 b5 d8  f0 13 b6 60
|   f0 72 68 c1  36 c2 a2 f5  97 15 5d 3f  be 4d 9f 78
|   bb ed df e2  fb 0f d5 89  46 a5 d2 fb  0e 7f a6 4a
|   1a c4 63 ba  f3 c6 13 de  17 af cc 05  40 7f 5c 33
|   e4 23 ce 11  e8 24 ed 1d  9c 21 e0 59  58 fb 82 a0
|   e2 96 b7 41  71 4d 0f 5b  87 80 c6 b0  c1 1f 0b 35
|   27 f6 76 68  ed 8d fe be  67 bf 68 95  37 47 99 0a
|   71 c4 0a 50  53 df 87 b4  8e d8 22 bf  31 58 ff f9
|   35 63 22 19  7c 1a e6 0f  ba 96 92 de  42 48 3d 36
|   48 a4 d6 81  09 b0 f1 7b  ef 89 32 aa  f6 d0 fb ed
|   64 be 5f df  59 87 77 f6  83 53 64 9c  34 fd 43 15
|   dc 13 9a 55  61 ac c7 bd  3e 04 45 d3  53 c5 56 61
|   10 f1 fe 3f  e0 7b 02 41  94 2a 48 32  8d 07 1d 81
|   c6 c2 5e a7  c9 85 18 0d  0a 1e 6f bc  18 3c 26 b7
|   15 06 06 04  4c 1d a2 ae  2a b7 81 ef  4d b7 12 9c
|   1f 54 02 ed  b8 ef 0a 6e  81 9e 2d 8b  7d 77 e9 08
|   ed b6 17 a5  20 56 57 86  ed ef 9b 01  16 40 d4 e8
|   6c cb 9e 2d  bc 36 b3 cb  a0 ad ca 9c  d9 f1 43 4d
|   04 2a c2 10  17 05 8e a9  41 5d ca 8e  69 28 36 8e
|   73 d0 51 fa  f5 e1 62 ef  94 ff b2 59  33 bc 11 59
|   19 96 12 9c  6d d6 06 f2  31 62 6e e9  e0 b1 e3 56
|   df af 54 60  a8 c9 4a 48  8c 12 fc bf  5c cb 9b f5
|   f7 05 df 65  dc a8 cf f6  32 79 48 42  f0 96 01 6d
|   48 15 45 23  d8 1d 98 34  7d 56 3f c7  6d 87 d6 f2
|   22 62 6f 1e  fd 94 8a 7a  67 08 46 43  41 42 79 54
|   a8 1b 95 f1  ac 88 e8 25  2c 0f 33 99  f6 b9 6d e6
|   6d 27 9f 3b  65 8a 6d ca  6b bb b3 6b  58 8d 93 a9
|   13 d4 d3 ba  cd 9e b9 f5  76 8a dc 7c  0c fc a5 90
|   81 fb b4 52  6d de fe 7d  7b 7c 5f f2  a3 b2 0a 7a
|   5d e7 7e 49  9c 2e 81 10  2e 1b d8 67  7c 41 b0 6a
|   c9 98 d2 f2  07 d6 ba 6f  7e a5 4f 0b  cc 6f ef 56
|   4a f2 4c f3  6f 30 8a d7  80 5c d5 7b  b1 ad 0d 7a
|   db ac 60 ec  69 15 1a 74  c4 f7 6e 49  c3 c9 e3 6d
|   f2 b4 16 a6  f7 a6 79 4e  51 d5 76 5c  32 da 11 67
|   21 c2 d8 75  c5 8b bf a0  d2 fc a1 9a  c3 2f f3 fd
|   ec 4a 0a bb  c4 64 80 97  f9 d6 79 80  27 b8 a0 e9
|   8c 1f 56 01  9b 12 e0 cf  ff 94 00 7a  5e 59 24 53
|   34 d5 b2 91  6f ea ef cd  fb f1 fc ce  8a f8 f9 d0
|   68 59 62 b4  a4 72 9b 87  ad 82 ec 7f  fe 84 e6 a5
|   27 aa b8 55  9d 35 5a c4  40 d0 17 e9  db e2 30 eb
|   c7 6b 10 75  dd b9 f8 2a  e5 a2 35 29  94 41 16 9c
|   c8 f5 45 b4  5c bf 89 7a  00 93 ca 48  b3 32 fc 1b
|   b3 64 fa c3  5a 0a ff 35  f0 c2 61 85  8c 49 36 f3
|   c2 47 92 72  15 9d e5 f8  31 2e 7e 3a  34 0d 6f 8d
|   3e d2 de a9  43 13 2b c6  d5 54 ee dd  de 50 54 9b
|   cb 6d bf 13  55 aa 94 a0  55 00 ff 4f  87 45 fa 2f
|   43 7a 74 7e  fb 7e 15 50  ba f4 d3 d1  66 6d b6 e1
|   63 bc 98 27  38 b7 14 d6  f1 42 0a 7d  2a 7b ae 72
|   12 35 ab 6b  ca 82 48 49  f8 28 fc 56  65 0f 7f 81
|   a2 25 9e 90  16 c1 60 e7  46 5a 7a 17  14 08 64 66
|   98 31 1e 71  c8 e3 44 7a  4a 35 d2 f6  f4 81 5b c9
|   4d 44 8d 59  a2 9a 31 86  3a 9f f8 91  3f e3 8d bf
|   9a ac e8 ea  71 79 5a 88  a0 ca 00 25  62 d8 c6 43
|   64 ed 2d 22  6d b9 8e e0  a4 07 27 e5  17 d9 55 1f
|   18 58 3b 75  e9 c8 9d 2e  be 0b d8 98  33 31 6f 3f
|   21 e6 2a 10  60 27 f1 9d  6c 6a 83 3a  c4 ba be 1f
|   91 9f 4f 9c  fa de ad 39  9a 54 77 ba  b2 c9 5a dd
|   6c 56 04 3a  fb fe 96 a3  52 31 bc 5d  56 e7 c8 c4
|   08 b4 9f fd  03 28 fd 86  d1 d5 dc b5  8a 4f 8f f4
|   dd 3a 10 89  16 08 ef 3d  df 3b 21 dc  03 cb ae fa
|   bd f8 0c d3  32 c3 8d a1  a4 85 30 7f  5a a7 6a 3d
|   54 04 26 f6  ff 40 ef 58  06 c1 12 cf  6e a5 05 56
|   23 81 48 48  9d d3 9e 82  07 bc 8e d8  2e 1c 75 fb
|   f7 0c 15 82  af b3 81 d8  a0 72 0f 61  ec 1c 38 a0
|   68 6b c5 dc  f3 c8 70 9d  ae 77 23 b4  ed 88 f0 57
|   27 d2 c9 39  93 53 56 11  65 37 20 2b  3a c6 79 be
|   02 2e 3c 4a  82 66 00 fa  a4 67 f7 99  17 4d 21 b2
|   bc 99 42 4d  c2 a9 e6 03  a3 ef f8 68  e4 cf c2 2f
|   a2 60 06 eb  17 24 ab c9  e7 ab 82 ec  0c b4 7d 3c
|   20 ad cd 0e  db bd 12 c3  53 78 aa 5c  b1 ca 97 4f
|   3f 65 1b 1f  d2 1b 00 36  0b 07 b3 6d  8a 06 f8 c8
|   24 aa 07 d1  65 ec 77 a7  8a b4 83 87  8e 18 32 d1
|   11 2d fb 89  2c 62 a4 d0  de 0e 98 a0  61 98 47 d6
|   c3 83 73 ab  28 1c 2d 45  89 de 84 d4  d7 c8 ea 62
|   1a 87 5f 43  cc 35 38 d1  c3 13 be 68  f2 d0 eb 73
