<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2367 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2367.xml">
<!ENTITY RFC4034 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4301 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC5890 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml">
<!ENTITY RFC6698 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6698.xml">
<!ENTITY RFC6982 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6982.xml">
<!ENTITY RFC7296 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY RFC8174 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7942 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7942.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<rfc ipr="trust200902" updates="" obsoletes="" category="std" docName="draft-ietf-ipsecme-multi-sa-performance-03">
  <front>
    <title>IKEv2 support for per-resource Child SAs</title>
    <author fullname="Antony Antony" initials="A." surname="Antony">
      <organization abbrev="secunet">secunet Security Networks AG</organization>
      <address>
        <email>antony.antony@secunet.com</email>
      </address>
    </author>
    <author initials="T." surname="Brunner" fullname="Tobias Brunner">
      <organization abbrev="codelabs">codelabs GmbH</organization>
      <address>
        <email>tobias@codelabs.ch</email>
      </address>
    </author>
    <author fullname="Steffen Klassert" initials="S." surname="Klassert">
      <organization abbrev="secunet">secunet Security Networks AG</organization>
      <address>
        <email>steffen.klassert@secunet.com</email>
      </address>
    </author>
    <author initials="P." surname="Wouters" fullname="Paul Wouters">
      <organization>Aiven</organization>
      <address>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <date/>
    <area>General</area>
    <workgroup>Network</workgroup>
    <keyword>IKEv2</keyword>
    <keyword>IPsec</keyword>
    <abstract>
      <t>
       This document defines two Notify Message Type Payloads for the Internet
       Key Exchange Protocol Version 2 (IKEv2) to support the negotiation of
       multiple Child SAs with the same Traffic Selectors used on different
       resources, such as CPUs, to increase bandwidth of IPsec traffic between
       peers.
      </t>
      <t>
       The SA_RESOURCE_INFO notification is used to convey information that the
       negotiated Child SA and subsequent new Child SAs with the same Traffic Selectors
       are a logical group of Child SAs where most or all of the Child SAs are
       bound to a specific resource, such as a specific CPU. The TS_MAX_QUEUE
       notify conveys that the peer is unwilling to create more additional Child
       SAs for this particular negotiated Traffic Selector combination.
      </t>
      <t>
       Using multiple Child SAs with the same Traffic Selectors has the benefit
       that each resource holding the Child SA has its own Sequence Number Counter,
       ensuring that CPUs don't have to synchronize their crypto state or disable
       their packet replay protection.
      </t>
    </abstract>
  </front>
  <middle>
    <section title="Introduction">
      <t>
       Most IPsec implementations are currently limited to using one queue
       or CPU resource for a Child SA. The result is that a machine with many
       such resources is limited to only using one of these per Child SA. This
       severely limits the throughput that can be attained. An unencrypted
       link of 10Gbps or more is commonly reduced to 2-5Gbps when IPsec
       is used to encrypt the link using AES-GCM. By using the implementation
       specified in this document, aggregate throughput increased from 5Gbps
       using 1 CPU to 40-60 Gbps using 25-30 CPUs
      </t>
      <t>
       While this could be (partially) mitigated by setting up multiple
       narrowed Child SAs, for example using Populate From Packet (PFP)
       as specified in <xref target="RFC4301"/>, this IPsec feature is
       not widely implemented. Some route based IPsec implementations
       might be able to implement this with specific rules into separate
       network interfaces, but these methods might not be available for
       policy based IPsec implementations.
      </t>
      <t>
       To make better use of multiple network queues and CPUs, it can
       be beneficial to negotiate and install multiple Child
       SAs with identical Traffic Selectors. IKEv2 <xref target="RFC7296"/>
       already allows installing multiple Child SAs with identical Traffic
       Selectors, but it offers no method to indicate that the additional Child
       SA is being requested for performance increase reasons and is restricted
       to some resource (queue or CPU).
