<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->



<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC0791 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.0791.xml">
<!ENTITY RFC0792 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.0792.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2460 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2460.xml">
<!ENTITY RFC4443 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
<!ENTITY RFC7296 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8340 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8340.xml">
<!ENTITY RFC8900 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8900.xml">
]>



<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-liu-ipsecme-ikev2-mtu-dect-01" category="std">

  <front>
    <title>IKEv2 MTU Detection Extension</title>

    <author initials="D." surname="Liu" fullname="Daiying Liu" role="editor">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Liu" fullname="Renwang Liu">
      <organization>Ericsson</organization>
      <address>
        <email>renwang.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhang" fullname="Congjie Zhang">
      <organization>Ericsson</organization>
      <address>
        <email>congjie.zhang@ericsson.com</email>
      </address>
    </author>

    <date year="2022" month="March" day="28"/>

    <area>General</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>






<t>This document defines the Internet Key Exchange Version 2 (IKEv2) allowed Maximum Transmission Unit (MTU) extension 
that enables to automatically detect MTU allowed on forwarding path of each IKEv2 session to prevent Encapsulating Security Payload (ESP) packets from being fragmented.</t>



    </abstract>


  </front>

  <middle>







<section anchor="sec1" title="Introduction">

<t>The basic function of IP Security (IPsec) is to securely transmit IP packets on an untrusted network.
In practical applications many factors in this untrusted network, including MTU, 
are uncontrollable which means that even cannot modify the configuration.</t>

<t>Therefore ESP packets may be fragmented because they exceed the MTU of a router on the forwarding path which causes many problems.</t>

<t><xref target="RFC8900"/> describes in detail the negative impact of IP packet fragmentation. Here are some weakness of IP fragmentation quoted from section 3 of <xref target="RFC8900"/>:</t>

<t><list style="symbols">
  <t>Virtual Reassembly</t>
  <t>Policy-Based Routing</t>
  <t>Network Address Translation (NAT)</t>
  <t>Stateless Firewalls</t>
  <t>IPv4 Reassembly Errors at High Data Rates</t>
  <t>Security Vulnerabilities</t>
  <t>Black-Holing Due to Filtering or Loss</t>
</list></t>

<t>For IPsec the previously listed effects are more obvious and directly affect the security, stability, and performance of IPsec.
So this document recommend an IKEv2 allowed MTU extension to enable a determinate mechanism to automatically 
detect MTU allowed on each IKEv2 session forwarding path to prevent ESP packets from being fragmented.</t>

</section>




<section anchor="sec2" title="Requirements Language">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/> <xref target="RFC8174"/>.</t>

</section>


<section anchor="sec3" title="Allowed MTU Notify Message Types">

<t>The following figure illustrates the Notify Payload format as described in
Section 3.10 of <xref target="RFC7296"/> with a 4 bytes path allowed MTU value as notification data.</t>

<t>The ALLOWED_MTU notify SHOULD be used in an IKEv2 INFORMATIONAL exchange.</t>

<figure title="ALLOWED_MTU Notify Message Type Value" anchor="xml_happy_1"><artwork><![CDATA[
       +=======+========================================+
       | Value |        NOTIFY MESSAGES - STATUS TYPES  |
       +=======+========================================+
       | 16446 |              ALLOWED_MTU               |
       +-------+----------------------------------------+
]]></artwork></figure>

<figure title="ALLOWED_MTU Notify Message Format" anchor="xml_happy_2"><artwork><![CDATA[
                      1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Next Payload  |C|  RESERVED   |         Payload Length        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Protocol ID  |   SPI Size    |      Notify Message Type      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 ~                       Notification Data                       ~
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Next Payload - N(41), indicate this is Notify payload.</t>
  <t>Notify Message Type - ALLOWED_MTU (TDB).</t>
  <t>Notification Data - 4 octets for ALLOWED_MTU, see <xref target="xml_happy_3"/>:</t>
</list></t>

<figure title="Notification Data for ALLOWED_MTU" anchor="xml_happy_3"><artwork><![CDATA[
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   |                          MTU Value                            |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The device SHOULD continuously check whether the received ESP packet is fragmented. 
If the ESP packet is fragmented the device needs to calculate the MTU allowed 
on the forwarding path from fragments and notify the sender to deal with accordingly.</t>

</section>



<section anchor="sec4" title="IKEv2 Session MTU Detection">

<section anchor="allowed-mtu-calculation-for-ipv4-esp" title="Allowed MTU Calculation for IPv4 ESP">

<t><xref target="RFC0791"/> section 3.1 defines standard IPv4 header:</t>

<figure title="IPv4 Header" anchor="xml_happy_4"><artwork><![CDATA[
    0                   1                   2                   3   
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Version|  IHL  |Type of Service|          Total Length         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Identification        |Flags|      Fragment Offset    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Time to Live |    Protocol   |         Header Checksum       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Source Address                          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Destination Address                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Options                    |    Padding    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The "Flags" field identifies whether ESP packets are fragmented.
The "Fragment Offset" field indicates whether this fragment is initial
(the "MF" bit in the initial fragment "Flags" field MUST be 1, and the "Fragment Offset" field MUST be 0).</t>

<t>It can use the "Total Length" field of initial fragment to calculate the MTU of the router that fragments on the forwarding path,
that is the maximum MTU allowed on the current forwarding path.</t>

</section>






<section anchor="allowed-mtu-calculation-for-ipv6-esp" title="Allowed MTU Calculation for IPv6 ESP">

<t><xref target="RFC2460"/> section 4.5 defines standard IPv6 fragment header:</t>

