<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="IKEv2 Optional Child SA&amp;TS Payloads">IKEv2 Optional SA&amp;TS Payloads in Child Exchange</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt-03"/>
    <author initials="S." surname="Kampati" fullname="Sandeep Kampati">
      <organization abbrev="Microsoft">Microsoft</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>skampati@microsoft.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhuatai District</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code/>
          <country>China</country>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="P." surname="Wouters" fullname="Paul Wouters">
      <organization abbrev="Aiven">Aiven</organization>
      <address>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <author initials="M." surname="Bharath" fullname="Meduri S S Bharath">
      <organization abbrev="Mavenir">Mavenir Systems Pvt Ltd</organization>
      <address>
        <postal>
          <street>Manyata Tech Park</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code/>
          <country>India</country>
        </postal>
        <email>bharath.meduri@mavenir.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization abbrev="CMCC">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street, West District</street>
          <city>Beijing</city>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="07"/>
    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 71?>

<t>This document describes a method for reducing the size of the Internet Key Exchange version 2 (IKEv2) CREATE_CHILD_SA exchanges used for rekeying of the IKE or Child SA by replacing the SA and TS payloads with a Notify Message payload.
Reducing size and complexity of IKEv2 exchanges is especially useful for low power consumption battery powered devices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsec Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange protocol version 2 (IKEv2) <xref target="RFC7296"/> is used to negotiate Security Association (SA) parameters for the IKE SA and the Child SAs. Cryptographic key material for these SAs have a limited lifetime before it needs to be refreshed, a process referred to as "rekeying". IKEv2 uses the CREATE_CHILD_SA exchange to rekey either the IKE SA or the Child SAs.</t>
      <t>When rekeying, a full set of negotiation parameters are exchanged. However, most of these parameters will be the same as before, and some of these parameters <bcp14>MUST NOT</bcp14> change.</t>
      <t>For example, the Traffic Selector (TS) negotiated for the new Child SA <bcp14>MUST</bcp14> cover the Traffic Selectors negotiated for the old Child SA. And in practically all cases, a new Child SA does not need to cover a wider set of Traffic. In the rare case where this would be needed, either a standard rekey could be used or a new Child SA could be negotiated followed by a deletion of the replaced Child SA.</t>
      <t>Similarly, IKEv2 states that the cryptographic parameters negotiated for rekeying <bcp14>SHOULD NOT</bcp14> be different. This means that the security properties of the IKE or Child SA in practise do not change during a typical rekey.</t>
      <t>This document specifies a method to omit these parameters and replace them with a single Notify Message declaring that all these parameters are identical to the originally negotiated parameters.</t>
      <t>Large scale IKEv2 gateways such as Evolved Packet Data Gateway (ePDG) in 4G networks or Centralized Radio Access Network (cRAN/Cloud) gateways in 5G networks typically support more than 100,000 IKE/IPsec connections. At any point in time, there will be hundreds or thousands of IKE SAs and Child SAs that are being rekeyed. This takes a large amount of bandwidth and CPU power and any protocol simplification or bandwidth reducing would result in a significant resource saving.</t>
      <t>For Internet of Things (IoT) devices which utilize low power consumption technology, reducing the size of the CREATE_CHILD_SA exchange for rekeying reduces its power consumption, as sending bytes over the air is usually the most power consuming operation of such a device. Reducing the CPU operations required to verify the rekey exchanges parameters will also save power and extend the lifetime for these devices.</t>
      <t>When using identical parameters for the IKE SA or Child SA rekey, the SA and TS payloads can be omitted thanks to the optimization defined in this document. For an IKE SA rekey, instead of the (large) SA payload, only a Key Exchange (KE) payload and a new Notify Type payload with the new SPI are required. For a Child SA payload, instead of the SA or TS payloads, only an optional KE payload (when using PFS) and a new Notify Type payload with the new SPI are needed. This makes the rekey exchange packets much smaller and the peers do not need to verify that the SA or TS parameters are compatible with the old SA parameters.</t>