      </t>
      <t>
       When an IKEv2 peer is receiving more additional Child SA's for a single
       set of Traffic Selectors than it is willing to create, it can return an
       error notify of TS_MAX_QUEUE.
       
      </t>
      <section title="Requirements Language">
        <t>
       The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
       "OPTIONAL" in this document are to be interpreted as described in BCP
       14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
       when, they appear in all capitals, as shown here.
      </t>
      </section>
    </section>
    <section title="Performance bottlenecks" anchor="performance">
      <t>
       There are a number of practical reasons why most Implementations
       have to limit a Child SA to only one specific hardware resource,
       but a key limitation is that sharing the crypto state, counters
       and sequence numbers between multiple CPUs that are trying to
       use these shared states at the same time is not feasible without
       a significant performance penalty. There is a need to negotiate
       and establish multiple Child SAs with identical TSi/TSr on a
       per-resource basis.
        </t>
    </section>
    <section title="Negotiation of CPU specific Child SAs" anchor="neg_cpu">
      <t>
       An initial IKEv2 exchange is used to setup an IKE SA and the
       initial Child SA. If multiple Child SAs with the same Traffic
       Selectors that are bound to a single resource are desired, the
       initiator will add the SA_RESOURCE_INFO notify payload to the
       Exchange negotiating the Child SA (eg IKE_AUTH or CREATE_CHILD_SA).
       If this initial Child SA will be tied to a specific resource, it
       MAY indicate this by including an identifier in the Notification
       Data. A responder that is willing to have multple Child SAs
       for the same Traffic Selectors will respond by also adding the
       SA_RESOURCE_INFO notify payload in which it MAY add a non-zero
       notify data payload.
      </t>
      <t>
       Additional resource-specific Child SAs are negotiated as regular Child
       SAs using the CREATE_CHILD_SA exchange and are similarly identified by an
       accompanying SA_RESOURCE_INFO notification.</t>
      <t>
       Upon installation, each resource-specific Child SA is
       associated with an additional local selector, such as CPU or queue.
       These resource-specific Child SAs MUST be negotiated with identical
       Child SA properties that were negotiated for the initial Child
       SA. This includes cryptographic algorithms, Traffic Selectors,
       Mode (e.g. transport mode), compression usage, etc. However, each
       Child SA does have its own keying material that is individually derived
       according to the regular IKEv2 process. The SA_RESOURCE_INFO
       notify payload MAY be empty or MAY contain some identifying data
       that could be useful for debugging purposes.
      </t>
      <t>
       Additional Child SAs can be started on-demand or can be started
       all at once. Peers may also delete specific per-resource Child
       SAs if they deem the associated resource to be idle.
      </t>
      <t>
       During the CREATE_CHILD_SA rekey for the Child SA, the
       SA_RESOURCE_INFO notification MAY be included, but regardless of
       whether or not it is included, the rekeyed Child SA should be bound
       to the same resource(s) as the Child SA that is being rekeyed.
      </t>
    </section>
    <section title="Implementation Considerations" anchor="impl_consider">
      <t>
       There are various considerations that an implementation can
       use to determine the best way to install multiple Child SAs.
       Below are examples of such strategies.
      </t>
      <t>
       A simple distribution could be to install one additional Child SA
       on each CPU. An implementation MAY ensure that one Child SA can be
       used by all CPUs, so that while negotiating a new per-CPU Child SA,
       which typically takes a 1RTT delay, the CPU with no CPU-specific
       Child SA can still encrypt its packets using the Child SA that is
       available for all CPUs. Alternatively, if an implementation finds
       it needs to encrypt a packet but the current CPU does not have
       the resources to encrypt this packet, it can relay that packet
       to a specific CPU that does have the capability to encrypt the
       packet, although this will come with a performance penalty.
      </t>
      <t>
       Performing per-CPU Child SA negotiations can result in both peers
       initiating additional Child SAs at once. This is especially likely
       if per-CPU Child SAs are triggered by individual SADB_ACQUIRE
       <xref target="RFC2367"/> messages. Responders should install the
       additional Child SA on a CPU with the least amount of additional
       Child SAs for this TSi/TSr pair.
