<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC4301 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC7296 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY I-D.ietf-ipsecme-diet-esp SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-diet-esp.xml">
]>


<rfc ipr="pre5378Trust200902" docName="draft-mglt-ipsecme-dscp-np-04" category="std" consensus="true" submissionType="IETF" updates="4301" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DSCP Notify Payload">Differentiated Services Field Codepoints Internet Key Exchange version 2 Notification</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization>Ericsson</organization>
      <address>
        <email>joel.halpern@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Preda" fullname="Stere Preda">
      <organization>Ericsson</organization>
      <address>
        <email>stere.preda@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Liu" fullname="Daiying Liu">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>
    <author initials="U." surname="Parkholm" fullname="U. Parkholm">
      <organization>Ericsson</organization>
      <address>
        <email>ulf.x.parkholm@ericsson.com</email>
      </address>
    </author>

    <date year="2025" month="October" day="08"/>

    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 47?>

<t>This document outlines the DSCP Notification Payload, which, during a CREATE_CHILD_SA Exchange, explicitly indicates the DSCP code points that will be encapsulated in the newly established tunnel.  This document updates RFC 4301.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="requirements-notation"><name>Requirements Notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?></t>

</section>
<section anchor="introduction"><name>Introduction</name>

<t>In the ESP Header Compression Profile Diet-ESP <xref target="I-D.ietf-ipsecme-diet-esp"/>, two communicating peers can reach an agreement on DSCP values as part of a compression context. Within this context, DSCP values serve not only as classifiers but are also compressed by the sending peer and subsequently decompressed by the receiving peer for both incoming and outgoing traffic. This process necessitates a mutual agreement on DSCP values for a specific pair of Security Associations (SAs). The DSCP Notification Payload outlined in this specification facilitates the negotiation of these DSCP values for a pair of SAs during the CREATE_CHILD_SA Exchange.</t>

<t>Furthermore, the explicit negotiation of DSCP values enhances the "classifier" mechanism, allowing for the establishment of this mechanism and the agreement on various clusters of DSCP values to be considered for each pair of SAs. <xref section="4.1" sectionFormat="comma" target="RFC4301"/> recognizes that aggregating traffic with multiple DSCP values over a single SA may lead to the inappropriate discarding of lower-priority packets due to the windowing mechanism employed by this feature. To mitigate this issue, <xref section="4.1" sectionFormat="comma" target="RFC4301"/> advises that the sender implement a "classifier" mechanism to distribute traffic across multiple SAs. While <xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> refers to the "DSCP values" fields in the Security Association Database (SAD), <xref target="RFC7296"/> does not provide a way for peers to indicate which classification is ongoing nor which "DSCP values" are linked to the created SA. This document addresses that deficiency by specifying the DSCP Notification Payload, which explicitly identifies the DSCP code points that will be tunneled in the newly established tunnel during a CREATE_CHILD_SA Exchange.</t>

<t>It is essential to recognize that in a standard "classifier" context, there is no necessity for the same cluster of DSCP values to be linked to both the inbound and outbound Security Associations (SAs) of a specific pair. Typically, one peer may employ one pair of SAs, while the other peer may choose a different pair. This flexibility arises because DSCP values are applied exclusively by the sending node, rather than the receiving node. Although the use of the DSCP Notification Payload does not inhibit such configurations, it is likely to diminish their occurrence. Conversely, we anticipate that the explicit negotiation of DSCP values and pairs of SAs will facilitate the management of these "classifiers."</t>

</section>
<section anchor="sec-rfc4301"><name>RFC4301 Clarification</name>

<t><xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> mentions</t>

<t><list style="symbols">
  <t>DSCP values -- the set of DSCP values allowed for packets carried over this SA.  If no values are specified, no DSCP-specific filtering is applied.  If one or more values are specified, these are used to select one SA among several that match the traffic selectors for an outbound packet.  Note that these values are NOT checked against inbound traffic arriving on the SA.</t>
</list></t>

<t>The text does not clearly specify what happens when the DSCP of a packet does not match any of the corresponding DSCP values.
This document proposes the following text:</t>

