<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-colitti-ipsecme-esp-ping-01" category="std" consensus="true" updates="4303" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="ESP-PING">ESP Echo Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-colitti-ipsecme-esp-ping-01"/>
    <author initials="L." surname="Colitti" fullname="Lorenzo Colitti">
      <organization>Google</organization>
      <address>
        <email>lorenzo@google.com</email>
      </address>
    </author>
    <author initials="J." surname="Linkova" fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="February" day="29"/>
    <area>Internet</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 43?>

<t>This document defines an ESP echo function which can be used to detect whether a given network path supports IPv6 ESP packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 47?>

<section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>IPsec sessions between nodes that have global connectivity will by default use unencapsulated IPv6 ESP, i.e., IPv6 packets with a Next Header value of 50. ESP packets may have advantages over ESP-in-UDP encapsulation, such as:</t>
      <ul spacing="normal">
        <li>
          <t>They require fewer keepalive packets to keep sessions open.</t>
        </li>
      </ul>
      <t>** On some networks, ESP is be statelessly allowed in both directions, and thus not require any keepalive packets at all. For example, the IPv6 Simple Security recommendations <xref target="RFC6092"/> specify that ESP by default must always be allowed and not be subject to any timeouts.</t>
      <t>** Even if ESP is not statelessly allowed, experience from real world networks is that timeouts for ESP are higher than for UDP sessions, thus requiring IPsec endpoints to send fewer keepalives.</t>
      <ul spacing="normal">
        <li>
          <t>They provide slightly lower overhead, due to the absence of the UDP header.</t>
        </li>
      </ul>
      <t>However, because ESP packets do not share fate with IKE packets, it is possible for the network to allow IKE packets but not ESP packets.
This leads to the IPsec session not being able to exchange any packets even though IKE negotiation succeeded.</t>
      <t>Because ESP is only used after IKE negotiation, this failure mode is difficult to predict, difficult to detect, and difficult to recover from. In particular, migrating a session using MOBIKE <xref target="RFC4555"/> to a network that does not allow ESP could result in the session blackholing all future packets until the problem is detected and a new migration is performed to enable encapsulation.</t>
      <t>Operational experience suggests that networks and some home routers that drop ESP packets are common enough to be a problem for general purpose VPN applications desiring to work reliably on the Internet.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="protocol-specification">
      <name>Protocol Specification</name>
      <t>An IPv6 node that desires to determine whether the path to a particular destination can support ESP packets can send an ESP Echo Request packet to that destination. ESP Echo Request packets are ESP packets with an SPI value of (7-TBD), a Next Header value of 59 (No Next Header), and no payload.</t>
      <t>If the destination supports ESP, and wishes to reveal to the sender that it does so, it SHOULD reply with an ESP Echo Reply packet. ESP Echo Reply packets are ESP packets with an SPI value of (8-TBD), a Next Header value of 59, and no payload.</t>
      <t>The ESP Echo Request and Reply packets utilize the standard ESP packet format as described in Section 2 of <xref target="RFC4303"/> with the following changes:</t>
      <ul spacing="normal">
        <li>
          <t>SPI set to
          </t>
          <ul spacing="normal">
            <li>
              <t>[ESP-ECHO-REQUEST] for ESP Echo Request</t>
            </li>
            <li>
              <t>[ESP-ECHO-REPLY] for ESP Echo Reply</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The Next Header field of the ESP header SHOULD be set to 59 (No Next Header).</t>
        </li>
        <li>
          <t>No Integrity Check Value-ICV.</t>
        </li>
      </ul>
      <t>The payload has the following format:</t>
      <artwork><![CDATA[
 0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |        ECHO Identifier        |      ECHO Sequence Number     |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Data ...                                                  |
 +-+-+-+-+-


* ECHO Identifier: An identifier to aid in matching Echo Replies to Echo Requests. MAY be zero.
  Implementations that support multiple simultaneous Echo Request sessions MUST ensure that
  different sessions have different identifiers. Implementations that are not aware of other
  implementations that might be running on the same node at the same time SHOULD randomize the
  identifier to prevent collisions, and MUST be prepared to receive responses to packets that
  were sent by another implementation.

* ECHO Sequence Number: An identifier to aid in matching Echo Replies to Echo Requests. MAY be zero.

