I’m sure people have got better things to do than DOS my router or my VPN provider (famous last words)
Looks to me like the negotiation seems fine right up until ’ INTERNAL_ADDRESS_FAILURE’ , then it bails and deletes the SA.
From what I can find in the Cisco documentation, this is likely to be a server-side problem;
“If the client requests an IPv4 address and the RA server is unable to assign an address, an INTERNAL_ADDRESS_FAILURE message is returned to the client.”
15:13:55 system,info ipsec peer changed by dickie
15:13:57 ipsec,debug 0.0.0.0[500] used as isakmp port (fd=20)
15:13:57 ipsec,debug 0.0.0.0[4500] used as isakmp port with NAT-T (fd=22)
15:13:57 ipsec,debug ::[500] used as isakmp port (fd=23)
15:13:57 ipsec,debug ::[4500] used as isakmp port (fd=24)
15:13:57 system,info ipsec peer changed by dickie
15:13:58 ipsec ike2 starting for: 104.237.61.xx
15:13:59 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c 00004005 d3374469 6485836b 82a303a9 26496b3a 433d9bad
15:13:59 ipsec adding notify: NAT_DETECTION_SOURCE_IP
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c 00004004 8e74ed29 a8fb568c 43b02767 4ad0689b ec822b05
15:13:59 ipsec adding payload: NONCE
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c fbe37f26 fa677dd0 726db339 9c0ae7e4 8e46d8e9 91b10d1e
15:13:59 ipsec adding payload: KE
15:13:59 ipsec,debug => (first 0x100 of 0x108)
15:13:59 ipsec,debug 00000108 000e0000 c0b5185c 42e455bb 00f43119 755db536 fdcde507 f317e71a
15:13:59 ipsec,debug fe2fc0aa a8d5086d 8257e894 957813d5 54bd869a a09d6466 7a5543b8 0cdbc1bb
15:13:59 ipsec,debug 51f53a98 0335ba1f 1a39c634 db55cd31 26f3649e dddb99de e140aa6e f3261f27
15:13:59 ipsec,debug 6c7ae134 3669b29d 59ff4638 9987f959 1c4e83ea 50c90dda 69433ebd 74be2ad1
15:13:59 ipsec,debug 70a68ec9 0d1b62ec 7841d4b1 65639897 32637446 d06b078a a577f8a7 c7ea5c9f
15:13:59 ipsec,debug 135d470e 3642d4df 3ea97767 82f9a0d5 61859f70 054d9736 1b232cfb bc90187c
15:13:59 ipsec,debug b27f243e 73c02b33 347a6df0 7c5dc77e 521a62df f0821cad 07259949 35643bad
15:13:59 ipsec,debug bb13fb86 fcadbef7 a28b2bfd ecf2a594 ad38ce0b 79288ab4 74cdb642 1fa38fec
15:13:59 ipsec adding payload: SA
15:13:59 ipsec,debug => (size 0x58)
15:13:59 ipsec,debug 00000058 00000054 01010008 0300000c 0100000c 800e0100 0300000c 0100000c
15:13:59 ipsec,debug 800e00c0 0300000c 0100000c 800e0080 03000008 01000003 03000008 02000002
15:13:59 ipsec,debug 03000008 03000002 03000008 0400000e 00000008 04000002
15:13:59 ipsec <- ike2 request, exchange: SA_INIT:0 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== sending 464 bytes from 70.95.93.yy[4500] to 104.237.61.xx[4500]
15:13:59 ipsec,debug 1 times of 468 bytes message will be sent to 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== received 38 bytes from 104.237.61.xx[4500] to 70.95.93.yy[4500]
15:13:59 ipsec -> ike2 reply, exchange: SA_INIT:0 104.237.61.xx[4500]
15:13:59 ipsec payload seen: NOTIFY
15:13:59 ipsec first payload is NOTIFY
15:13:59 ipsec processing payloads: NOTIFY
15:13:59 ipsec notify: INVALID_KE_PAYLOAD
15:13:59 ipsec,debug 0002
15:13:59 ipsec retrying with different KE value
