<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-kampati-ipsecme-ikev2-sa-ts-payloads-opt-05" category="std">

  <front>
    <title abbrev="IKEv2 Optional Child SA&amp;TS Payloads">IKEv2 Optional SA&amp;TS Payloads in Child Exchange</title>

    <author initials="S." surname="Kampati" fullname="Sandeep Kampati">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>Divyashree Techno Park, Whitefield</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560066</code>
          <country>India</country>
        </postal>
        <email>sandeepkampati@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhuatai District</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code></code>
          <country>China</country>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Bharath" fullname="Meduri S S Bharath">
      <organization abbrev="Mavenir">Mavenir Systems Pvt Ltd</organization>
      <address>
        <postal>
          <street>Manyata Tech Park</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code></code>
          <country>India</country>
        </postal>
        <email>bharath.meduri@mavenir.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization abbrev="CMCC">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street, West District</street>
          <city>Beijing</city>
          <region>Beijing</region>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="04"/>

    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method for reducing the size of the
Internet Key Exchange version 2 (IKEv2) exchanges at time of rekeying
IKE SAs and Child SAs by removing or making optional of SA &amp; TS
payloads. Reducing size of IKEv2 exchanges is desirable for low
power consumption battery powered devices. It also helps to avoid IP
fragmentation of IKEv2 messages.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The Internet Key Exchange protocol version 2 (IKEv2) specified in
<xref target="RFC7296"></xref> is used in the IP Security (IPSec) architecture for the
purposes of Security Association (SA) parameters negotiation and
authenticated key exchange. The protocol uses UDP as the transport
for its messages, which size varies from less than one hundred bytes
to several kilobytes.</t>

<t>According to <xref target="RFC7296"></xref>, the secret keys used by IKE/IPSec SAs should
be used only for a limited amount of time and to protect a limited
amount of data. When the lifetime of an SA expires or is about to
expire, the peers can rekey the SA to reestablish a new SA to take
the place of the old one.</t>

<t>For security gateways/ePDG in 4G networks and cRAN/Cloud in 5G
networks, they will support more than 100,000 IKE/IPSEC tunnels. So
on an average, for every second there may be hundreds or thousands of
IKE SAs and Child SAs that are rekeying. This takes huge amount of
bandwidth, packet fragmentation and more processing resources. For
these devices, these problems can be solved by introducing the
solution described in this document.</t>

<t>This is also useful in Internet of Things (IoT) devices which
utilizing lower power consumption technology. For
these devices, reducing the length of IKE/Child SA rekeying messages
can save the bandwidth consumption. At the same time, it can also
save the computing processes by less payload are included.</t>

<t>Most devices don’t prefer to change cryptographic suites frequently.
By taking this advantage the SA and TS payloads can be made optional
at the time of rekeying IKE SAs and Child SAs. In such situation,
only a new SPI value is needed to create the new IKE SA and Child SA.
So a new Notify payload which contains the needed SPI value can be
sent instead of the SA and TS payloads.</t>

<t>In case of rekeying IKE SAs, the SA payloads can be optimized if
there is no change of cryptographic suites. In case of rekeying
Child SAs, the SA and TS payloads can be optimized if there is no
change of cryptographic suites and ACL configuration.</t>

</section>
<section anchor="conventions-used-in-this-document" title="Conventions Used in This Document">

<section anchor="requirements-language" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
</section>
<section anchor="protocol-details" title="Protocol Details">

<t>This section provides protocol details and contains the normative
parts.</t>

<t>Before using this new optimization, the IPSec implementation who
supports it has to know that the peer also supports it. Without the
support on both sides, the optimized rekeying messages sent by one
peer may be unrecognizable for the other peer. To prevent this failure
from happening, the first step is to negotiate the support of this
optimization between the two peers. There are two specific rekeying
SAs cases: rekeying IKE SAs and rekeying Child SAs. After the
negotiation, the initiator can optimize the rekeying message payloads
in both cases. In other words, once the negotiation of support for
optimizing payloads at rekeying IKE SAs and Child SAs is complete,
both IKE SAs and Child SAs rekeying are supported by the two sides.
The responder can react based on the received rekeying message.</t>

<section anchor="negotiation" title="Negotiation of Support for Optimizing Payloads at Rekeying IKE SAs and Child SAs">

