Good morning misc, I upgraded two devices from i386-4.6 to i386-snapshot-feb28. After the upgrade snapshot boxes are unable to communicate with the 4.6 devices when going through ipsec. snapshot-snapshot works fine.
Everything looks ok except that nothing shows up on enc0 when doing 4.6<-->snapshot. Deleting the SA's restores connectiviy, unencrypted of course. Is this a known issue ? /T bmr1.jfa: 212.112.186.174 (4.6) bmr1.brh: 212.188.183.71 (snapshot) --- bmr1.jfa# ipsecctl -sa | grep 212.188.183.71 flow esp in from 212.188.183.71 to 212.112.186.174 peer 212.188.183.71 srcid 212.112.186.174/32 dstid 212.188.183.71/32 type use flow esp out from 212.112.186.174 to 212.188.183.71 peer 212.188.183.71 srcid 212.112.186.174/32 dstid 212.188.183.71/32 type require esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth hmac-sha2-256 enc aes esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth hmac-sha2-256 enc aes bmr1.jfa# bmr1.brh# ipsecctl -sa | grep 212.112.186.174 flow esp in from 212.112.186.174 to 212.188.183.71 peer 212.112.186.174 srcid 212.188.183.71/32 dstid 212.112.186.174/32 type use flow esp out from 212.188.183.71 to 212.112.186.174 peer 212.112.186.174 srcid 212.188.183.71/32 dstid 212.112.186.174/32 type require esp transport from 212.188.183.71 to 212.112.186.174 spi 0x3f91b3c2 auth hmac-sha2-256 enc aes esp transport from 212.112.186.174 to 212.188.183.71 spi 0xa797ec1e auth hmac-sha2-256 enc aes bmr1.brh# bmr1.brh# pfctl -d pf disabled bmr1.brh# tcpdump -n -p -i vlan301 host 212.112.186.174 & [1] 2099 bmr1.brh# tcpdump: listening on vlan301, link-type EN10MB bmr1.brh# tcpdump -n -p -i enc0 & [2] 23922 bmr1.brh# tcpdump: listening on enc0, link-type ENC bmr1.brh# bmr1.jfa# tcpdump -n -p -i bge0 host 212.188.183.71 & [1] 443 bmr1.jfa# tcpdump: listening on bge0, link-type EN10MB bmr1.jfa# tcpdump -n -p -i enc0 & [2] 16714 bmr1.jfa# tcpdump: listening on enc0, link-type ENC bmr1.jfa# bmr1.jfa# ping 212.188.183.71 PING 212.188.183.71 (212.188.183.71): 56 data bytes 11:21:48.081933 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 > 212.188.183.71: icmp: echo request 11:21:48.081969 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 15 len 116 11:21:49.085937 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 > 212.188.183.71: icmp: echo request 11:21:49.085974 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16 len 116 11:21:50.095970 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 > 212.188.183.71: icmp: echo request 11:21:50.096006 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17 len 116 11:21:51.106010 (authentic,confidential): SPI 0x007e7833: 212.112.186.174 > 212.188.183.71: icmp: echo request 11:21:51.106045 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18 len 116 bmr1.brh# 10:21:48.102134 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 15 len 116 10:21:49.106079 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 16 len 116 10:21:50.116146 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 17 len 116 10:21:51.126213 esp 212.112.186.174 > 212.188.183.71 spi 0x007e7833 seq 18 len 116 ---- bmr1.jfa# grep 212.188.183.71 /etc/ipsec.conf ike esp transport from 212.112.186.174 to 212.188.183.71 bmr1.brh# grep 212.112.186.174 /etc/ipsec.conf ike esp transport from 212.188.183.71 to 212.112.186.174