|   fd 22 3d cd  b4 48 b9 9a  b4 88 40 84  52 be 1e 0f
|   77 b9 0e f4  50 9a 37 52  2d a9 fe be  6c 03 04 db
|   1a 4c 52 a8  c8 23 7f 4d  3f cc 0a 07  6e 77 5d 05
|   2a a4 bd aa  57 ad 31 d6  14 df 7b 22  2b 7d 1c 4d
|   41 e4 5f 9b  49 40 06 b5  fc 89 20 9b  6c 64 85 68
|   77 df 3c e5  51 10 3e ca  de 48 17 a6  c4 ac a1 64
|   ff ae 68 ef  b1 79 34 75  95 f9 b1 b1  6f bc 4c 07
|   ec 41 7c 69  86 ea f0 41  49 36 57 d7  82 a9 77 05
|   b4 82 66 72  0d 5f 58 b9  21 e4 55 f2  8c 08 13 09
|   c6 cb c7 94  6b 20 bc 7f  0d 7e 88 00  34 34 58 8f
|   92 00 a3 37  85 82 7f 7c  3b 5e 86 9a  7a 11 95 f2
|   13 b5 db d9  2e 15 7f 48  01 c3 a6 64  83 12 3f ac
|   80 27 f2 41  aa 1e bd 6e  1b 4d 09 02  ca cc b2 a9
|   38 8e 27 66  50 af 65 e4  f9 a1 c8 5e  c2 c0 57 88
|   c0 3d 76 a1  ec 5f 7b 24  cf 1c 65 f4  ee 61 95 4f
|   45 ee 66 c6  48 2a 2a b7  d9 33 8e b6  79 5c cd e5
|   40 04 af 99  3a e0 1d f7  e9 ab 69 e4  98 b2 7b 51
|   da 97 56 57  58 13 03 a6  f2 3b ba b6  1d e2 c8 67
|   b0 a8 65 15  ab ab 08 89  76 51 bb 4b
|  processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35), msgid: 00000001
| I am IKE SA Responder
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| v2 state object not found
| ICOOKIE:  80 01 02 03  04 05 06 07
| RCOOKIE:  64 0a 06 43  5c 7c 4b 31
| state hash entry 5
| v2 peer and cookies match on #1
| v2 state object #1 (rw-any) found, in STATE_PARENT_R1
| state found and its state is:STATE_PARENT_R1 msgid: 00001
| considering state entry: 0
|   reject: in state: STATE_PARENT_R1, needs STATE_PARENT_I1
| considering state entry: 1
|   reject: in state: STATE_PARENT_R1, needs STATE_PARENT_I1
| considering state entry: 2
|   reject: in state: STATE_PARENT_R1, needs STATE_PARENT_I2
| considering state entry: 3
|   reject:state unneeded and state available
| considering state entry: 4
| Now lets proceed with state specific processing
| ikev2 parent inI2outR2: calculating g^{xy} in order to decrypt I2
| ikev2 parent SA details
| ikev2 I 0x8001020304050607 0x640a06435c7c4b31 sha1:0x4ea8e662b07cdd430f6944c6723e4b82d5722418 aes128:0x3f44bf47cafd8150591deb088199fcbf
| ikev2 R 0x8001020304050607 0x640a06435c7c4b31 sha1:0x515b0bd22e6d76b34fdb760aa7bfad80b109b75d aes128:0xbedb67ec7dc3d00cccac42e70cd63bde
| data being hmac:  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 23 08  00 00 00 01  00 00 06 1c  23 00 06 00
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   04 64 22 ca  bd 8e 1c 3e  68 57 42 0a  71 2c c0 97
|   44 e7 d8 17  b2 e9 29 61  7c 54 b5 d8  f0 13 b6 60
|   f0 72 68 c1  36 c2 a2 f5  97 15 5d 3f  be 4d 9f 78
|   bb ed df e2  fb 0f d5 89  46 a5 d2 fb  0e 7f a6 4a
|   1a c4 63 ba  f3 c6 13 de  17 af cc 05  40 7f 5c 33
|   e4 23 ce 11  e8 24 ed 1d  9c 21 e0 59  58 fb 82 a0
|   e2 96 b7 41  71 4d 0f 5b  87 80 c6 b0  c1 1f 0b 35
|   27 f6 76 68  ed 8d fe be  67 bf 68 95  37 47 99 0a
|   71 c4 0a 50  53 df 87 b4  8e d8 22 bf  31 58 ff f9
|   35 63 22 19  7c 1a e6 0f  ba 96 92 de  42 48 3d 36
|   48 a4 d6 81  09 b0 f1 7b  ef 89 32 aa  f6 d0 fb ed
|   64 be 5f df  59 87 77 f6  83 53 64 9c  34 fd 43 15
|   dc 13 9a 55  61 ac c7 bd  3e 04 45 d3  53 c5 56 61
|   10 f1 fe 3f  e0 7b 02 41  94 2a 48 32  8d 07 1d 81
|   c6 c2 5e a7  c9 85 18 0d  0a 1e 6f bc  18 3c 26 b7
|   15 06 06 04  4c 1d a2 ae  2a b7 81 ef  4d b7 12 9c
|   1f 54 02 ed  b8 ef 0a 6e  81 9e 2d 8b  7d 77 e9 08
|   ed b6 17 a5  20 56 57 86  ed ef 9b 01  16 40 d4 e8
|   6c cb 9e 2d  bc 36 b3 cb  a0 ad ca 9c  d9 f1 43 4d
|   04 2a c2 10  17 05 8e a9  41 5d ca 8e  69 28 36 8e
|   73 d0 51 fa  f5 e1 62 ef  94 ff b2 59  33 bc 11 59
|   19 96 12 9c  6d d6 06 f2  31 62 6e e9  e0 b1 e3 56
|   df af 54 60  a8 c9 4a 48  8c 12 fc bf  5c cb 9b f5
|   f7 05 df 65  dc a8 cf f6  32 79 48 42  f0 96 01 6d
|   48 15 45 23  d8 1d 98 34  7d 56 3f c7  6d 87 d6 f2
|   22 62 6f 1e  fd 94 8a 7a  67 08 46 43  41 42 79 54
|   a8 1b 95 f1  ac 88 e8 25  2c 0f 33 99  f6 b9 6d e6
|   6d 27 9f 3b  65 8a 6d ca  6b bb b3 6b  58 8d 93 a9
|   13 d4 d3 ba  cd 9e b9 f5  76 8a dc 7c  0c fc a5 90