<figure title="IPv6 Fragment Header" anchor="xml_happy_5"><artwork><![CDATA[
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Next Header  |   Reserved    |      Fragment Offset    |Res|M|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Identification                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Similar to IPv4, for IPv6 ESP the "Fragment Header" can identify whether ESP packets are fragmented.
The field "M" and "Fragment Offset" indicate whether this fragment is initial
(the "M" bit in the initial fragment MUST be 1, and the "Fragment Offset" field MUST be 0).
And the MTU can be calculated from initial fragment length following the same method of IPv4.</t>

</section>
<section anchor="send-allowedmtu-notify-message" title="Send ALLOWED_MTU Notify Message">

<t>The ALLOWED_MTU notify message SHOULD be exchanged via the IKEv2 INFORMATIONAL message to inform the peer the current MTU of this IKEv2 session.</t>

<figure title="INFORMATIONAL Message for ALLOWED_MTU" anchor="xml_happy_6"><artwork><![CDATA[
              Local                              Remote
              -----------------------------------------
              HDR, SK {N[ALLOWED_MTU]}  -->
]]></artwork></figure>

<t>The device SHOULD continuously check whether the received ESP packet is fragmented even after ALLOWED_MTU notify message is sent,
	 because new MTU changes may occur as paths over the internet change.
</t>
</section>


<section anchor="mininum-mtu-consideration" title="Minimum MTU Consideration">
<t>If a malicious entity able to filter on path would "fragment" the
   packet into tiny bits. It would reduce the MTU of the IPsec link to unhealthy size.
   Therefore, the minimum MTU value MUST be defined.
</t>
<t>If the MTU of a fragmented packet is smaller than the minimum MTU, it SHOULD be considered
	 as a malicious attack. Therefore, the packet SHOULD be discarded instead of sent the ALLOWED_MTU notify message to protect the entire system.
</t>
<t>A recommendation for implementation is that the minimum MTU SHOULD be user-configurable for different deployments.
	 This is to consider the complexity and variability of the network, configurable minimum MTU can make deployment more flexible.
</t>
</section>
</section>





<section anchor="sec5" title="Processing Based on Detected MTU">

<section anchor="sec5_1" title="Processing Mechanism">
<t>After receiving the ALLOWED_MTU notify message the sending end of the ESP packet knows the MTU allowed 
on the forwarding path, then the sending end SHOULD take specific actions before sending ESP packets to prevent the ESP packet from being fragmented.</t>

<t>Before performing IP packet encryption and ESP encapsulation firstly calculate the final packet MTU 
considering the additional ESP header, ESP tailor and tunnel header.
If the final packet MTU does not exceed the negotiated MTU just follow the normal process. Otherwise the following 2 options are proposed:</t>

<t><list style="symbols">
  <t>The IKEv2 end sends ICMP ("Destination Unreachable" for IPv4 <xref target="RFC0792"/>, and "Too Big" for IPv6 <xref target="RFC4443"/>) to the original IP packet sender, then the sender can reduce the IP packet size by following ICMP standard.</t>
  <t>The local IKEv2 end directly frags the original packet according to the negotiated MTU, and then encrypts and encapsulates the fragments. This can guarantee the ESP packets are not fragmented by routers on the forwarding path, and the IKEv2 peer receives the ESP required to follow the normal process to decapsulate and decrypt then forward the fragments of the original IP packets to the application, the application can reassemble them.</t>
</list></t>
</section>

<section anchor="sec5_2" title="Timeout Mechanism">
<t>The specific actions on sender device after receiving ALLOWED_MTU SHOULD have a "time limit".
	 When the "time limit" is exceeded, no specific actions is performed on the original packet and the normal process is returned.</t>
<t>This "time limit" ensures that the session reverts to its original state - process original packets normally - after a certain amount of time, it is equivalent to a redetection of the path MTU.
	 If the path MTU does not meet the current ESP transmission, the ESP receiver can detect the new MTU value (as described in <xref target="sec4"/>) and notify the ESP sender via ALLOWED_MTU notify message again.
	 This mechanism is designed to cover the path MTU change case, especially MTU increases due to path changes.</t>
<t>It RECOMMENDED that this "time limit" should be flexible, in other words configurable at the implementation level. Because in theory, the path MTU does not change frequently, and redetection of the MTU may temporarily introduce packet loss caused by ESP fragmented packets. Therefore, users should decide the "time limit" value based on actual network conditions.</t>
</section>

</section>

<section anchor="sec6" title="Security Considerations">

<t>This document defines the new IKE Notify message types that are naturally protected by the IKE encryption mechanism when the payloads are applied.
So, there is no security problem or potential risk.</t>

</section>





<section anchor="sec7" title="IANA Considerations">

<t>IANA needs to update the "IKEv2 Notify Message Types - Status Types" registry 
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>

<figure anchor="xml_happy_7"><artwork><![CDATA[
           +=======+========================================+
           | Value |        NOTIFY MESSAGES - STATUS TYPES  |
           +=======+========================================+
           |  TBD  |              ALLOWED_MTU               |
           +-------+----------------------------------------+
]]></artwork></figure>

</section>




<section anchor="sec8" title="Acknowledgements">

<t>This document reproduces some parts of the similar IKEv2 document <xref target="RFC7296"/>, IP document <xref target="RFC0791"/>, IPv6 document <xref target="RFC2460"/>, and <xref target="RFC8900"/>.</t>
<t>The authors would like to thank Paul Wouters for his reviews and valuable comments and suggestions.</t>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC0791;
&RFC0792;
&RFC2119;
&RFC2460;
&RFC4443;
&RFC7296;
&RFC8174;


    </references>


    <references title='Informative References'>

&RFC8900;


    </references>



  </back>




<!-- ##markdown-source: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-->
</rfc>