<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pan-ipsecme-esp-trailer-adjustment-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Adjustments of ESP Trailer">Considerations for Adjustments of Encapsulating Security Payload (ESP) Trailer</title>
    <seriesInfo name="Internet-Draft" value="draft-pan-ipsecme-esp-trailer-adjustment-00"/>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Fang" fullname="Chenyuan Fang">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>fangchenyuan@hisilicon.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>Implementing IPsec in hardware is a way to improve the forwarding performance of IPsec. However, the current IPsec ESP packet design, i.e., the position of ESP trailer, imposes a new overhead challenge for implementing IPsec in hardware. This document explains how this overhead challenge occurs and proposes the possible solutions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pan-ipsecme-esp-trailer-adjustment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsec Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IPsec <xref target="RFC4301"/> is widely used to provide security for IP communications. It can adapt to various scenarios with the two protocols of AH <xref target="RFC4302"/> and ESP <xref target="RFC4303"/> and the two modes of tunnel and transport. For example, IPsec can create a secure tunnel between two gateways to protect traffic between sites, such as between an enterprise's branch and its headquarters and between data centers.</t>
      <t>IPsec has an impact on forwarding performance due to the increased overhead of encryption and decryption processing of IP packets. Hence, the performance improvement of IPsec has been a significant concern in the industry, especially in the above scenarios where the original traffic rate is considerably high.</t>
      <t>There have been some different approaches to address the performance issues of IPsec. One is to use more efficient cryptographic algorithms. For example, using the AES-GCM algorithm <xref target="RFC4106"/> provides the same level of security as the AES-CBC algorithm but is more efficient. Another is to use cryptographic hardware acceleration. Hardware accelerators use specialized hardware to perform encryption and decryption operations (other operations of IPsec remain being implemented by software).</t>
      <t>MACsec <xref target="MACsec"/> is a Layer 2 security protocol that provides security for networks like data centers and enterprise networks. Since the requirement of hop-by-hop deployment, MACsec is more complex to deploy when compared to IPsec, but it has the distinct advantage of high forwarding performance, which can even reach the line rate. One important reason is that the entire MACsec process (not just encryption and decryption processing) is implemented by hardware. Similarly, utilizing hardware to implement the whole IPsec process is also an effective means to improve IPsec performance.</t>
      <t>However, the position of the ESP trailer in the IPsec ESP-encapsulated packets poses a new overhead challenge for implementing IPsec in hardware.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Implementing IPsec in hardware is an ideal way to improve performance, but it is also expensive. Not to mention the cost of designing and manufacturing the hardware, IPsec ESP imposes additional costs on the hardware due to its protocol design.</t>
      <t>The IPsec ESP protocol places the Next Header and Padding in the ESP trailer at the end of the packet. Based on the current design, after processing the plain text of the IPsec ESP packet ( ESP Header and the content before ), the (receiving) hardware can't use the manner of "decrypting and then transmitting" to deal with the Payload Data. It must cache the decrypted payload because it doesn't know how to reorganize the packet header before the payload, until it gets the Next Header and Padding information from the ESP trailer. For example, in the ESP tunnel mode, the EtherType field in the Ethernet frame should be set according to whether the inner packet is IPv4 or IPv6. In another example, in the ESP transport mode, the length field in the IP header should be adjusted according to the Padding length.</t>
      <t>Such a requirement for caching payload is at a considerable cost to the hardware chip, including increased chip area and packet processing latency. A larger chip area means greater power consumption, which is not eco-friendly and not in line with the current trend towards green energy efficiency.</t>
    </section>
    <section anchor="possible-solution">
      <name>Possible Solution</name>
      <t>Suppose the Next Header and Padding information can be obtained immediately after processing the ESP Header, even in the cipher text. In that case, the hardware can perform all operations sequentially without additional caching. The possible solutions to accomplish this goal are listed below.</t>
      <section anchor="simplified-next-header-judgment-in-esp-tunnel-mode">
        <name>Simplified Next Header Judgment in ESP Tunnel Mode</name>
        <t>In ESP tunnel mode, the inner payload is usually an IPv4 or IPv6 packet, and the first byte of both types of packets indicates the IP protocol version (4 for IPv4, 6 for IPv6). Therefore, instead of determining the protocol type of inner payload based on the Next Header field in the ESP trailer, one possible solution is to decrypt the first byte after the ESP Header and determine whether the inner payload is IPv4 or IPv6 based on the value of that byte.</t>
        <t>However, the ESP protocol <xref target="RFC4303"/> describes the behavior of sending and discarding the dummy packet in support of traffic flow confidentiality. The dummy packet is generated by the sender by randomly generating a payload and discarded by the receiver by recognizing the value of 59 in the Next Header field. Since the payload is randomly generated, the value of its first byte maybe 4 or 6, which will cause the receiver to misjudge when this simplified Next Header judgment method is used.</t>
        <t>In an enterprise or data center network scenario, the two gateways usually do not send the dummy packet after establishing an ESP tunnel. Therefore, this simplified judgment is a relatively practical solution in these scenarios. To be on the safe side, adding a new negotiation between the two gateways can be considered, i.e., to negotiate not sending dummy packets when creating a Child SA in IKEv2 <xref target="RFC7296"/>.</t>
      </section>
      <section anchor="adjust-esp-packet-format">
        <name>Adjust ESP Packet Format</name>
        <t>Another solution is to change the ESP packet format by moving the ESP trailer's position to right after the ESP Header, still retaining encryption on the ESP trailer.</t>
        <figure anchor="newformat">
          <name>New ESP Packet Format</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ----
|               Security Parameters Index (SPI)                 | ^Int.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Cov-
|                      Sequence Number                          | |ered
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ----
|  Next Header  |  Pad Length   |     Padding (0-255 bytes)     | |   ^
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +-+-+-+-+-+-+-+-+ |   |
|                                               |               | |Conf.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               + |Cov-
|                    Payload Data* (variable)                   | |ered*
~                                                               ~ |   |
|                                                               | v   v
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ------
|         Integrity Check Value-ICV   (variable)                |
~                                                               ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>For the consideration of compatibility, the IPsec peers need to explicitly negotiate the use of this new ESP format when creating the Child SA.</t>
        <t>This solution works not only for ESP tunnel mode but also for ESP transport mode. However, accordingly, it has more changes to the protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4106">
          <front>
            <title>The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)</title>
            <author fullname="J. Viega" initials="J." surname="Viega"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as an IPsec Encapsulating Security Payload (ESP) mechanism to provide confidentiality and data origin authentication. This method can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4106"/>
          <seriesInfo name="DOI" value="10.17487/RFC4106"/>
        </reference>
        <reference anchor="MACsec" target="https://ieeexplore.ieee.org/document/8585421">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Security</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="September" day="27"/>
          </front>
          <seriesInfo name="IEEE Std 802.1AE-2018" value=""/>
        </reference>
      </references>
    </references>
    <?line 145?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