|   81 fb b4 52  6d de fe 7d  7b 7c 5f f2  a3 b2 0a 7a
|   5d e7 7e 49  9c 2e 81 10  2e 1b d8 67  7c 41 b0 6a
|   c9 98 d2 f2  07 d6 ba 6f  7e a5 4f 0b  cc 6f ef 56
|   4a f2 4c f3  6f 30 8a d7  80 5c d5 7b  b1 ad 0d 7a
|   db ac 60 ec  69 15 1a 74  c4 f7 6e 49  c3 c9 e3 6d
|   f2 b4 16 a6  f7 a6 79 4e  51 d5 76 5c  32 da 11 67
|   21 c2 d8 75  c5 8b bf a0  d2 fc a1 9a  c3 2f f3 fd
|   ec 4a 0a bb  c4 64 80 97  f9 d6 79 80  27 b8 a0 e9
|   8c 1f 56 01  9b 12 e0 cf  ff 94 00 7a  5e 59 24 53
|   34 d5 b2 91  6f ea ef cd  fb f1 fc ce  8a f8 f9 d0
|   68 59 62 b4  a4 72 9b 87  ad 82 ec 7f  fe 84 e6 a5
|   27 aa b8 55  9d 35 5a c4  40 d0 17 e9  db e2 30 eb
|   c7 6b 10 75  dd b9 f8 2a  e5 a2 35 29  94 41 16 9c
|   c8 f5 45 b4  5c bf 89 7a  00 93 ca 48  b3 32 fc 1b
|   b3 64 fa c3  5a 0a ff 35  f0 c2 61 85  8c 49 36 f3
|   c2 47 92 72  15 9d e5 f8  31 2e 7e 3a  34 0d 6f 8d
|   3e d2 de a9  43 13 2b c6  d5 54 ee dd  de 50 54 9b
|   cb 6d bf 13  55 aa 94 a0  55 00 ff 4f  87 45 fa 2f
|   43 7a 74 7e  fb 7e 15 50  ba f4 d3 d1  66 6d b6 e1
|   63 bc 98 27  38 b7 14 d6  f1 42 0a 7d  2a 7b ae 72
|   12 35 ab 6b  ca 82 48 49  f8 28 fc 56  65 0f 7f 81
|   a2 25 9e 90  16 c1 60 e7  46 5a 7a 17  14 08 64 66
|   98 31 1e 71  c8 e3 44 7a  4a 35 d2 f6  f4 81 5b c9
|   4d 44 8d 59  a2 9a 31 86  3a 9f f8 91  3f e3 8d bf
|   9a ac e8 ea  71 79 5a 88  a0 ca 00 25  62 d8 c6 43
|   64 ed 2d 22  6d b9 8e e0  a4 07 27 e5  17 d9 55 1f
|   18 58 3b 75  e9 c8 9d 2e  be 0b d8 98  33 31 6f 3f
|   21 e6 2a 10  60 27 f1 9d  6c 6a 83 3a  c4 ba be 1f
|   91 9f 4f 9c  fa de ad 39  9a 54 77 ba  b2 c9 5a dd
|   6c 56 04 3a  fb fe 96 a3  52 31 bc 5d  56 e7 c8 c4
|   08 b4 9f fd  03 28 fd 86  d1 d5 dc b5  8a 4f 8f f4
|   dd 3a 10 89  16 08 ef 3d  df 3b 21 dc  03 cb ae fa
|   bd f8 0c d3  32 c3 8d a1  a4 85 30 7f  5a a7 6a 3d
|   54 04 26 f6  ff 40 ef 58  06 c1 12 cf  6e a5 05 56
|   23 81 48 48  9d d3 9e 82  07 bc 8e d8  2e 1c 75 fb
|   f7 0c 15 82  af b3 81 d8  a0 72 0f 61  ec 1c 38 a0
|   68 6b c5 dc  f3 c8 70 9d  ae 77 23 b4  ed 88 f0 57
|   27 d2 c9 39  93 53 56 11  65 37 20 2b  3a c6 79 be
|   02 2e 3c 4a  82 66 00 fa  a4 67 f7 99  17 4d 21 b2
|   bc 99 42 4d  c2 a9 e6 03  a3 ef f8 68  e4 cf c2 2f
|   a2 60 06 eb  17 24 ab c9  e7 ab 82 ec  0c b4 7d 3c
|   20 ad cd 0e  db bd 12 c3  53 78 aa 5c  b1 ca 97 4f
|   3f 65 1b 1f  d2 1b 00 36  0b 07 b3 6d  8a 06 f8 c8
|   24 aa 07 d1  65 ec 77 a7  8a b4 83 87  8e 18 32 d1
|   11 2d fb 89  2c 62 a4 d0  de 0e 98 a0  61 98 47 d6
|   c3 83 73 ab  28 1c 2d 45  89 de 84 d4  d7 c8 ea 62
|   1a 87 5f 43  cc 35 38 d1  c3 13 be 68  f2 d0 eb 73
|   fd 22 3d cd  b4 48 b9 9a  b4 88 40 84  52 be 1e 0f
|   77 b9 0e f4  50 9a 37 52  2d a9 fe be  6c 03 04 db
|   1a 4c 52 a8  c8 23 7f 4d  3f cc 0a 07  6e 77 5d 05
|   2a a4 bd aa  57 ad 31 d6  14 df 7b 22  2b 7d 1c 4d
|   41 e4 5f 9b  49 40 06 b5  fc 89 20 9b  6c 64 85 68
|   77 df 3c e5  51 10 3e ca  de 48 17 a6  c4 ac a1 64
|   ff ae 68 ef  b1 79 34 75  95 f9 b1 b1  6f bc 4c 07
|   ec 41 7c 69  86 ea f0 41  49 36 57 d7  82 a9 77 05
|   b4 82 66 72  0d 5f 58 b9  21 e4 55 f2  8c 08 13 09
|   c6 cb c7 94  6b 20 bc 7f  0d 7e 88 00  34 34 58 8f
|   92 00 a3 37  85 82 7f 7c  3b 5e 86 9a  7a 11 95 f2
|   13 b5 db d9  2e 15 7f 48  01 c3 a6 64  83 12 3f ac
|   80 27 f2 41  aa 1e bd 6e  1b 4d 09 02  ca cc b2 a9
|   38 8e 27 66  50 af 65 e4  f9 a1 c8 5e  c2 c0 57 88
|   c0 3d 76 a1  ec 5f 7b 24  cf 1c 65 f4  ee 61 95 4f
|   45 ee 66 c6  48 2a 2a b7  d9 33 8e b6  79 5c cd e5
|   40 04 af 99  3a e0 1d f7  e9 ab 69 e4  98 b2 7b 51
|   da 97 56 57  58 13 03 a6  f2 3b ba b6  1d e2 c8 67
| R2 calculated auth:  b0 a8 65 15  ab ab 08 89  76 51 bb 4b
| R2  provided  auth:  b0 a8 65 15  ab ab 08 89  76 51 bb 4b
| authenticator matched, np=35
| data before decryption:
|   04 64 22 ca  bd 8e 1c 3e  68 57 42 0a  71 2c c0 97
|   44 e7 d8 17  b2 e9 29 61  7c 54 b5 d8  f0 13 b6 60
|   f0 72 68 c1  36 c2 a2 f5  97 15 5d 3f  be 4d 9f 78
|   bb ed df e2  fb 0f d5 89  46 a5 d2 fb  0e 7f a6 4a
|   1a c4 63 ba  f3 c6 13 de  17 af cc 05  40 7f 5c 33
|   e4 23 ce 11  e8 24 ed 1d  9c 21 e0 59  58 fb 82 a0
