<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC4301 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC7296 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY I-D.ietf-ipsecme-diet-esp SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-diet-esp.xml">
]>


<rfc ipr="trust200902" docName="draft-mglt-ipsecme-dscp-np-02" category="std" consensus="true" submissionType="IETF" updates="RFC4301" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DSCP Notify Payload">Differentiated Services Field Codepoints Internet Key Exchange version 2 Notification</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization>Ericsson</organization>
      <address>
        <email>joel.halpern@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Preda" fullname="Stere Preda">
      <organization>Ericsson</organization>
      <address>
        <email>stere.preda@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Liu" fullname="Daiying Liu">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="U." surname="Parkholm" fullname="U. Parkholm">
      <organization>Ericsson</organization>
      <address>
        <email>ulf.x.parkholm@ericsson.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 47?>

<t>This document outlines the DSCP Notification Payload, which, during a CREATE_CHILD_SA Exchange, explicitly indicates the DSCP code points that will be encapsulated in the newly established tunnel.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>In the ESP Header Compression Profile Diet-ESP <xref target="I-D.ietf-ipsecme-diet-esp"/>, two communicating peers can reach an agreement on DSCP values as part of a compression context. Within this context, DSCP values serve not only as classifiers but are also compressed by the sending peer and subsequently decompressed by the receiving peer for both incoming and outgoing traffic. This process necessitates a mutual agreement on DSCP values for a specific pair of Security Associations (SAs). The DSCP Notification Payload outlined in this specification facilitates the negotiation of these DSCP values for a pair of SAs during the CREATE_CHILD_SA Exchange.</t>

<t>Furthermore, the explicit negotiation of DSCP values enhances the "classifier" mechanism, allowing for the establishment of this mechanism and the agreement on various clusters of DSCP values to be considered for each pair of SAs. <xref section="4.1" sectionFormat="comma" target="RFC4301"/> recognizes that aggregating traffic with multiple DSCP values over a single SA may lead to the inappropriate discarding of lower-priority packets due to the windowing mechanism employed by this feature. To mitigate this issue, <xref section="4.1" sectionFormat="comma" target="RFC4301"/> advises that the sender implement a "classifier" mechanism to distribute traffic across multiple SAs. While <xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> refers to the "DSCP values" fields in the Security Association Database (SAD), <xref target="RFC7296"/> does not provide a way for peers to indicate which classification is ongoing nor which "DSCP values" are linked to the created SA. This document addresses that deficiency by specifying the DSCP Notification Payload, which explicitly identifies the DSCP code points that will be tunneled in the newly established tunnel during a CREATE_CHILD_SA Exchange.</t>

<t>It is essential to recognize that in a standard "classifier" context, there is no necessity for the same cluster of DSCP values to be linked to both the inbound and outbound Security Associations (SAs) of a specific pair. Typically, one peer may employ one pair of SAs, while the other peer may choose a different pair. This flexibility arises because DSCP values are applied exclusively by the sending node, rather than the receiving node. Although the use of the DSCP Notification Payload does not inhibit such configurations, it is likely to diminish their occurrence. Conversely, we anticipate that the explicit negotiation of DSCP values and pairs of SAs will facilitate the management of these "classifiers."</t>

</section>
<section anchor="sec-rfc4301"><name>RFC4301 clarification</name>

<t><xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> mentions</t>

<figure><artwork><![CDATA[
    o DSCP values -- the set of DSCP values allowed for packets carried
      over this SA.  If no values are specified, no DSCP-specific
      filtering is applied.  If one or more values are specified, these
      are used to select one SA among several that match the traffic
      selectors for an outbound packet.  Note that these values are NOT
      checked against inbound traffic arriving on the SA.
]]></artwork></figure>

<t>The text does not clearly specify what happens when the DSCP of a packet does not match any of the corresponding DSCP values.
This document proposes the following text:</t>