    </section>
    <section anchor="conventions-used-in-this-document">
      <name>Conventions Used in This Document</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="negotiation-of-support-for-optimized-rekey">
      <name>Negotiation of Support for OPTIMIZED REKEY</name>
      <t>To indicate support for the optimized rekey negotiation, the initiator includes the OPTIMIZED_REKEY_SUPPORTED notify payload in the IKE_AUTH exchange request. If multiple IKE_AUTH exchanges are sent, the OPTIMIZED_REKEY_SUPPORTED notify payload should be in the last IKE_AUTH exchange. During this initial key request, the entire SA and TS payloads are included as normal. Note that the notify indicates support for optimized rekey for both IKE and Child SAs.</t>
      <t>A responder that does not support the optimized rekey exchange processes the SA and TS payloads as normal, and does not include the new Notify. As per regular IKEv2 processing, a responder that does not recognize this new Notify, <bcp14>MUST</bcp14> ignore the notify. Responders may have been administratively configured with the optimization turned off for local reasons. The absense of the Notify indicates to the initiator that the optimization is not available, and normal, full rekey should be done.</t>
      <t>When a peer wishes to rekey an IKE SA or Child SA, it <bcp14>MAY</bcp14> use the optimized rekey method during the CREATE_CHILD_SA exchange. If both peers have exchanged OPTIMIZED_REKEY_SUPPORTED notifies, peers <bcp14>SHOULD</bcp14> use the optimized rekey method for rekeys. Non-optimized, regular rekey requests <bcp14>MUST</bcp14> always be accepted.</t>
      <t>The IKE_AUTH message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(OPTIMIZED_REKEY_SUPPORTED)} -->
                            <-- HDR, SK {IDr, [CERT,] AUTH,
                                    SAr2, TSi, TSr,
                                    N(OPTIMIZED_REKEY_SUPPORTED)}
]]></artwork>
    </section>
    <section anchor="optimized-rekey-of-the-ike-sa">
      <name>Optimized Rekey of the IKE SA</name>
      <t>The initiator of an optimized rekey request sends a CREATE_CHILD_SA request with the OPTIMIZED_REKEY notify payload containing the new Security Parameter Index (SPI) for the new IKE SA. It omits the SA payload.</t>
      <t>The responder of an optimized rekey request replies with an included OPTIMIZED_REKEY notify with its new IKE SPI and also omits the SA payload.</t>
      <t>Both parties send their nonce and KE payloads just as they would do for a regular IKE SA rekey.</t>
      <t>Using the old SPI from the IKE header and the two new SPIs respectively from the initiator and responder's OPTIMIZED_REKEY payloads, both parties can perform the IKE SA rekey operation.</t>
      <t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {N(OPTIMIZED_REKEY,newSPIi),
         Ni, KEi} -->
                            <-- HDR, SK {N(OPTIMIZED_REKEY,newSPIr),
                                         Nr, KEr}
]]></artwork>
    </section>
    <section anchor="optimized-rekey-of-child-sas">
      <name>Optimized Rekey of Child SAs</name>
      <t>The initiator of an optimized rekey request sends a CREATE_CHILD_SA request with the OPTIMIZED_REKEY notify payload containing the new Security Parameter Index (SPI) for the new Child SA. It omits the SA and TS payloads. If the current Child SA was negotiated with Perfect Forward Secrecy (PFS), a KEi payload is included as well. If no PFS was negotiated for the current Child SA, a KEi payload is not included.</t>
      <t>The responder of an optimized rekey request performs the same process. It includes the OPTIMIZED_REKEY notify with its new SPI for the new Child SA and omits the SA and TS payloads. Depending on the PFS negotiation of the current Child SA, the responder includes a KEr payload.</t>
      <t>Both parties send their nonce payloads just as they would do for a regular Child SA rekey.</t>
      <t>Using the old SPI from the REKEY_SA payload and the two new SPIs respectively from the initiator and responder's OPTIMIZED_REKEY payloads, both parties can perform the Child SA rekey operation.</t>
      <t>Notify payloads that can affect the Child SA properties, such as USE_TRANSPORT_MODE or ESP_TFC_PADDING_NOT_SUPPORTED <bcp14>MAY</bcp14> be sent but <bcp14>MUST</bcp14> be ignored and <bcp14>MUST NOT</bcp14> cause the Child SA properties to change. IPCOMP_SUPPORTED <bcp14>MUST</bcp14> be sent as it contains the required updated CPI parameter.</t>