      </t>
      <t>
       When the number of queue or CPU resources are different between the
       peers, the peer with the least amount of resources may decide to
       not install a second outbound Child SA for the same resource as
       it will never use it to send traffic. However, it MUST install
       all inbound Child SAs as it has committed to receiving traffic
       on these negotiated Child SAs.
      </t>
      <t>
       If per-CPU packet trigger (eg SADB_ACQUIRE) messages are implemented
       (see <xref target="Operations"/>),
       the Traffic Selector (TSi) entry containing the information of the
       trigger packet SHOULD be included in the TS set similarly to
       regular Child SAs as specified in <xref target="RFC7296"/> Section 2.9.
       Based on the trigger TSi entry, an implementations can select the most
       optimal target CPU to install the additional Child SA on. For example,
       if the trigger packet was for a TCP destination to port 25 (SMTP), it
       might be able to install the Child SA on the CPU that is also running
       the mail server process. Trigger packet Traffic Selectors are
       documented in <xref target="RFC7296"/> Section 2.9.
      </t>
      <t>
       As per RFC 7296, rekeying a Child SA SHOULD use the same (or
       wider) Traffic Selectors to ensure that the new Child SA covers
       everything that the rekeyed Child SA covers. This includes
       Traffic Selectors negotiated via Configuration Payloads (CP)
       such as INTERNAL_IP4_ADDRESS which may use the original wide TS
       set or use the narrowed TS set.
      </t>
      </section>
    <section title="Payload Format" anchor="payload_formats">
      <t>
      All multi-octet fields representing integers are laid out in big
      endian order (also known as "most significant byte first", or
      "network byte order").
     </t>
      <section title="SA_RESOURCE_INFO Notify Status Message Payload" anchor="payload_info_cpu">
        <figure align="center">
          <artwork align="left"><![CDATA[
                    1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-----------------------------+-------------------------------+
! Next Payload  !C!  RESERVED   !         Payload Length        !
+---------------+---------------+-------------------------------+
!  Protocol ID  !   SPI Size    !      Notify Message Type      !
+---------------+---------------+-------------------------------+
!                                                               !
~               Optional resource identifier                       ~
!                                                               !
+-------------------------------+-------------------------------+
            ]]></artwork>
        </figure>
        <t>
          <list style="symbols">
            <t>Protocol ID (1 octet) - this field MUST contain either (2)
               to indicate AH or (3) to indicate ESP.</t>
            <t>SPI Size (1 octet) - Length in octets of the SPI as defined
               by the IPsec protocol ID.</t>
            <t>Notify Status Message Type (2 octets) - set to [TBD1].</t>
            <t>Optional Payload Data. This opague data may be set to convey the local identity of the resource.
               The opague data SHOULD be a unique identifier within all the Child SAs with the same TS payloads
               and the peer SHOULD only use it for debugging purposes.</t>
          </list>
        </t>
      </section>
      <section title="TS_MAX_QUEUE Notify Error Message Payload" anchor="payload_max_q">
        <figure align="center">
          <artwork align="left"><![CDATA[
                    1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
! Next Payload  !C!  RESERVED   !         Payload Length        !
+---------------+---------------+-------------------------------+
!  Protocol ID  !   SPI Size    !      Notify Message Type      !