* Data: Zero or more octets of arbitrary data.
]]></artwork>
      <t>Figure 1: ESP Echo Request and Reply Payload Overview</t>
      <t>An IPsec peer, prior to an IKE negotiation or after completing an IPsec negotiation, intending to ascertain the path's capability to support ESP packets to a specific destination, MAY send one or more ESP Echo Request packet(s) to the destination.
Should the destination support ESP and intend to communicate this capability to the potential IPsec peer, it SHOULD respond with an ESP Echo Reply packet.</t>
      <t>The sender MAY send ESP Echo packets with zero data. 
When responding to an ESP Echo packet, the node MUST copy the data from the ESP Echo packet to the ESP Echo Reply packet, up to the limit of the MTU of the path back to the sender.</t>
    </section>
    <section anchor="discovering-esp-echo-support">
      <name>Discovering ESP Echo Support</name>
      <t>If no response is received to an ESP Echo Request packet, it can be caused by one of the following:</t>
      <ul spacing="normal">
        <li>
          <t>the peer doesn't support ESP Echo protocol.</t>
        </li>
        <li>
          <t>there is no end-to-end ESP connectivity.</t>
        </li>
      </ul>
      <t>Without some prior knowledge about ESP Echo support by the remote side, the sender can not distibguish those two scenarios.
Therefore the sender SHOULD NOT treat lack of response as an indicator of end-to-end connectivity issues until an explicit confirmation of ESP Echo support by the peer is received. 
The sender MAY use any means of obtaining the information about  ESP Echo support, such as an explicit out-of-band configuration (for example, a VPN client might be configured to always use ESP Echo when communicating to the given VPN server).</t>
    </section>
    <section anchor="updates-to-rfc4303">
      <name>Updates to RFC4303</name>
      <t>Section 2.6 of <xref target="RFC4303"/> discusses "dummy" ESP packets, which are distinguishable by the Next Header value set to 59.
As per <xref target="RFC4303"/> a receiver MUST be prepared to silently discard "dummy" packets. This document updates Section 2.6 of <xref target="RFC4303"/> to allow packets with the Next Header value of 59 to be processed, if SPI is set to [ESP-ECHO-REQUEST] or [ESP-ECHO-REPLY].</t>
      <t>OLD TEXT:</t>
      <t>A transmitter MUST be capable of generating dummy packets marked with this value in the next protocol field, and a receiver MUST be prepared to discard such packets, without indicating an error.</t>
      <t>NEW TEXT:</t>
      <t>A transmitter MUST be capable of generating dummy packets marked with this value in the next protocol field, and a receiver MUST be prepared to discard such packets, without indicating an error.
A transmitter MUST NOT use the reserved SPI values [ESP-ECHO-REQUEST] or [ESP-ECHO-REPLY] for dummy packets. A receiver SHOULD NOT discard packets with  the Next Header value set of 59, if those packets use the reserved SPI values.
Packets with the reserved SPI values [ESP-ECHO-REQUEST] or [ESP-ECHO-REPLY] and the Next Header value set of 59 SHOULD be processed by the receiver as described in draft-colitti-ipsecme-esp-ping.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>To prevent a downgrade attack, the IPSec-capable node MUST NOT fall back to unencrypted mode of communication in case of ESP Echo failure.
The node MAY switch to another path (e.g. via another interface) or another protocol (e.g. IPv4).</t>
      <t>The security considerations are similar to other unconnected request-reply protocols such as ICMPv6 echo. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>By sending an ESP Echo Request from a spoofed source address, an attacker could cause a server to send an ESP Echo Reply to that address. This does not constitute an amplification attack because the ESP Echo Reply is the same size as the ESP Echo Request. This can be prevented by implementing ingress filtering per BCP 38 <xref target="RFC2827"/>.</t>
        </li>
        <li>
          <t>An attacker can use ESP Echo Request packets to determine whether a particular destination address is an ESP endpoint. This is not a new attack because any endpoint that supports ESP must also reply to IKE INIT packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This memo requests that IANA allocate two new values from the "Security Parameters Index (SPI)" registry. The following entry should be appended:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Description</th>
            <th align="right">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">7-ESP-ECHO-REQUEST</td>
            <td align="left">ESP Echo Request</td>
            <td align="right">THIS DOCUMENT</td>
          </tr>
          <tr>
            <td align="left">8-ESP-ECHO-REPLY</td>
            <td align="left">ESP Echo Reply</td>
            <td align="right">THIS DOCUMENT</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Tero Kivinen, Steffen Klassert, Andrew McGregor, and Paul Wouters for helpful discussion and suggestions.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6092" target="https://www.rfc-editor.org/info/rfc6092" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6092.xml">
          <front>
            <title>Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service</title>
            <author fullname="J. Woodyatt" initials="J." role="editor" surname="Woodyatt"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document identifies a set of recommendations for the makers of devices and describes how to provide for "simple security" capabilities at the perimeter of local-area IPv6 networks in Internet-enabled homes and small offices. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6092"/>
          <seriesInfo name="DOI" value="10.17487/RFC6092"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4555" target="https://www.rfc-editor.org/info/rfc4555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4555.xml">
          <front>
            <title>IKEv2 Mobility and Multihoming Protocol (MOBIKE)</title>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document describes the MOBIKE protocol, a mobility and multihoming extension to Internet Key Exchange (IKEv2). MOBIKE allows the IP addresses associated with IKEv2 and tunnel mode IPsec Security Associations to change. A mobile Virtual Private Network (VPN) client could use MOBIKE to keep the connection with the VPN gateway active while moving from one address to another. Similarly, a multihomed host could use MOBIKE to move the traffic to a different interface if, for instance, the one currently being used stops working. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4555"/>
          <seriesInfo name="DOI" value="10.17487/RFC4555"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