<t><list style="symbols">
  <t>DSCP values -- the set of DSCP values allowed for packets carried
    over this SA. If no values are specified, no DSCP-specific
    filtering is applied.  If one or more values are specified, these
    are used to select one SA among several that match the traffic
    selectors for an outbound packet. In case of multiple matches a preference to the most selective list DSCP value could be implemented by the peer's policy. 
    If the DSCP value of the packet does not match any of the DSCP values provided by the associated matching SAs and there is at least one SA with no DSCP-specific filtering, then, one of these SA SHOULD be selected. On the other hand, if all SAs have DSCP filtering, then, any of the matching SAs can be selected. Note that these values MUST NOT be checked against inbound traffic arriving on the SA.</t>
</list></t>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<t>The illustrative example of this section considers the following use case:</t>

<t><list style="symbols">
  <t>Expedited Forwarding (EF) with low latency traffic has its own IPsec tunnel,</t>
  <t>Assured Forward (AF) classes with different drop precedence (which may take a different route) have their own tunnel,</t>
  <t>and all remaining DSCP values are put into a third tunnel.</t>
</list></t>

<t>This section details how a peer uses the DSCP Notify Payload to classify traffic carrying the DSCP values AF11 or AF3 in one tunnel, traffic carrying a DSCP value of EF in another tunnel, and traffic with other DSCP values in a third tunnel.
The third SA is designated as the default no-DSCP specific SA. It is RECOMMENDED to configure the Security Policy Data Base (SPD), so that such a default no-DSCP specific SA is created and it is RECOMMENDED its creation happens prior to the SA with specific DSCP values. 
Note that according to <xref target="sec-rfc4301"/>, there is no specific ordering, but starting with the no-DSCP specific SA ensures compatibility with an IPsec implementation that would for example discard or create a new SA when the DSCP does not match.</t>

<t>Generally, it is recommended that the outer DSCP value matches the inner DSCP value so that the tunneled packet be treated similarly to the inner packet. Such behavior is provided by setting the Bypass DSCP to True.
If the initiator prefers for example every tunneled packet being treated similarly, then, an explicit mapping needs to be indicated. Typically, the initiator may be willing to prevent reordered traffic to fall outside the anti-replay windows.
Note that such policy is implemented by each peer.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {IDi, [CERT,] [CERTREQ,]
       [IDr,] AUTH, SAi2,
       TSi, TSr}  -->

                                <--  HDR, SK {IDr, [CERT,] AUTH,
                                         SAr2, TSi, TSr}
]]></artwork></figure>

<t>Once the no-DSCP specific SA is created, all traffic with any DSCP value is steered to that SA. The initiator then creates the child SA associated with specific DSCP values. In this example, it creates the SA associated with the DSCP value AF11 or AF3, followed by the one associated with  value of EF, but this does not follow any specific ordering.
The initiator specifies the DSCP values being classified in that SA with a DSCP Notify Payload that carries the DSCP values.</t>

<t>If the responder supports the DSCP Notify Payload, it SHOULD respond with a Notify Payload that indicates the DSCP values selected for that tunnel. 
By default these values SHOULD be the ones specified by the initiator, but the responder's policy MAY select other values. If the responder does not want to perform DSCP filtering, the responder SHOULD send an empty DSCP Notify Payload, in order to at least indicate support for the DSCP Notify Payload.</t>

<t>As specified in <xref section="3.10.1" sectionFormat="comma" target="RFC7296"/>, a Notify Payload with status type MUST be ignored if it is not recognized.
The absence of a DSCP Notify Payload by the responder may be due to the responder not supporting the notification, or not advertising the application of DSCP filtering. 
We do not consider that the absence of classification by the responder prevents the SA from being created. The classification is at least performed for the outbound stream, which is sufficient to justify the creation of the additional SA.
Note also that DSCP values are not agreed, and the responder cannot for example narrow down the list of DSCP values being classified.
If that would cause a significant issue, the responder can create another SA with the narrowed-down list of DSCP values. The responder may also REKEY_SA the previous SA to redefine the DSCP values to be considered.</t>