      <t>For the Child SA that was negotiated as part of an initial IKE exchange (eg IKE_AUTH), its rekey parameters for the KE payload <bcp14>SHOULD</bcp14> be the same KE group(s) for Child SA PFS as the negotiated IKE SA. If rekeying without PFS is required, the peer first initiates a regular Child SA rekey without KE payload, and subsequently it can use the optimized rekey method. If a peer responding to an optimized rekey receives a request with a non-allowed PFS proposal, it <bcp14>MUST</bcp14> return an INVALID_KE_PAYLOAD response.</t>
      <t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {N(REKEY_SA,oldSPI), N(OPTIMIZED_REKEY,newSPIi),
         Ni, [KEi,]} -->
                            <-- HDR, SK {N(OPTIMIZED_REKEY,newSPIr),
                                         Nr, [KEr,]}
]]></artwork>
    </section>
    <section anchor="payload-formats">
      <name>Payload Formats</name>
      <section anchor="optimizedrekeysupported-notify">
        <name>OPTIMIZED_REKEY_SUPPORTED Notify</name>
        <t>The OPTIMIZED_REKEY_SUPPORTED Notify Message type notification is used by the initiator and responder to indicate their support for the optimized rekey negotiation.</t>
        <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Protocol ID (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
          </li>
          <li>
            <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0, meaning no SPI is present.</t>
          </li>
          <li>
            <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD1</tt>.</t>
          </li>
        </ul>
        <t>This Notify Message type contains no data.</t>
      </section>
      <section anchor="optimizedrekey-notify">
        <name>OPTIMIZED_REKEY Notify</name>
        <t>The OPTIMIZED_REKEY Notify Message type is used to perform an optimized IKE SA or Child SA rekey.</t>
        <artwork><![CDATA[
 0                 1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
|                                                               |
~                            New SPI                            ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Protocol ID (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
          </li>
          <li>
            <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0. The "Security Parameter Index (SPI)" field is not used in this Notify, and the new SPI is placed in the "Notification Data" field.</t>
          </li>
          <li>
            <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD2</tt>.</t>
          </li>
        </ul>
        <t>The 'New SPI' field is the data associated with this Notify, and it's either a four-octet SPI when rekeying an IKE SA or an eight-octet SPI when rekeying a Child SA.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new Notify Message Types in the "IKEv2 Notify Message Types - Status Types" registry. IANA is requested to assign codepoints in this registry.</t>
      <artwork><![CDATA[
NOTIFY messages: status types            Value
----------------------------------------------------------
OPTIMIZED_REKEY_SUPPORTED                TBD1
OPTIMIZED_REKEY                          TBD2
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Some implementations allow sending rekey messages with a different set of Traffic Selectors or cryptographic parameters in response to a configuration update. IKEv2 <xref target="RFC7296"/> states this <bcp14>SHOULD NOT</bcp14> be done. Whether or not optimized rekeying is used, a configuration change that changes the Traffic Selectors or cryptographic parameters <bcp14>MUST NOT</bcp14> use the optimized rekey method. It <bcp14>SHOULD</bcp14> also not use a regular rekey method but instead start an entire new IKE and Child SA negotiation with the new parameters.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The optimized rekey removes sending unnecessary new parameters that originally would have to be validated against the original parameters. In that sense, this optimization enhances the security of the rekey process by reducing the complexity and code required.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Special thanks go to Valery Smyslov and Antony Antony.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC7296">
        <front>
          <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
          <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="Y. Nir" initials="Y." surname="Nir"/>
          <author fullname="P. Eronen" initials="P." surname="Eronen"/>
          <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
          <date month="October" year="2014"/>
          <abstract>
            <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="79"/>
        <seriesInfo name="RFC" value="7296"/>
        <seriesInfo name="DOI" value="10.17487/RFC7296"/>
      </reference>
    </references>
    <?line 260?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