|   e2 96 b7 41  71 4d 0f 5b  87 80 c6 b0  c1 1f 0b 35
|   27 f6 76 68  ed 8d fe be  67 bf 68 95  37 47 99 0a
|   71 c4 0a 50  53 df 87 b4  8e d8 22 bf  31 58 ff f9
|   35 63 22 19  7c 1a e6 0f  ba 96 92 de  42 48 3d 36
|   48 a4 d6 81  09 b0 f1 7b  ef 89 32 aa  f6 d0 fb ed
|   64 be 5f df  59 87 77 f6  83 53 64 9c  34 fd 43 15
|   dc 13 9a 55  61 ac c7 bd  3e 04 45 d3  53 c5 56 61
|   10 f1 fe 3f  e0 7b 02 41  94 2a 48 32  8d 07 1d 81
|   c6 c2 5e a7  c9 85 18 0d  0a 1e 6f bc  18 3c 26 b7
|   15 06 06 04  4c 1d a2 ae  2a b7 81 ef  4d b7 12 9c
|   1f 54 02 ed  b8 ef 0a 6e  81 9e 2d 8b  7d 77 e9 08
|   ed b6 17 a5  20 56 57 86  ed ef 9b 01  16 40 d4 e8
|   6c cb 9e 2d  bc 36 b3 cb  a0 ad ca 9c  d9 f1 43 4d
|   04 2a c2 10  17 05 8e a9  41 5d ca 8e  69 28 36 8e
|   73 d0 51 fa  f5 e1 62 ef  94 ff b2 59  33 bc 11 59
|   19 96 12 9c  6d d6 06 f2  31 62 6e e9  e0 b1 e3 56
|   df af 54 60  a8 c9 4a 48  8c 12 fc bf  5c cb 9b f5
|   f7 05 df 65  dc a8 cf f6  32 79 48 42  f0 96 01 6d
|   48 15 45 23  d8 1d 98 34  7d 56 3f c7  6d 87 d6 f2
|   22 62 6f 1e  fd 94 8a 7a  67 08 46 43  41 42 79 54
|   a8 1b 95 f1  ac 88 e8 25  2c 0f 33 99  f6 b9 6d e6
|   6d 27 9f 3b  65 8a 6d ca  6b bb b3 6b  58 8d 93 a9
|   13 d4 d3 ba  cd 9e b9 f5  76 8a dc 7c  0c fc a5 90
|   81 fb b4 52  6d de fe 7d  7b 7c 5f f2  a3 b2 0a 7a
|   5d e7 7e 49  9c 2e 81 10  2e 1b d8 67  7c 41 b0 6a
|   c9 98 d2 f2  07 d6 ba 6f  7e a5 4f 0b  cc 6f ef 56
|   4a f2 4c f3  6f 30 8a d7  80 5c d5 7b  b1 ad 0d 7a
|   db ac 60 ec  69 15 1a 74  c4 f7 6e 49  c3 c9 e3 6d
|   f2 b4 16 a6  f7 a6 79 4e  51 d5 76 5c  32 da 11 67
|   21 c2 d8 75  c5 8b bf a0  d2 fc a1 9a  c3 2f f3 fd
|   ec 4a 0a bb  c4 64 80 97  f9 d6 79 80  27 b8 a0 e9
|   8c 1f 56 01  9b 12 e0 cf  ff 94 00 7a  5e 59 24 53
|   34 d5 b2 91  6f ea ef cd  fb f1 fc ce  8a f8 f9 d0
|   68 59 62 b4  a4 72 9b 87  ad 82 ec 7f  fe 84 e6 a5
|   27 aa b8 55  9d 35 5a c4  40 d0 17 e9  db e2 30 eb
|   c7 6b 10 75  dd b9 f8 2a  e5 a2 35 29  94 41 16 9c
|   c8 f5 45 b4  5c bf 89 7a  00 93 ca 48  b3 32 fc 1b
|   b3 64 fa c3  5a 0a ff 35  f0 c2 61 85  8c 49 36 f3
|   c2 47 92 72  15 9d e5 f8  31 2e 7e 3a  34 0d 6f 8d
|   3e d2 de a9  43 13 2b c6  d5 54 ee dd  de 50 54 9b
|   cb 6d bf 13  55 aa 94 a0  55 00 ff 4f  87 45 fa 2f
|   43 7a 74 7e  fb 7e 15 50  ba f4 d3 d1  66 6d b6 e1
|   63 bc 98 27  38 b7 14 d6  f1 42 0a 7d  2a 7b ae 72
|   12 35 ab 6b  ca 82 48 49  f8 28 fc 56  65 0f 7f 81
|   a2 25 9e 90  16 c1 60 e7  46 5a 7a 17  14 08 64 66
|   98 31 1e 71  c8 e3 44 7a  4a 35 d2 f6  f4 81 5b c9
|   4d 44 8d 59  a2 9a 31 86  3a 9f f8 91  3f e3 8d bf
|   9a ac e8 ea  71 79 5a 88  a0 ca 00 25  62 d8 c6 43
|   64 ed 2d 22  6d b9 8e e0  a4 07 27 e5  17 d9 55 1f
|   18 58 3b 75  e9 c8 9d 2e  be 0b d8 98  33 31 6f 3f
|   21 e6 2a 10  60 27 f1 9d  6c 6a 83 3a  c4 ba be 1f
|   91 9f 4f 9c  fa de ad 39  9a 54 77 ba  b2 c9 5a dd
|   6c 56 04 3a  fb fe 96 a3  52 31 bc 5d  56 e7 c8 c4
|   08 b4 9f fd  03 28 fd 86  d1 d5 dc b5  8a 4f 8f f4
|   dd 3a 10 89  16 08 ef 3d  df 3b 21 dc  03 cb ae fa
|   bd f8 0c d3  32 c3 8d a1  a4 85 30 7f  5a a7 6a 3d
|   54 04 26 f6  ff 40 ef 58  06 c1 12 cf  6e a5 05 56
|   23 81 48 48  9d d3 9e 82  07 bc 8e d8  2e 1c 75 fb
|   f7 0c 15 82  af b3 81 d8  a0 72 0f 61  ec 1c 38 a0
|   68 6b c5 dc  f3 c8 70 9d  ae 77 23 b4  ed 88 f0 57
|   27 d2 c9 39  93 53 56 11  65 37 20 2b  3a c6 79 be
|   02 2e 3c 4a  82 66 00 fa  a4 67 f7 99  17 4d 21 b2
|   bc 99 42 4d  c2 a9 e6 03  a3 ef f8 68  e4 cf c2 2f
|   a2 60 06 eb  17 24 ab c9  e7 ab 82 ec  0c b4 7d 3c
|   20 ad cd 0e  db bd 12 c3  53 78 aa 5c  b1 ca 97 4f
|   3f 65 1b 1f  d2 1b 00 36  0b 07 b3 6d  8a 06 f8 c8
|   24 aa 07 d1  65 ec 77 a7  8a b4 83 87  8e 18 32 d1
|   11 2d fb 89  2c 62 a4 d0  de 0e 98 a0  61 98 47 d6
|   c3 83 73 ab  28 1c 2d 45  89 de 84 d4  d7 c8 ea 62
|   1a 87 5f 43  cc 35 38 d1  c3 13 be 68  f2 d0 eb 73
|   fd 22 3d cd  b4 48 b9 9a  b4 88 40 84  52 be 1e 0f
|   77 b9 0e f4  50 9a 37 52  2d a9 fe be  6c 03 04 db
|   1a 4c 52 a8  c8 23 7f 4d  3f cc 0a 07  6e 77 5d 05
|   2a a4 bd aa  57 ad 31 d6  14 df 7b 22  2b 7d 1c 4d
