From owner-freebsd-stable@FreeBSD.ORG Thu Jan 1 04:36:44 2015 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8D473B5C for ; Thu, 1 Jan 2015 04:36:44 +0000 (UTC) Received: from mail-ig0-x22f.google.com (mail-ig0-x22f.google.com [IPv6:2607:f8b0:4001:c05::22f]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CBEC6718F for ; Thu, 1 Jan 2015 04:36:44 +0000 (UTC) Received: by mail-ig0-f175.google.com with SMTP id h15so14363666igd.2 for ; Wed, 31 Dec 2014 20:36:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=YfINDr4rMpSPPDsw0Yeg16xzBPBHuX/P+225GNZO0G0=; b=kiOjobSOyxr+JXIsvzunLa/Ed488ErK44pZBfotvqQsrMiFzK8H911oJfkWNk1F8vR /VXgHEoygF2xQq1l19J18G7ESko61Czyojs4WdXKrLbnGBUihRtoQnI0SmaWJJcuVYz4 yqifzIA5tTIQ0f/YGE6/3nLhQ1f6ZkvXA6CfooCTo8fdLIMyrJy+It0Oe183XZIK5r/e bMNQ1PJiSe40ynalNYFOKCjTnXJRVVRGoKifI2L3UH/tMUz7oW0nPz14LqFwHA9nz2mu i+1754tponbCZuPzk1NLo6tc3GQbWdHgRzYL395Un5gTtv7lM7xEQmEriA8Om+kohvGo orrw== MIME-Version: 1.0 X-Received: by 10.107.19.71 with SMTP id b68mr62359576ioj.66.1420087003499; Wed, 31 Dec 2014 20:36:43 -0800 (PST) Received: by 10.64.126.133 with HTTP; Wed, 31 Dec 2014 20:36:43 -0800 (PST) Date: Wed, 31 Dec 2014 22:36:43 -0600 Message-ID: Subject: IPSec and racoon issue... From: Chris Watson To: freebsd-stable@freebsd.org Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Jan 2015 04:36:44 -0000 So I have been running a stable ipsec tunnel between my MacBook Pro and a FreeBSD 10-stable server, I just rebuilt world today and raccoon has become pissy and refuses to start, and as usual with ipsec, debugging it is like winning gold in the pain olympics. So here's the issue, my working config has not changed at all. I'm simply running a new FreeBSD 10-stable r276472 world + kernel. I have looked all over at UPDATING, source commits to stable, google, etc and I can't figure this error out. Anytime I try to start racoon it looks like it starts but it doesn't. The only error I can get is to run it with "racoon -F -ddd -f /usr/local/etc/racoon/racoon.conf", and I get the following "ERROR: libipsec failed pfkey open (Address family not supported by protocol family) racoon: failed to initialize pfkey socket" Doing a "setkey -F" produces "pfkey_open: Address family not supported by protocol family" I saw that ae made some commits to stable during december that touched ipsec but they looked benign. Has anyone seen this before? Pointers? A general direction for a clue? Chris