+---------------+---------------+-------------------------------+
            ]]></artwork>
        </figure>
        <t>
          <list style="symbols">
            <t>Protocol ID (1 octet) - MUST be 0. MUST be ignored if not 0.</t>
            <t>SPI Size (1 octet) - MUST be 0. MUST be ignored if not 0.</t>
            <t>Notify Error Message Type (2 octets) - set to [TBD2]</t>
            <t>There is no data associated with this Notify type.</t>
          </list>
        </t>
      </section>
    </section>
    <section anchor="Operations" title="Operational Considerations">
     <t>
      Implementations supporting per-CPU SAs SHOULD extend their local
      SPD selector, and the mechanism of on-demand negotiation that is
      triggered by traffic to include a CPU (or queue) identifier in
      their packet trigger (eg SADB_ACQUIRE) message from the SPD to
      the IKE daemon. If the IKEv2 extension defined in this document is
      negotiated with the peer, an implementation which does not support
      receiving per-CPU packet trigger messages MAY initiate all its Child
      SAs immediately upon receiving the (only) packet trigger message it
      will receive from the IPsec stack. Such implementations also need
      to be careful when receiving a Delete Notify request for a per-CPU
      Child SA, as it has no method to detect when it should bring up such
      a per-CPU Child SA again later. And bringing the deleted per-CPU
      Child SA up again immediately after receiving the Delete Notify
      might cause an infinite loop between the peers. Another issue of
      not bringing up all its per-CPU Child SAs is that if the peer acts
      similarly, the two peers might end up with only the first Child
      SA without ever activating any per-CPU Child SAs. It is there for
      RECOMMENDED to implement per-CPU packet trigger messages.
     </t>
     <t>
      Peers SHOULD be lenient with the maximum number of Child SAs they
      allow for a given TSi/TSr combination to account for corner cases. For
      example, during Child SA rekeying, there might be a large number
      of additional Child SAs created before the old Child SAs are torn
      down. Similarly, when using on-demand Child SAs, both ends could
      trigger multiple Child SA requests as the initial packet causing
      the Child SA negotiation might have been transported to the peer
      via the first Child SA where its reply packet might also trigger an
      on-demand Child SA negotiation to start. As additional Child SAs
      consume little additional overhead, allowing at the very least double
      its intended CPUs is RECOMMENDED. An implementation MAY limit the
      number of Child SAs only based on its resources - that is only limit
      these based on regular denial of service protection. Although having
      too many SAs may slow down per-packet SAD lookup.
     </t>
     <t>
     Implementations might support dynamically moving a per-CPU Child
     SAs from one CPU to another CPU. If this method is supported,
     implementations must be careful to move both the inbound and outbound
     SAs. If the IPsec endpoint is a gateway, it can move the inbound SA
     and outbound SA independently from each other. It is likely that
     for a gateway, IPsec traffic would be asymmetric.  If the IPsec
     endpoint is the same host responsible for generating the traffic,
     the inbound and outbound SAs SHOULD remain as a pair on the same CPU.
     If a host previously skipped installing an outbound SA because it
     would be an unused duplicate outbound SA, it will have to create
     and add the previously skipped outbound SA to the SAD with the new
     CPU ID. The inbound SA may not have CPU ID in the SAD.  Adding the
     outbound SA to the SAD requires access to the key material, whereas
     for updating the CPU selector on an existing outbound SAs access
     to key material might not be needed.  To support this, the IKE
     software might have to hold on to the key material longer than it
     normally would, as it might actively attempt to destroy key material
     from memory that the IKE daemon no longer needs access to.
     </t>
     <t>
     An implementation that does not accept any further resource specific
     Child SAs MUST NOT return the NO_ADDITIONAL_SAS error because this
     can be interpreted by the peer that no other Child SAs with different
     TSi/TSr are allowed either. Instead, it MUST return TS_MAX_QUEUE.
     </t>
    </section>
    <section anchor="Security" title="Security Considerations">
     <t>
      Similar to how an implementation should limit the number of
      half-open SAs to limit the impact of a denial of service attack,
      an implementation SHOULD limit the maximum number of additional
      Child SAs allowed per unique TSi/TSr.
     </t>
     <t>
      Using multiple resource specific child SAs makes sense for
      high volume IPsec connections on IPsec gateway machines where the
      administrator has a reasonable trust relationship with the peer's
      administrator and abuse is unlikely and easilly escalated to resolve.
     </t>
     <t>
      This trust relationship is usually not present for the Remote
      Access VPN type deployments, and allowing per-CPU Child SA's
      is NOT RECOMMENDED in these scenarios. Therefore, it is also NOT
      RECOMMENDED to allow per-CPU Child SAs per default.