15:13:59 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c 00004005 d3374469 6485836b 82a303a9 26496b3a 433d9bad
15:13:59 ipsec adding notify: NAT_DETECTION_SOURCE_IP
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c 00004004 8e74ed29 a8fb568c 43b02767 4ad0689b ec822b05
15:13:59 ipsec adding payload: NONCE
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c fbe37f26 fa677dd0 726db339 9c0ae7e4 8e46d8e9 91b10d1e
15:13:59 ipsec adding payload: KE
15:13:59 ipsec,debug => (size 0x88)
15:13:59 ipsec,debug 00000088 00020000 bb13ffd6 1d6adad6 12fc9324 40024c6c 47aab604 1377eab0
15:13:59 ipsec,debug f94d8d0f 46d69fe0 213cd490 bd82f853 f6de05e3 5cedb32c 90e11cc6 fcaa1142
15:13:59 ipsec,debug 0ec55e42 27adf9b5 90b2589c 65c3ed91 72b335c8 f7b9b06e 70a4f7f1 288975e0
15:13:59 ipsec,debug 827b3413 6cb4e92d f53f0e0d c5e12332 c48187ad cc97a991 8c0141af f341d384
15:13:59 ipsec,debug 5e8ea69c 0437a237
15:13:59 ipsec adding payload: SA
15:13:59 ipsec,debug => (size 0x50)
15:13:59 ipsec,debug 00000050 0000004c 01010007 0300000c 0100000c 800e0100 0300000c 0100000c
15:13:59 ipsec,debug 800e00c0 0300000c 0100000c 800e0080 03000008 01000003 03000008 02000002
15:13:59 ipsec,debug 03000008 03000002 00000008 04000002
15:13:59 ipsec,debug ===== sending 328 bytes from 70.95.93.yy[4500] to 104.237.61.xx[4500]
15:13:59 ipsec,debug 1 times of 332 bytes message will be sent to 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== received 312 bytes from 104.237.61.xx[4500] to 70.95.93.yy[4500]
15:13:59 ipsec -> ike2 reply, exchange: SA_INIT:0 104.237.61.xx[4500]
15:13:59 ipsec ike2 initialize recv
15:13:59 ipsec payload seen: SA
15:13:59 ipsec payload seen: KE
15:13:59 ipsec payload seen: NONCE
15:13:59 ipsec payload seen: NOTIFY
15:13:59 ipsec payload seen: NOTIFY
15:13:59 ipsec payload seen: NOTIFY
15:13:59 ipsec processing payload: NONCE
15:13:59 ipsec processing payload: SA
15:13:59 ipsec IKE Protocol: IKE
15:13:59 ipsec proposal #1
15:13:59 ipsec enc: aes128-cbc
15:13:59 ipsec prf: hmac-sha1
15:13:59 ipsec auth: sha1
15:13:59 ipsec dh: modp1024
15:13:59 ipsec matched proposal:
15:13:59 ipsec proposal #1
15:13:59 ipsec enc: aes128-cbc
15:13:59 ipsec prf: hmac-sha1
15:13:59 ipsec auth: sha1
15:13:59 ipsec dh: modp1024
15:13:59 ipsec processing payload: KE
15:13:59 ipsec,debug => shared secret (size 0x80)
15:13:59 ipsec,debug 79a3a68b 069a84c4 56a07a47 70103cd5 8d0208a7 17df04ce 84d5d1c4 9ef215a9
15:13:59 ipsec,debug 1fdee9a0 749b6252 5a16ab33 59990932 38ef75af 57479f58 da348a2d e6dbd278
15:13:59 ipsec,debug d969c87d 8494abeb 2e969679 75932c66 866e57ea 9f77f28c 4545e837 6eb1810e
15:13:59 ipsec,debug f641d1aa f3d69fdc 09fa9087 e8b214d5 eb1f0468 cc620cfb d2aac12b 94fb22f1
15:13:59 ipsec,debug => skeyseed (size 0x14)
15:13:59 ipsec,debug aacbcff4 e8cfe886 6be7cbdf e139119b 0bba9881
15:13:59 ipsec,debug => keymat (size 0x14)
15:13:59 ipsec,debug e18eb248 fa61b812 73fc848b bda4e683 43f832e5
15:13:59 ipsec,debug => SK_ai (size 0x14)
15:13:59 ipsec,debug fad662c6 0773a513 fe7022b7 620db55f 32b0682e
15:13:59 ipsec,debug => SK_ar (size 0x14)