<t>The initiator indicates its support for optimizing payloads
at rekeying IKE SAs and Child SAs by including a Notify payload of
type MINIMAL_REKEY_SUPPORTED in the IKE_AUTH request message. By
observing the MINIMAL_REKEY_SUPPORTED notification in the received
message, the responder can deduce the initiator’s support of this
extension. If the responder also supports this extension, it
includes the MINIMAL_REKEY_SUPPORTED notification in the
corresponding response message. After receiving the response
message, the initiator can also know the support of this extension of
the responder side.</t>

<t>The IKE_AUTH message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(MINIMAL_REKEY_SUPPORTED)} -->
                              <-- HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr,
                                      N(MINIMAL_REKEY_SUPPORTED)}
]]></artwork></figure>

<t>If the responder doesn’t support this extension, it MUST ignore the
MINIMAL_REKEY_SUPPORTED notification sent by the initiator and MUST
NOT respond error to the initiator. With no MINIMAL_REKEY_SUPPORTED
notification in the response message, the initiator can deduce that
the responder doesn’t support this extension. In this case, the IKE
SAs and Child SAs rekeyings happen as the usual way without the
optimizations defined in this document.</t>

<t>The IKE_AUTH message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(MINIMAL_REKEY_SUPPORTED)} -->
                              <-- HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr}
]]></artwork></figure>

</section>
<section anchor="payload-optimization-at-rekeying-ike-sas" title="Payload Optimization at Rekeying IKE SAs">

<t>The payload optimization at rekeying IKE SAs MUST NOT be used unless
both peers have indicated their support of this extension by using
the negotiation method described in <xref target="negotiation"/>.</t>

<t>At the time of rekeying an IKE SA, when the initiator determines
there is no change on its cryptographic suites since this IKE SA was
created or last rekeyed, it MUST send the REKEY_OPTIMIZED notification
payload instead of the SA payloads in the rekeying request message.
In this REKEY_OPTIMIZED notification, it contains the initiator’s new
Security Parameter Index (SPI) used for creating the new IKE SA.</t>

<t>After receiving the initiator’s rekeying request message with the
REKEY_OPTIMIZED notification and no SA payloads, the responder knows
that the initiator wants to optimize the rekeying payload. Then when
it determines that there is also no change in its cryptographic
suites, the responder MUST send the rekeying respond message to the
initiator with the REKEY_OPTIMIZED notification payload instead of the
SA payloads. In this REKEY_OPTIMIZED notification, it contains the
responder’s new SPI used for creating the new IKE SA.</t>

<t>According to the initiator’s new SPI and the responder’s new SPI, the
initiator and the responder can rekey the IKE SA on both sides.</t>

<t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(REKEY_OPTIMIZED),
    Ni, KEi} -->
                              <-- HDR, SK {N(REKEY_OPTIMIZED),
                                      Nr, KEr}
]]></artwork></figure>

<t>The initiator sends a REKEY_OPTIMIZED notification payload, a Nonce
payload and a Diffie-Hellman value in the KEi payload. A new
initiator SPI is supplied in the SPI field of the REKEY_OPTIMIZED
notification payload.
These messages also follow the original Perfect Forwarding Secrecy (PFS)
with the signature and encryption algorithms used as last message.</t>

<t>The responder replies (using the same Message ID to respond) with a
REKEY_OPTIMIZED notification payload, a Nonce payload and a Diffie-Hellman
value in the KEr payload. A new responder SPI is supplied in
the SPI field of the REKEY_OPTIMIZED notification payload.</t>

<t>This REKEY_OPTIMIZED notification MUST be included in a CREATE_CHILD_SA
exchange message when there is no SA payloads included. When the
REKEY_OPTIMIZED notification payload is included, the SA payload MUST
NOT be included.</t>

</section>
<section anchor="payload-optimization-at-rekeying-child-sas" title="Payload Optimization at Rekeying Child SAs">

<t>The payload optimization at rekeying Child SAs MUST NOT be used
unless both peers have indicated their support of this extension by
using the negotiation method described in <xref target="negotiation"/>.</t>

<t>At the time of rekeying a Child SA, when the initiator determines
there is no change in its cryptographic suites and ACL configuration
since this Child SA was created or last rekeyed, it MUST send the
REKEY_OPTIMIZED notification payload instead of the SA and TS
payloads in the rekeying request message. In this REKEY_OPTIMIZED
notification, it contains the initiator’s new Security Parameter
Index (SPI) used for creating the new Child SA.</t>

<t>After receiving the initiator’s rekeying request message with the
REKEY_OPTIMIZED notification and no SA and TS payloads, the responder
knows that the initiator wants to optimize the rekeying payload.
Then when it determines that there is also no change in its
cryptographic suites and ACL configuration, the responder MUST send
the rekeying respond message to the initiator with the
REKEY_OPTIMIZED notification payload instead of the SA and TS
payloads. In this REKEY_OPTIMIZED notification, it contains the
responder’s new SPI used for creating the new Child SA.</t>

