I have upgraded 2 out of 3 test machines to the latest nightly build. I've got problem with ipsec connection after the upgrade. I've got the following log from the not-upgraded machine:
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #43: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #43: starting keying attempt 12 of an unlimited number
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #44: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP to replace #43 {using isakmp#14}
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [XAUTH]
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [Dead Peer Detection]
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [RFC 3947]
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #45: responding to Main Mode
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #45: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, (null)] refused due to strict flag
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #45: no acceptable Oakley Transform
Jun 7 14:36:40 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #45: sending notification NO_PROPOSAL_CHOSEN to 10.201.0.1:500
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [XAUTH]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [Dead Peer Detection]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [RFC 3947]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #46: responding to Main Mode
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #46: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, (null)] refused due to strict flag
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #46: no acceptable Oakley Transform
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #46: sending notification NO_PROPOSAL_CHOSEN to 10.201.0.1:500
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [XAUTH]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: received Vendor ID payload [Dead Peer Detection]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [RFC 3947]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #47: responding to Main Mode
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #47: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, (null)] refused due to strict flag
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #47: no acceptable Oakley Transform
Jun 7 14:36:41 RSYYYY-1 pluto[2828]: "peer-10.201.0.1-tunnel-vti" #47: sending notification NO_PROPOSAL_CHOSEN to 10.201.0.1:500
Jun 7 14:37:02 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jun 7 14:37:19 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #48: initiating Main Mode to replace #14
Jun 7 14:37:19 RSYYYY-1 pluto[2828]: packet from 10.201.2.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jun 7 14:37:29 RSYYYY-1 pluto[2828]: packet from 10.201.2.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jun 7 14:37:42 RSYYYY-1 pluto[2828]: packet from 10.201.0.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jun 7 14:37:49 RSYYYY-1 pluto[2828]: packet from 10.201.2.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jun 7 14:37:50 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #44: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Jun 7 14:37:50 RSYYYY-1 pluto[2828]: "peer-10.201.2.1-tunnel-vti" #44: starting keying attempt 13 of an unlimited numberIt would be great if this can be fixed.