15:13:59 ipsec,debug edd0efb1 1b201041 86bd672d c530cf66 1e94e9d2
15:13:59 ipsec,debug => SK_ei (size 0x10)
15:13:59 ipsec,debug 63523673 85eace01 a1ba9762 9432625c
15:13:59 ipsec,debug => SK_er (size 0x10)
15:13:59 ipsec,debug 997d4fae d379dbc8 1d2901fb 0308ca28
15:13:59 ipsec,debug => SK_pi (size 0x14)
15:13:59 ipsec,debug 354178cc 18d165cf 1c53a8db 520a27c4 9008edc1
15:13:59 ipsec,debug => SK_pr (size 0x14)
15:13:59 ipsec,debug 836b8ba2 acb413bd c5be0193 8fcd3df8 3ce26b40
15:13:59 ipsec,info new ike2 SA (I): 70.95.93.yy[4500]-104.237.61.xx[4500] spi:7b01fb40cb21c1da:2f62510ec7d645bd
15:13:59 ipsec processing payloads: NOTIFY
15:13:59 ipsec notify: NAT_DETECTION_SOURCE_IP
15:13:59 ipsec,debug 2fa4c5d17e822dcd4d7bed81eb881114d01f6068
15:13:59 ipsec notify: NAT_DETECTION_DESTINATION_IP
15:13:59 ipsec,debug da13aecc163464becc33b89d773159adab61157b
15:13:59 ipsec notify: MULTIPLE_AUTH_SUPPORTED
15:13:59 ipsec (NAT-T) REMOTE
15:13:59 ipsec KA list add: 70.95.93.yy[4500]->104.237.61.xx[4500]
15:13:59 ipsec init child
15:13:59 ipsec init child continue
15:13:59 ipsec offering proto: 3
15:13:59 ipsec proposal #1
15:13:59 ipsec enc: aes256-cbc
15:13:59 ipsec enc: aes192-cbc
15:13:59 ipsec enc: aes128-cbc
15:13:59 ipsec auth: sha512
15:13:59 ipsec auth: sha256
15:13:59 ipsec auth: sha1
15:13:59 ipsec my ID (ADDR): 70.95.93.yy
15:13:59 ipsec processing payload: NONCE
15:13:59 ipsec,debug => auth nonce (size 0x20)
15:13:59 ipsec,debug cbcd54c3 db0bc9f5 0d271885 881f934a 282dab31 3bba1867 5cf82aa5 dc6a16b0
15:13:59 ipsec,debug => SK_p (size 0x14)
15:13:59 ipsec,debug 354178cc 18d165cf 1c53a8db 520a27c4 9008edc1
15:13:59 ipsec,debug => idhash (size 0x14)
15:13:59 ipsec,debug 5986657a 77ded0f1 d4df496a e908aa35 d28c184b
15:13:59 ipsec,debug => my auth (size 0x14)
15:13:59 ipsec,debug a1860237 18035dc2 46d5fe99 eec7eba8 dfb4f4a3
15:13:59 ipsec adding payload: ID_I
15:13:59 ipsec,debug => (size 0xc)
15:13:59 ipsec,debug 0000000c 01000000 465f5d81
15:13:59 ipsec adding payload: AUTH
15:13:59 ipsec,debug => (size 0x1c)
15:13:59 ipsec,debug 0000001c 02000000 a1860237 18035dc2 46d5fe99 eec7eba8 dfb4f4a3
15:13:59 ipsec adding notify: INITIAL_CONTACT
15:13:59 ipsec,debug => (size 0x8)
15:13:59 ipsec,debug 00000008 00004000
15:13:59 ipsec adding payload: SA
15:13:59 ipsec,debug => (size 0x54)
15:13:59 ipsec,debug 00000054 00000050 01030407 0d116024 0300000c 0100000c 800e0100 0300000c
15:13:59 ipsec,debug 0100000c 800e00c0 0300000c 0100000c 800e0080 03000008 0300000e 03000008
15:13:59 ipsec,debug 0300000c 03000008 03000002 00000008 05000000
15:13:59 ipsec initiator selector: 0.0.0.0/0
15:13:59 ipsec adding payload: TS_I
15:13:59 ipsec,debug => (size 0x18)
15:13:59 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff
15:13:59 ipsec responder selector: 0.0.0.0/0
15:13:59 ipsec adding payload: TS_R
15:13:59 ipsec,debug => (size 0x18)
15:13:59 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff
15:13:59 ipsec prepearing internal IPv4 address
15:13:59 ipsec prepearing internal IPv4 netmask
15:13:59 ipsec prepearing internal IPv6 subnet
15:13:59 ipsec prepearing internal IPv4 DNS