|   41 e4 5f 9b  49 40 06 b5  fc 89 20 9b  6c 64 85 68
|   77 df 3c e5  51 10 3e ca  de 48 17 a6  c4 ac a1 64
|   ff ae 68 ef  b1 79 34 75  95 f9 b1 b1  6f bc 4c 07
|   ec 41 7c 69  86 ea f0 41  49 36 57 d7  82 a9 77 05
|   b4 82 66 72  0d 5f 58 b9  21 e4 55 f2  8c 08 13 09
|   c6 cb c7 94  6b 20 bc 7f  0d 7e 88 00  34 34 58 8f
|   92 00 a3 37  85 82 7f 7c  3b 5e 86 9a  7a 11 95 f2
|   13 b5 db d9  2e 15 7f 48  01 c3 a6 64  83 12 3f ac
|   80 27 f2 41  aa 1e bd 6e  1b 4d 09 02  ca cc b2 a9
|   38 8e 27 66  50 af 65 e4  f9 a1 c8 5e  c2 c0 57 88
|   c0 3d 76 a1  ec 5f 7b 24  cf 1c 65 f4  ee 61 95 4f
|   45 ee 66 c6  48 2a 2a b7  d9 33 8e b6  79 5c cd e5
|   40 04 af 99  3a e0 1d f7  e9 ab 69 e4  98 b2 7b 51
|   da 97 56 57  58 13 03 a6  f2 3b ba b6  1d e2 c8 67
| decrypted payload:  25 00 00 1c  03 00 00 00  63 61 72 6f  6c 40 73 74
|   72 6f 6e 67  73 77 61 6e  2e 6f 72 67  27 00 04 2b
|   04 30 82 04  22 30 82 03  0a a0 03 02  01 02 02 01
|   30 30 0d 06  09 2a 86 48  86 f7 0d 01  01 0b 05 00
|   30 45 31 0b  30 09 06 03  55 04 06 13  02 43 48 31
|   19 30 17 06  03 55 04 0a  13 10 4c 69  6e 75 78 20
|   73 74 72 6f  6e 67 53 77  61 6e 31 1b  30 19 06 03
|   55 04 03 13  12 73 74 72  6f 6e 67 53  77 61 6e 20
|   52 6f 6f 74  20 43 41 30  1e 17 0d 31  34 30 38 32
|   37 31 35 30  35 33 36 5a  17 0d 31 39  30 38 32 36
|   31 35 30 35  33 36 5a 30  5a 31 0b 30  09 06 03 55
|   04 06 13 02  43 48 31 19  30 17 06 03  55 04 0a 13
|   10 4c 69 6e  75 78 20 73  74 72 6f 6e  67 53 77 61
|   6e 31 11 30  0f 06 03 55  04 0b 13 08  52 65 73 65
|   61 72 63 68  31 1d 30 1b  06 03 55 04  03 14 14 63
|   61 72 6f 6c  40 73 74 72  6f 6e 67 73  77 61 6e 2e
|   6f 72 67 30  82 01 22 30  0d 06 09 2a  86 48 86 f7
|   0d 01 01 01  05 00 03 82  01 0f 00 30  82 01 0a 02
|   82 01 01 00  b7 f3 d4 37  17 ca df ec  38 02 e2 d4
|   86 7f 45 cb  8f 6b 99 be  e1 f8 92 49  3d b0 55 65
|   ab 97 0d e1  52 37 a2 c0  b7 e0 a0 ba  ed 29 a1 97
|   e2 2f 80 b7  cd 99 a2 5d  a6 75 b1 17  16 93 be f6
|   ac 57 96 23  f6 bb 47 de  c6 a3 f8 98  1b 99 ba cd
|   c4 2c 0f 36  10 e2 f4 95  0d 9a 84 08  bc 3b 7a 9a
|   7e 40 cc 05  28 2f a1 e2  69 13 03 5e  d3 45 20 87
|   9d e0 ee 14  fb 77 0f 2d  4a 07 0f 1a  a4 24 5a eb
|   48 20 a4 fd  4f a7 bf 1d  b1 cd 8d 1b  58 97 0f 59
|   94 7b 29 f2  04 98 8e 0f  d0 ea f5 7a  a1 fb 6d b9
|   e3 14 0f d3  51 bf cc 36  63 be ab 9d  14 66 50 67
|   f7 1a 53 45  16 68 31 66  7b 42 25 1b  98 96 d9 f1
|   57 b5 5c 08  5a 29 a7 26  ae 62 df df  3e 68 c0 c5
|   b3 d1 ba 11  ca 69 c9 f3  23 3a bc dc  8c 5f e5 f4
|   a3 31 39 65  b8 60 9f 58  55 ff 34 61  0d 5d a9 81
|   a8 28 64 44  b1 e6 b8 21  cd 7b 1c 51  a7 db 36 17
|   54 b5 d2 11  02 03 01 00  01 a3 82 01  06 30 82 01
|   02 30 09 06  03 55 1d 13  04 02 30 00  30 0b 06 03
|   55 1d 0f 04  04 03 02 03  a8 30 1d 06  03 55 1d 0e
|   04 16 04 14  5c 59 70 62  57 2d 2a 24  9c 5c 94 56
|   9b 89 5e e5  c5 05 b6 bd  30 6d 06 03  55 1d 23 04
|   66 30 64 80  14 5d a7 dd  70 06 51 32  7e e7 b6 6d
|   b3 b5 e5 e0  60 ea 2e 4d  ef a1 49 a4  47 30 45 31
|   0b 30 09 06  03 55 04 06  13 02 43 48  31 19 30 17
|   06 03 55 04  0a 13 10 4c  69 6e 75 78  20 73 74 72
|   6f 6e 67 53  77 61 6e 31  1b 30 19 06  03 55 04 03
|   13 12 73 74  72 6f 6e 67  53 77 61 6e  20 52 6f 6f
|   74 20 43 41  82 01 00 30  1f 06 03 55  1d 11 04 18
|   30 16 81 14  63 61 72 6f  6c 40 73 74  72 6f 6e 67
|   73 77 61 6e  2e 6f 72 67  30 39 06 03  55 1d 1f 04
|   32 30 30 30  2e a0 2c a0  2a 86 28 68  74 74 70 3a
|   2f 2f 63 72  6c 2e 73 74  72 6f 6e 67  73 77 61 6e
|   2e 6f 72 67  2f 73 74 72  6f 6e 67 73  77 61 6e 2e
|   63 72 6c 30  0d 06 09 2a  86 48 86 f7  0d 01 01 0b
|   05 00 03 82  01 01 00 55  a9 3c 34 0d  10 01 13 07
|   30 90 cb 03  91 7d 72 21  7e 25 38 30  1a 76 f4 aa
|   fc f3 ff 33  77 ba 56 86  4e 5c 1a 61  29 0b ea 80
|   08 1a 0a 99  3e bc 05 e8  1c d3 c8 9a  0f af 45 57
|   98 6c 87 92  d0 4d a5 32  8e 67 29 0b  bb 30 2b 3c
|   46 92 fd ec  f3 07 2f b3  65 cd 10 62  4b e0 82 29
|   16 82 1e 09  49 80 26 6d  7f 07 35 b1  aa 67 ad c8