<t>When multiple DSCP values are indicated, and the initiator is mapping the outer DSCP value, the outer DSCP value is expected to be one of these values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, AF11, AF3)} -->

                                <--  HDR, SK {SA, Nr, KEr, 
                                          N(DSCP, AF11, AF3)}
]]></artwork></figure>

<t>The initiator may then create additional child SAs specifying other DSCP values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   ----------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, EE)} -->

                                <--  HDR, SK {SA, Nr, KEr}
]]></artwork></figure>

</section>
<section anchor="protocol-description"><name>Protocol Description</name>

<t>During the CREATE_CHILD_SA exchange, the initiator or the responder MAY indicate to the other peer the DSCP filtering policy applied to the SA. This is done via the DSCP Notify Payload indicating the DSCP values being considered for that SA.</t>

<t>The initiator MAY send an empty DSCP Notify Payload to indicate support of the DSCP Notify Payload as well as an indication the negotiated SA as a no-DSCP specific SA. This SA MAY be followed by the creation of the DSCP-specific SA.</t>

<t>Upon receiving a DSCP Notify Payload, if the responder supports the notification it SHOULD respond with a DSCP Notify Payload. The value indicated SHOULD be the one selected by the initiator.</t>

<t>There is no specific error handling.</t>

</section>
<section anchor="payload-description"><name>Payload Description</name>

<t>The DSCP Notify Payload is based on the format of the Notify Payload as described in <xref section="3.10" sectionFormat="comma" target="RFC7296"/> and represented in <xref target="fig-np"/>.</t>

<figure title="Notify Payload" anchor="fig-np"><artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields Next Payload, Critical Bit, RESERVED, and Payload Length are defined in <xref target="RFC7296"/>.  Specific fields defined in this document are:</t>

<t><list style="symbols">
  <t>Protocol ID (1 octet):  Set to zero.</t>
  <t>Security Parameter Index (SPI) Size (1 octet):  Set to zero.</t>
  <t>Notify Message Type (2 octets):  Specifies the type of notification message.  It is set to DSCP_VALUES (see <xref target="sec-iana"/>).</t>
  <t>Notification Data (variable length): lists the DSCP values that are considered for the SA. Each value is encoded over a single byte.</t>
</list></t>

</section>
<section anchor="sec-iana"><name>IANA Considerations</name>

<t>IANA is requested to allocate one value in the "IKEv2 Notify Message Types - Status Types" registry:
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>

<figure><artwork><![CDATA[
  Value    Notify Messages - Status Types
-----------------------------------------
  TBD      DSCP 
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As the DSCP value field is already defined by <xref target="RFC4301"/> in the SA structure, the security considerations of <xref target="RFC4301"/> apply.
The DSCP Notification Payload communicates clearly the DSCP value field to the responder.</t>

<t>When the tunnel mode is used, the communication of the DSCP value field could be easily interpreted by monitoring the received DSCP values of the inner traffic when that traffic is encapsulated, and so no secret information is revealed.
When the transport mode is used, that value may be changed by the network and eventually, the value of the field could be unknown to the other peer. However, this cannot be considered as a protection mechanism, and the communication of the DSCP value cannot be considered as revealing information that was previously not revealed.</t>

<t>The notification of the set of DSCP values to the other peer does not require additional resources either for the initiator or for the receiver. The SA is created either with DSCP values or without.</t>

<t>Similarly, the notification of the set of DSCP values to the other peer does not introduce additional constraints on the traffic. First, the responder may also ignore the DSCP Notification Payload. Then, when an SA is associated with a set of DSCP values, this does not prevent the other peer from sending traffic with a different DSCP value over that SA. In other words, traffic coming with unexpected DSCP values is not rejected as would have been the case if the DSCP values had been considered as Traffic Selectors.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Scott Fluhrer for his useful comments; Valery Smyslov, Tero Kivinen for their design suggestions we carefully followed. We would also like to thank William Atwood for his careful review and suggestions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC8174;
&RFC4301;
&RFC7296;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&I-D.ietf-ipsecme-diet-esp;


    </references>

</references>


<?line 221?>



  </back>

<!-- ##markdown-source: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-->

</rfc>