     </t>
     <t>
      The SA_RESOURCE_INFO notify contains an optional data payload that
      can be used by the peer to identify the Child SA belonging to a
      specific resource.  The notify data SHOULD NOT be an identifer that
      can be used to gain information about the hardware. For example,
      using the CPU number itself as identifer might give an attacker
      knowledge which packets are handled by which CPU ID and it might
      optimize a brute force attack against the system.
     </t>
    </section>
    <section title="Implementation Status" anchor="impl_status">
      <t>
      [Note to RFC Editor: Please remove this section and the reference to
      <xref target="RFC6982"/> before publication.]
     </t>
      <t>
      This section records the status of known implementations of the
      protocol defined by this specification at the time of posting of
      this Internet-Draft, and is based on a proposal described in
      <xref target="RFC7942"/>. The description of implementations in this
      section is intended to assist the IETF in its decision processes
      in progressing drafts to RFCs. Please note that the listing of
      any individual implementation here does not imply endorsement
      by the IETF. Furthermore, no effort has been spent to verify the
      information presented here that was supplied by IETF contributors.
      This is not intended as, and must not be construed to be, a catalog
      of available implementations or their features. Readers are advised
      to note that other implementations may exist.
     </t>
      <t>
      According to <xref target="RFC7942"/>, "this will allow reviewers
      and working groups to assign due consideration to documents that
      have the benefit of running code, which may serve as evidence of
      valuable experimentation and feedback that have made the implemented
      protocols more mature.  It is up to the individual working groups
      to use this information as they see fit".
     </t>
      <t>
      Authors are requested to add a note to the RFC Editor at the
      top of this section, advising the Editor to remove the entire
      section before publication, as well as the reference to <xref target="RFC7942"/>.
     </t>
      <section anchor="section.impl-status.xfrm" title="Linux XFRM">
        <t>
          <list style="hanging">
            <t hangText="Organization: ">Linux kernel XFRM</t>
            <t hangText="Name: ">XFRM-PCPU-v3 https://git.kernel.org/pub/scm/linux/kernel/git/klassert/linux-stk.git/log/?h=xfrm-pcpu-v3</t>
            <t hangText="Description: "> An initial Kernel IPsec implementation
             of the per-CPU method.</t>
            <t hangText="Level of maturity: ">Alpha</t>
            <t hangText="Coverage: ">
            Implements a general Child SA and per-CPU Child SAs. It only supports
            the NETLINK API. The PFKEYv2 API is not supported.</t>
            <t hangText="Licensing: ">GPLv2</t>
            <t hangText="Implementation experience: "> The Linux XFRM
             implementation added two additional attributes to support per-CPU SAs.

             There is a new attribute XFRMA_SA_PCPU, u32, for the SAD entry.
             This attribute should present on the outgoing SA, per-CPU Child SAs,
             starting from 0. This attribute MUST NOT be present on the first
             XFRM SA. It is used by the kernel only for the outgoing traffic,
             (clear to encrypted).
             The incoming SAs do not need XFRMA_SA_PCPU attribute. XFRM stack can not
             use CPU id on the incoming SA.  The kernel internally sets the value to
             0xFFFFFF for the incoming SA and the initial Child SA that can be used by
             any CPU.

             However, one may add XFRMA_SA_PCPU to the incoming  per-CPU SA to steer
             the ESP flow, to a specific Q or CPU e.g ethtool ntuple configuration.

             The SPD entry has new flag XFRM_POLICY_CPU_ACQUIRE.
             It should be set only on the "out" policy. The flag should
             be disabled when the policy is a trap policy, without SPD entries.
             After a successful negotiation of CPU_QUEUES, while adding the
             first Child SA, the SPD entry can be updated with the
             XFRM_POLICY_CPU_ACQUIRE flag.