|   5e 32 86 5a  b7 e1 b2 8e  7c 8a 54 d4  c9 87 f4 2d
|   1a 6e 50 2f  d0 d1 29 ad  76 e4 1f 60  4b d1 6d 75
|   3d 01 92 1c  48 b1 9e 13  b0 43 9e 4e  ab f9 74 78
|   b1 6d ce f1  f8 cc 04 4c  be 80 c4 da  da 3e a7 c8
|   6e de fc 72  7b 08 07 73  e9 23 16 18  4e 50 d5 63
|   61 70 af 61  b4 46 2f 62  9c 43 3f 19  91 40 b0 94
|   94 89 2c a8  4e a4 2c c9  98 73 cc e9  84 fe 62 b8
|   d0 9b 41 bf  e9 60 fa 93  ce 6b 8b 42  f3 0f 3d d8
|   a1 0a b2 74  57 f5 dc 57  f9 4e af af  74 2d a0 88
|   cd c2 0f 2a  bd c5 2e 21  00 00 c8 01  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 00
|   00 00 00 00  00 00 00 00  00 00 00 00  00 00 00 2c
|   00 00 9c 02  00 00 28 01  03 04 03 12  34 56 78 03
|   00 00 0c 01  00 00 0c 80  0e 00 80 03  00 00 08 03
|   00 00 02 00  00 00 08 05  00 00 00 02  00 00 28 02
|   03 04 03 12  34 56 78 03  00 00 0c 01  00 00 0c 80
|   0e 00 80 03  00 00 08 03  00 00 01 00  00 00 08 05
|   00 00 00 02  00 00 24 03  03 04 03 12  34 56 78 03
|   00 00 08 01  00 00 03 03  00 00 08 03  00 00 02 00
|   00 00 08 05  00 00 00 00  00 00 24 04  03 04 03 12
|   34 56 78 03  00 00 08 01  00 00 03 03  00 00 08 03
|   00 00 01 00  00 00 08 05  00 00 00 2d  00 00 18 01
|   00 00 00 07  00 00 10 00  00 ff ff 5d  b8 d8 22 5d
|   b8 d8 22 00  00 00 18 01  00 00 00 07  00 00 10 00
|   00 ff ff 0a  02 00 00 0a  02 ff ff 00  01 02 03 04
| striping 5 bytes as pad
| **parse IKEv2 Identification Payload:
|    next payload type: ISAKMP_NEXT_v2CERT
|    critical bit: none
|    length: 28
|    id_type: ID_USER_FQDN
| processing payload: ISAKMP_NEXT_v2IDi (len=28)
| **parse IKEv2 Certificate Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH
|    critical bit: none
|    length: 1067
|    ikev2 cert encoding: CERT_X509_SIGNATURE
| processing payload: ISAKMP_NEXT_v2CERT (len=1067)
| **parse IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA
|    critical bit: none
|    length: 200
|    auth method: v2_AUTH_RSA
| processing payload: ISAKMP_NEXT_v2AUTH (len=200)
| **parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi
|    critical bit: none
|    length: 156
| processing payload: ISAKMP_NEXT_v2SA (len=156)
| **parse IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_v2TSr
|    critical bit: none
|    length: 24
|    number of TS: 1
| processing payload: ISAKMP_NEXT_v2TSi (len=24)
| **parse IKEv2 Traffic Selector Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    length: 24
|    number of TS: 1
| processing payload: ISAKMP_NEXT_v2TSr (len=24)
./wrongcacert IKEv2 mode peer ID is ID_USER_FQDN: 'carol@strongswan.org'
| find_ID_host_pair: looking for me=(none) him=carol@strongswan.org (wildcard)
|                   comparing to me=@moon.strongswan.org him=(none) (rw-any)
|   concluded with rw-any
| idhash verify pi  cc 07 97 44  b4 a3 4e 8a  0d 2f 27 8b  ee 06 6d 07
|   a5 a5 75 2e
| idhash verify I2  03 00 00 00  63 61 72 6f  6c 40 73 74  72 6f 6e 67
|   73 77 61 6e  2e 6f 72 67
| has a v2_CERT payload going to process it
| L0 - certificate:
| L1 - tbsCertificate:
| L2 - DEFAULT v1:
| L3 - version:
|   v3
| L2 - serialNumber:
| L2 - signature:
| L3 - algorithmIdentifier:
| L4 - algorithm:
|   'sha256WithRSAEncryption'
| L2 - issuer:
|   'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
| L2 - validity:
| L3 - notBefore:
| L4 - utcTime:
|   'Aug 27 15:05:36 UTC 2014'
| L3 - notAfter:
| L4 - utcTime:
|   'Aug 26 15:05:36 UTC 2019'
| L2 - subject:
|   'C=CH, O=Linux strongSwan, OU=Research, CN=carol@strongswan.org'
| L2 - subjectPublicKeyInfo:
| L3 - algorithm:
| L4 - algorithmIdentifier:
| L5 - algorithm:
|   'rsaEncryption'
| L3 - subjectPublicKey:
| L4 - RSAPublicKey:
| L5 - modulus:
| L5 - publicExponent:
| L2 - optional extensions:
| L3 - extensions:
| L4 - extension:
| L5 - extnID:
|   'basicConstraints'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L6 - basicConstraints:
| L7 - CA:
|   FALSE
| L4 - extension:
| L5 - extnID:
|   'keyUsage'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L4 - extension:
| L5 - extnID:
|   'subjectKeyIdentifier'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L6 - keyIdentifier:
