> Synopsis:     iked leaves behind pf state entries for NAT-T (UDP 4500) upon 
> stopping
> Category:     bin
> Description:
When stopping iked with `rcctl stop iked`, the service leaves behind pf state 
entries for NAT-T (UDP 4500) that prevent normal network connectivity until 
they expire naturally (observed timeout ~1 minute).

Example state entry that persists:
all udp <client-lan-ip>:4500 <- <server-wan-ip>:4500       MULTIPLE:MULTIPLE
age 00:03:15, expires in 00:00:59, 637:7 pkts, 111222:365 bytes, rule 1
id: 6755c8e800001230 creatorid: 7078d876

IMPACT:
After stopping iked, connectivity to VPN endpoints remains broken until these 
state entries expire naturally. This prevents immediate restoration of normal 
network routing (ssh, ping, etc.) even after the VPN service is stopped.

> How-To-Repeat:
1. Start iked with a configured VPN connection `iked -v -d`
2. Stop iked `ctl-c`
3. Observe persistent pf state entry for UDP 4500 `pfctl -vvv -s states | fgrep 
-A 2 4500`
4. Connectivity to VPN endpoint remains broken until state expires or killed 
with `pfctl -k id -k <state-id>`

Reply via email to