15:13:59 ipsec adding payload: CONFIG
15:13:59 ipsec,debug => (size 0x2c)
15:13:59 ipsec,debug 0000002c 01000000 00010004 00000000 00020004 00000000 000d0008 00000000
15:13:59 ipsec,debug 00000000 00030004 00000000
15:13:59 ipsec <- ike2 request, exchange: AUTH:1 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== sending 412 bytes from 70.95.93.yy[4500] to 104.237.61.xx[4500]
15:13:59 ipsec,debug 1 times of 416 bytes message will be sent to 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== received 124 bytes from 104.237.61.xx[4500] to 70.95.93.yy[4500]
15:13:59 ipsec -> ike2 reply, exchange: AUTH:1 104.237.61.xx[4500]
15:13:59 ipsec payload seen: ENC
15:13:59 ipsec processing payload: ENC
15:13:59 ipsec,debug => iv (size 0x10)
15:13:59 ipsec,debug 0ffc9c1a e3a84502 7bfdebc5 1a19b4b4
15:13:59 ipsec,debug => plain payload (trimmed) (size 0x30)
15:13:59 ipsec,debug 2700000c 01000000 68ed3d02 2900001c 02000000 c41c8a62 ba0d3298 0b6ba1f0
15:13:59 ipsec,debug 1a7d2363 3ec90eeb 00000008 00000024
15:13:59 ipsec,debug decrypted
15:13:59 ipsec payload seen: ID_R
15:13:59 ipsec payload seen: AUTH
15:13:59 ipsec payload seen: NOTIFY
15:13:59 ipsec ike auth: initiator finish
15:13:59 ipsec processing payloads: NOTIFY
15:13:59 ipsec notify: INTERNAL_ADDRESS_FAILURE
15:13:59 ipsec got error: INTERNAL_ADDRESS_FAILURE
15:13:59 ipsec processing payloads: ID_R
15:13:59 ipsec peer ID (ADDR4): 104.237.61.xx
15:13:59 ipsec processing payload: AUTH
15:13:59 ipsec,debug => peer's auth (size 0x14)
15:13:59 ipsec,debug c41c8a62 ba0d3298 0b6ba1f0 1a7d2363 3ec90eeb
15:13:59 ipsec,debug => auth nonce (size 0x18)
15:13:59 ipsec,debug fbe37f26 fa677dd0 726db339 9c0ae7e4 8e46d8e9 91b10d1e
15:13:59 ipsec,debug => SK_p (size 0x14)
15:13:59 ipsec,debug 836b8ba2 acb413bd c5be0193 8fcd3df8 3ce26b40
15:13:59 ipsec,debug => idhash (size 0x14)
15:13:59 ipsec,debug f120b0cb 7792d041 cab6caba 112afbbc c63d7fbf
15:13:59 ipsec,debug => calculated peer's AUTH (size 0x14)
15:13:59 ipsec,debug c41c8a62 ba0d3298 0b6ba1f0 1a7d2363 3ec90eeb
15:13:59 ipsec,info,account peer authorized: 70.95.93.yy[4500]-104.237.61.xx[4500] spi:7b01fb40cb21c1da:2f62510ec7d645bd
15:13:59 ipsec,info killing ike2 SA: 70.95.93.yy[4500]-104.237.61.xx[4500] spi:7b01fb40cb21c1da:2f62510ec7d645bd
15:13:59 ipsec adding payload: DELETE
15:13:59 ipsec,debug => (size 0x8)
15:13:59 ipsec,debug 00000008 01000000
15:13:59 ipsec <- ike2 request, exchange: INFORMATIONAL:2 104.237.61.xx[4500]
15:13:59 ipsec,debug ===== sending 252 bytes from 70.95.93.yy[4500] to 104.237.61.xx[4500]
15:13:59 ipsec,debug 1 times of 256 bytes message will be sent to 104.237.61.xx[4500]
15:13:59 ipsec KA remove: 70.95.93.yy[4500]->104.237.61.xx[4500]
15:13:59 ipsec,debug KA tree dump: 70.95.93.yy[4500]->104.237.61.xx[4500] (in_use=1)
15:13:59 ipsec,debug KA removing this one...
15:13:59 ipsec,debug ===== received 76 bytes from 104.237.61.xx[4500] to 70.95.93.yy[4500]
15:13:59 ipsec -> ike2 reply, exchange: INFORMATIONAL:2 104.237.61.xx[4500]
15:13:59 ipsec SPI dac121cb40fb017b not registred for 104.237.61.xx[4500]