But could you try to disable IPsec just for debugging purposes and try if OSPF works over GRE alone?
I currently set up a lab cause of wireguard reports with OSPF, I'll try to test this too
flags=links (type, id, data, metric) Point-To-Point 10.74.0.1 0.0.0.7 10 Stub 10.77.0.0 255.255.255.0 10
flags=links (type, id, data, metric) Point-To-Point 10.74.0.1 172.16.0.2 10 Stub 172.16.0.0 255.255.255.252 10 Stub 10.77.0.0 255.255.255.0 10
Current configuration:!frr version 7.4frr defaults traditionalhostname gw.dc.sipcolor.ru.sipcolor.rulog syslog notifications!router ospf ospf router-id 10.77.0.1 passive-interface bridge0 passive-interface vtnet0 passive-interface vtnet1 network 10.77.0.0/16 area 0.0.0.0 network 172.16.74.12/30 area 0.0.0.0!line vty!end
When you capture on GRE .. do you see OSPF packets in and out?
Type: Stub ID: 10.77.0.0 Data: 255.255.0.0 Metric: 10Type: PTP ID: 10.74.0.1 Data: 0.0.0.8 Metric: 10
Type: Stub ID: 10.77.0.0 Data: 255.255.0.0 Metric: 10Type: PTP ID: 10.74.0.1 Data: 172.16.74.14 Metric: 10Type: Stub ID: 172.16.74.12 Data: 255.255.255.252 Metric: 11
What is 172.16.255? 0.0.0.7 is a wildcard mask.
create a loopback and place all your devices in the same subnet for the loopback. place the loopback in the area 0. make sure your loopback is a passive interface.
flags=links (type, id, data, metric) Stub 10.77.0.0 255.255.0.0 10 Point-To-Point 172.16.255.74 0.0.0.8 10 Stub 172.16.255.77 255.255.255.255 0