| L4 - extension:
| L5 - extnID:
|   'authorityKeyIdentifier'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L6 - authorityKeyIdentifier:
| L7 - keyIdentifier:
| L8 - keyIdentifier:
| L7 - authorityCertIssuer:
| L8 - generalNames:
| L9 - generalName:
| L10 - directoryName:
|   'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
| L7 - authorityCertSerialNumber:
| L4 - extension:
| L5 - extnID:
|   'subjectAltName'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L6 - generalNames:
| L7 - generalName:
| L8 - rfc822Name:
|   'carol@strongswan.org'
| L4 - extension:
| L5 - extnID:
|   'crlDistributionPoints'
| L5 - critical:
|   FALSE
| L5 - extnValue:
| L6 - crlDistributionPoints:
| L7 - DistributionPoint:
| L8 - distributionPoint:
| L9 - fullName:
| L10 - generalNames:
| L11 - generalName:
| L12 - uniformResourceIdentifier:
|   'http://crl.strongswan.org/strongswan.crl'
| L1 - signatureAlgorithm:
| L2 - algorithmIdentifier:
| L3 - algorithm:
|   'sha256WithRSAEncryption'
| L1 - signatureValue:
./wrongcacert issuer cacert not found
./wrongcacert X.509 certificate rejected
| ikev2 verify required CA is 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
|
| List of X.509 End Certificates:
|
| NOW, count: 1
|        subject: 'C=CH, O=Linux strongSwan, CN=moon.strongswan.org'
|        issuer:  'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
|        serial:   2b
|        pubkey:   2048 RSA Key AwEAAaR8B
|        validity: not before Aug 27 14:44:56 UTC 2014 ok
|                  not after  Aug 26 14:44:56 UTC 2019 ok
|        subjkey:  d8:26:3d:21:ec:7c:db:be:5a:39:0c:5b:70:cb:03:80:21:de:ae:13
|        authkey:  5d:a7:dd:70:06:51:32:7e:e7:b6:6d:b3:b5:e5:e0:60:ea:2e:4d:ef
|        aserial:  00
| checking alg=1 == 1, keyid=@moon.strongswan.org same_id=0
| checking alg=1 == 1, keyid=C=CH, O=Linux strongSwan, CN=moon.strongswan.org same_id=0
RC=0
RC=0 List of Public Keys:
RC=0
RC=0 Nov 23 22:12:14 UTC 2015, 2048 RSA Key AwEAAaR8B (has private key), until Aug 26 14:44:56 UTC 2019 ok
RC=0        ID_FQDN '@moon.strongswan.org'
RC=0        Issuer 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
RC=0 Nov 23 22:12:14 UTC 2015, 2048 RSA Key AwEAAaR8B (has private key), until Aug 26 14:44:56 UTC 2019 ok
RC=0        ID_DER_ASN1_DN 'C=CH, O=Linux strongSwan, CN=moon.strongswan.org'
RC=0        Issuer 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
./wrongcacert RSA authentication failed
./wrongcacert sending  notification v2N_AUTHENTICATION_FAILED to 93.184.216.34:500
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2N
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_SA_INIT
|    flags: ISAKMP_FLAG_RESPONSE
|    message ID:  00 00 00 00
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    Protocol ID: PROTO_ISAKMP
|    SPI size: 0
|    Notify Message Type: v2N_AUTHENTICATION_FAILED
| emitting length of IKEv2 Notify Payload: 8
| emitting length of ISAKMP Message: 36
sending 36 bytes for send_v2_notification through eth0:500 to 93.184.216.34:500 (using #1)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   29 20 22 20  00 00 00 00  00 00 00 24  00 00 00 08
|   01 00 00 18
| ikev2_parent_inI2outR2_tail returned STF_FATAL
| complete v2 state transition with STF_FATAL
./wrongcacert encountered fatal error in state STATE_PARENT_R1
./wrongcacert deleting state #1 (STATE_PARENT_R1)
| considering request to delete IKE parent state
| sending IKE SA delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   80 01 02 03  04 05 06 07
|    responder cookie:
|   64 0a 06 43  5c 7c 4b 31
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996)
|    exchange type: ISAKMP_v2_INFORMATIONAL
|    flags: none
|    message ID:  00 00 00 01
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2D
|    critical bit: none
| emitting 16 zero bytes of iv into IKEv2 Encryption Payload
| *****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    critical bit: none
|    protocol ID: 1
|    SPI size: 0
|    number of SPIs: 0