<t><list style="symbols">
  <t>DSCP values -- the set of DSCP values allowed for packets carried
    over this SA. If no values are specified, no DSCP-specific
    filtering is applied.  If one or more values are specified, these
    are used to select one SA among several that match the traffic
    selectors for an outbound packet. In case of multiple matches a preference to the most selective list DSCP value could be implemented by the peer's policy. 
    If the DSCP value of the packet does not match any of the DSCP values provided by the associated matching SAs and there is at least one SA with no DSCP-specific filtering, then, one of these SA SHOULD be selected. On the other hand, if all SAs have a DSCP filtering, then, any of the matching SAs can be selected. Note that these values MUST NOT be checked against inbound traffic arriving on the SA.</t>
</list></t>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<t>The illustrative example of this section considers Expedited Forwarding (EF) with low latency traffic has its own IPsec tunnel, Assured Forward (AF) classes with different drop precedence and may take a different route have their own tunnel and all remaining DSCP values are put in another tunnel.<br />
This section details how a peer uses the DSCP Notify Payload to classify traffic carrying the DSCP values AF11 or AF3 in one tunnel, traffic carrying a DSCP value of EF in another tunnel and traffic with other DSCP values a third tunnel.
This latest SA is designated as the default no-DSCP specific SA. It is RECOMMENDED to configure the Security Policy Data Base (SPD), so that such a default no-DSCP specific SA is created and it is RECOMMENDED its creation happens prior the SA with specific DSCP values. 
Note that according to <xref target="sec-rfc4301"/>, there is no specific ordering, but starting with the no-DSCP specific SA ensures compatibility with IPsec implementation that would for example discard or create a new SA when the DSCP do not match.</t>

<t>Generally, it is recommended that the outer DSCP value matches the inner DSCP value so that the tunneled packet be treated similarly to the inner packet. Such behavior is provided by setting the Bypass DSCP to True.
If the initiator prefers for example every tunneled packet being treated similarly, then, an explicit mapping needs to be indicated. Typically, the initiator may be willing to prevent reordered traffic to fall outside the anti-replay windows.
Note that such policy is implemented by each peer.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {IDi, [CERT,] [CERTREQ,]
       [IDr,] AUTH, SAi2,
       TSi, TSr}  -->

                                <--  HDR, SK {IDr, [CERT,] AUTH,
                                         SAr2, TSi, TSr}
]]></artwork></figure>

<t>Once the no-DSCP specific SA is created, all traffic with any DSCP value is steered to that SA. The initiator then creates the child SA associated with specific DSCP values. In this example, it creates the SA associated with the DSCP value AF11 or AF3, followed by the one associated with  value of EF, but this does not follow any specific ordering.
The initiator specifies the DSCP values being classified in that SA with a DSCP Notify Payload that carries the DSCP values.</t>

<t>If the responder supports the DSCP Notify Payload, it SHOULD respond with a Notify Payload that indicates the DSCP values selected for that tunnel. 
By default these values SHOULD be the ones specified by the initiator, but the responder's policy MAY select other values. If the responder does not want to perform DSCP filtering, the responder SHOULD send a empty DSCP Notify Payload in order to at least indicate the support of the DSCP Notify Payload.</t>

<t>As specified in <xref section="3.10.1" sectionFormat="comma" target="RFC7296"/>, Notify Payload with status type MUST be ignored if not recognized.
The absence of a DSCP Notify Payload by the responder may be due to the responder not supporting the notification or not advertising the application of DSCP filtering. 
We do not consider that the absence of classification by the responder  prevents the SA to be created. The classification is at least performed for the outbound stream, which is sufficient to justify the creation of the additional SA.
Note also that DSCP values are not agreed, and the responder cannot for example narrow down the list of DSCP values being classified.
If that would cause a significant issue, the responder can create another SA with the narrow down list of DSCP values. The responder may also REKEY_SA the previously SA to redefine the DSCP values to be considered.</t>