<t>According to the old SPIs included in the REKEY_SA payloads and
the new SPIs included in the REKEY_OPTIMIZED payloads, the
initiator and the responder can rekey the Child SA on both sides.</t>

<t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(REKEY_SA), N(REKEY_OPTIMIZED),
    Ni, [KEi,]} -->
                              <-- HDR, SK {N(REKEY_OPTIMIZED),
                                      Nr, [KEr,]}
]]></artwork></figure>

<t>This REKEY_OPTIMIZED notification MUST be included in a
CREATE_CHILD_SA exchange message when there is no SA and TS payloads
included at the time of rekeying Child SAs. When the REKEY_OPTIMIZED
notification payload is included, the SA and TS payloads MUST NOT be
included.</t>

</section>
</section>
<section anchor="payload-formats" title="Payload Formats">

<section anchor="minimalrekeysupported-notification" title="MINIMAL_REKEY_SUPPORTED Notification">

<t>The MINIMAL_REKEY_SUPPORTED notification is used by the initiator and
responder to inform their ability of optimizing payloads at
the time of rekeying IKE SAs and Child SAs to the peers. It is
formatted as follows:</t>

<figure><artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Protocol ID (1 octet) - MUST be 0.</t>
  <t>SPI Size (1 octet) - MUST be 0, meaning no SPI is present.</t>
  <t>Notify Message Type (2 octets) - MUST be &lt;Need to get value from IANA&gt;, the value assigned for the MINIMAL_REKEY_SUPPORTED notification.</t>
</list></t>

<t>This notification contains no data.</t>

</section>
<section anchor="rekeyoptimized-notification" title="REKEY_OPTIMIZED Notification">

<t>The REKEY_OPTIMIZED notification is used to replace the SA payloads at
the time of rekeying IKE SAs when there is no change of cryptographic
suites in initiator and responder, and to replace the SA payloads and
TS payloads at the time of rekeying Child SAs when there is no change
of cryptographic suites and ACL configuration in initiator and responder.
It is formatted as follows:</t>

<figure><artwork><![CDATA[
 0                 1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Protocol ID    | SPI Size (=8) |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Security Parameter Index (SPI)                 |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Protocol ID (1 octet) - MUST be 1.</t>
  <t>SPI Size (1 octet) - MUST be 8 when used at the time of rekeying IKE SAs and be 4 when used at the time of rekeying Child SAs.</t>
  <t>Notify Message Type (2 octets) - MUST be &lt;Need to get value from IANA&gt;, the value assigned for the REKEY_OPTIMIZED notification.</t>
  <t>SPI (4 octets or 8 octets) - Security Parameter Index. The initiator sends initiator SPI. The responder sends responder SPI.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document defines two new Notify Message Types in the “IKEv2
Notify Message Types - Status Types” registry. IANA is requested to
assign codepoints in this registry.</t>

<figure><artwork><![CDATA[
NOTIFY messages: status types            Value
----------------------------------------------------------
MINIMAL_REKEY_SUPPORTED                  TBD
REKEY_OPTIMIZED                          TBD
]]></artwork></figure>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>When using the payload optimization defined in this document, the rekeying of IKE SAs and Child SAs are using the same cryptographic suites.
If changes to the configurations are wanted, such as supporting a new cryptographic algorithm, the rekeying won’t apply these changes.
The initiator or responder should start a new IKE SA or Child SA to apply the new changes.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>Special thanks go to Paul Wouters, Valery Smyslov, and Antony Antony.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC7296" target='https://www.rfc-editor.org/info/rfc7296'>
<front>
<title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
<author initials='C.' surname='Kaufman' fullname='C. Kaufman'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='Y.' surname='Nir' fullname='Y. Nir'><organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'><organization /></author>
<author initials='T.' surname='Kivinen' fullname='T. Kivinen'><organization /></author>
<date year='2014' month='October' />
<abstract><t>This document describes version 2 of the Internet Key Exchange (IKE) protocol.  IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs).  This document obsoletes RFC 5996, and includes all of the errata for it.  It advances IKEv2 to be an Internet Standard.</t></abstract>
</front>
<seriesInfo name='STD' value='79'/>
<seriesInfo name='RFC' value='7296'/>
<seriesInfo name='DOI' value='10.17487/RFC7296'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