| emitting length of IKEv2 Delete Payload: 8
| emitting 8 raw bytes of padding and length into cleartext
| padding and length  00 01 02 03  04 05 06 07
| emitting 12 zero bytes of length of truncated HMAC into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| data before encryption:
|   00 00 00 08  01 00 00 00  00 01 02 03  04 05 06 07
| data after encryption:
|   30 93 b3 5a  b6 84 ca 8e  78 4d 0a ad  cd f7 e3 3e
| data being hmac:  80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 25 00  00 00 00 01  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   30 93 b3 5a  b6 84 ca 8e  78 4d 0a ad  cd f7 e3 3e
| out calculated auth:
|   fd 30 bf 12  d9 12 40 40  15 97 2e 9e
sending 76 bytes for ikev2_delete_out through eth0:500 to 93.184.216.34:500 (using #1)
|   80 01 02 03  04 05 06 07  64 0a 06 43  5c 7c 4b 31
|   2e 20 25 00  00 00 00 01  00 00 00 4c  2a 00 00 30
|   80 01 02 03  04 05 06 07  08 09 0a 0b  0c 0d 0e 0f
|   30 93 b3 5a  b6 84 ca 8e  78 4d 0a ad  cd f7 e3 3e
|   fd 30 bf 12  d9 12 40 40  15 97 2e 9e
|
| List of X.509 End Certificates:
|
| NOW, count: 1
|        subject: 'C=CH, O=Linux strongSwan, CN=moon.strongswan.org'
|        issuer:  'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
|        serial:   2b
|        pubkey:   2048 RSA Key AwEAAaR8B
|        validity: not before Aug 27 14:44:56 UTC 2014 ok
|                  not after  Aug 26 14:44:56 UTC 2019 ok
|        subjkey:  d8:26:3d:21:ec:7c:db:be:5a:39:0c:5b:70:cb:03:80:21:de:ae:13
|        authkey:  5d:a7:dd:70:06:51:32:7e:e7:b6:6d:b3:b5:e5:e0:60:ea:2e:4d:ef
|        aserial:  00
./wrongcacert leak: ikev2_inI2outR2 KE, item size: X
./wrongcacert leak: reply packet, item size: X
./wrongcacert leak: ikev2_inI1outR1 KE, item size: X
./wrongcacert leak: msg_digest, item size: X
./wrongcacert leak: keep id name, item size: X
./wrongcacert leak: ID host_pair, item size: X
./wrongcacert leak: host_pair, item size: X
./wrongcacert leak: ca string, item size: X
./wrongcacert leak: host ip, item size: X
./wrongcacert leak: ca string, item size: X
./wrongcacert leak: keep id name, item size: X
./wrongcacert leak: connection name, item size: X
./wrongcacert leak: issuer dn, item size: X
./wrongcacert leak: keep id name, item size: X
./wrongcacert leak: pubkey entry, item size: X
./wrongcacert leak: pubkey, item size: X
./wrongcacert leak: issuer dn, item size: X
./wrongcacert leak: keep id name, item size: X
./wrongcacert leak: pubkey entry, item size: X
./wrongcacert leak: pubkey, item size: X
./wrongcacert leak: 2 * generalName, item size: X
./wrongcacert leak: x509cert, item size: X
./wrongcacert leak: host cert, item size: X
./wrongcacert leak: certificate filename, item size: X
./wrongcacert leak: struct connection, item size: X
./wrongcacert leak: alg_info_ike, item size: X
./wrongcacert leak: 2 * id list, item size: X
./wrongcacert leak: secret, item size: X
./wrongcacert leak: policies path, item size: X
./wrongcacert leak: ocspcerts path, item size: X
./wrongcacert leak: aacerts path, item size: X
./wrongcacert leak: certs path, item size: X
./wrongcacert leak: private path, item size: X
./wrongcacert leak: crls path, item size: X
./wrongcacert leak: cacert path, item size: X
./wrongcacert leak: acert path, item size: X
./wrongcacert leak: override ipsec.d, item size: X
./wrongcacert leak: 2 * hasher name, item size: X
./wrongcacert leak: policies path, item size: X
./wrongcacert leak: ocspcerts path, item size: X
./wrongcacert leak: aacerts path, item size: X
./wrongcacert leak: certs path, item size: X
./wrongcacert leak: private path, item size: X
./wrongcacert leak: crls path, item size: X
./wrongcacert leak: cacert path, item size: X
./wrongcacert leak: acert path, item size: X
./wrongcacert leak: default conf var_dir, item size: X
./wrongcacert leak: default conf conffile, item size: X
./wrongcacert leak: default conf ipsecd_dir, item size: X
./wrongcacert leak: default conf ipsec_conf_dir, item size: X
./wrongcacert leak detective found Z leaks, total size X
Pre-amble (offset: X): #!-pluto-whack-file- recorded on FOO