<t>When multiple DSCP values are indicated, and the initiator is mapping the outer DSCP value, the outer DSCP value is expected to be one of these values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, AF11, AF3)} -->

                                <--  HDR, SK {SA, Nr, KEr, 
                                          N(DSCP, AF11, AF3)}
]]></artwork></figure>

<t>The initiator may then create additional child SAs specifying other DSCP values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, EE)} -->

                                <--  HDR, SK {SA, Nr, KEr}
]]></artwork></figure>

</section>
<section anchor="protocol-description"><name>Protocol Description</name>

<t>During the CREATE_CHILD_SA exchange, the initiator or the responder MAY indicate to the other peer the DSCP filtering policy applied to the SA. This is done via the DSCP Notify Payload indicating the DSCP values being considered for that SA.</t>

<t>The initiator MAY send an empty DSCP Notify Payload to indicate support of the DSCP Notify Payload as well as an indication the negotiated SA as a no-DSCP specific SA. This SA MAY be followed by the creation of  DSCP specific SA.</t>

<t>Upon receiving a DSCP Notify Payload, if the responder supports the notification it SHOULD respond with a DSCP Notify Payload. The value indicated SHOULD be the one selected by the initiator.</t>

<t>There is no specific error handling.</t>

</section>
<section anchor="payload-description"><name>Payload Description</name>

<t>The DSCP Notify Payload is based on the format of the Notify Payload as described in <xref section="3.10" sectionFormat="comma" target="RFC7296"/> and represented in <xref target="fig-np"/>.</t>

<figure title="Notify Payload" anchor="fig-np"><artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields Next Payload, Critical Bit, RESERVED, and Payload Length are defined in <xref target="RFC7296"/>.  Specific fields defined in this document are:</t>

<t><list style="symbols">
  <t>Protocol ID (1 octet):  Set to zero.</t>
  <t>Security Parameter Index (SPI) Size (1 octet):  Set to zero.</t>
  <t>Notify Message Type (2 octets):  Specifies the type of notification message.  It is set to DSCP_VALUES (see <xref target="sec-iana"/>).</t>
  <t>Notification Data (variable length): lists the DSCP values that are considered for the SA. Each value is encoded over a single byte.</t>
</list></t>

</section>
<section anchor="sec-iana"><name>IANA Considerations</name>

<t>IANA is requested to allocate one value in the "IKEv2 Notify Message Types - Status Types" registry:
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>

<figure><artwork><![CDATA[
  Value    Notify Messages - Status Types
-----------------------------------------
  TBD      DSCP 
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As the DSCP value field is already defined by <xref target="RFC4301"/> in the SA structure. As such security considerations of <xref target="RFC4301"/> apply.
The DSCP Notification Payload communicates clearly the DSCP value field to the responder.</t>

<t>When the tunnel mode is used, the communication of the DSCP value field could be easily interpreted by monitoring the received DSCP values of the inner traffic when that traffic is encapsulated, and so no secret information is revealed.
When the transport mode is used, that value may be changed by the network and eventually, the value of the field could be unknown to the other peer. However, this cannot be considered as a protection mechanism, and the communication of the DSCP value cannot be considered as revealing information that was previously not revealed.</t>

<t>The ability to indicate the other peer to set the DSCP value does not lead to the consumption of additional resources nor additional constraints. First, these SAs are anyway created either with DSCP values or without. Then, the responder may also ignore the DSCP Notification Payload and the fact that the SA has set a DSCP value field to specific values does not prevent the responder to send traffic with a different DSCP value over that SA.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Scott Fluhrer for his useful comments; Valery Smyslov, Tero Kivinen for their design suggestions we carefully followed.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC4301;
&RFC7296;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&I-D.ietf-ipsecme-diet-esp;


    </references>

</references>


<?line 209?>



  </back>

<!-- ##markdown-source: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-->

</rfc>