             When XFRM_POLICY_CPU_ACQUIRE is set, the XFRM_MSG_ACQUIRE generated
             will include the XFRMA_SA_PCPU attribute.
             </t>
            <t hangText="Contact: ">Steffen Klassert steffen.klassert@secunet.com</t>
          </list>
        </t>
      </section>
      <section anchor="section.impl-status.libreswan" title="Libreswan">
        <t>
          <list style="hanging">
            <t hangText="Organization: ">The Libreswan Project</t>
            <t hangText="Name: ">pcpu-3 https://libreswan.org/wiki/XFRM_pCPU</t>
            <t hangText="Description: ">
           An initial IKE implementation of the per-CPU method.</t>
            <t hangText="Level of maturity: ">Alpha</t>
            <t hangText="Coverage: ">
            implements combining a regular (all-CPUs) Child SA and per-CPU additional Child SAs</t>
            <t hangText="Licensing: ">GPLv2</t>
            <t hangText="Implementation experience: ">TBD</t>
            <t hangText="Contact: ">Libreswan Development: swan-dev@libreswan.org</t>
          </list>
        </t>
      </section>
      <section anchor="section.impl-status.strongswan" title="strongSwan">
        <t>
          <list style="hanging">
            <t hangText="Organization: ">The StrongSwan Project</t>
            <t hangText="Name: ">StrongSwan https://github.com/strongswan/strongswan/tree/per-cpu-sas-poc/</t>
            <t hangText="Description: ">
           An initial IKE implementation of the per-CPU method.</t>
            <t hangText="Level of maturity: ">Alpha</t>
            <t hangText="Coverage: "> implements combining a regular (all-CPUs) Child SA and per-CPU additional Child SAs</t>
            <t hangText="Licensing: ">GPLv2</t>
            <t hangText="Implementation experience: ">
             StrongSwan use private space values for notifications
             CPU_QUEUES (40970) and QUEUE_INFO (40971).
            </t>
            <t hangText="Contact: ">Tobias Brunner tobias@strongswan.org</t>
          </list>
        </t>
      </section>
      <section anchor="section.impl-status.iproute2" title="iproute2">
       <t>
        <list style="hanging">
         <t hangText="Organization: ">The iproute2 Project</t>
         <t hangText="Name: "> iproute2 https://github.com/antonyantony/iproute2/tree/pcpu-v1</t>
         <t hangText="Description: ">Implemented the per-CPU attributes for the "ip xfrm" command.</t>
         <t hangText="Level of maturity: ">Alpha</t>
         <t hangText="Licensing: ">GPLv2</t>
         <t hangText="Implementation experience: ">TBD</t>
         <t hangText="Contact: ">Antony Antony antony.antony@secunet.com</t>
        </list>
       </t>
      </section>
    </section>
    <section anchor="IANA" title="IANA Considerations">
      <t>
        This document defines one new IKEv2 Notify Message Type payload for the IANA "IKEv2 Notify Message Types - Status Types" registry.
        </t>
      <figure align="center" anchor="iana_requests_i">
        <artwork align="left"><![CDATA[
      Value   Notify Type Messages - Status Types    Reference
      -----   ------------------------------    ---------------
      [TBD1]   SA_RESOURCE_INFO                    [this document]
            ]]></artwork>
      </figure>
      <t>
        This document defines one new IKEv2 Notify Message Type payload for the IANA "IKEv2 Notify Message Types - Error Types" registry.
        </t>
      <figure align="center" anchor="iana_requests_e">
        <artwork align="left"><![CDATA[
      Value   Notify Type Messages - Status Types    Reference
      -----   ------------------------------    ---------------
      [TBD2]   TS_MAX_QUEUE                        [this document]
            ]]></artwork>
      </figure>
    </section>
  </middle>
  <back>
    <references title="Normative References">
     &RFC2119;
     &RFC7296;
     &RFC8174;
    </references>
    <references title="Informative References">
     &RFC2367;
     &RFC4301;
     &RFC6982;
     &RFC7942;
    </references>
  </back>
</rfc>
