Internet-Draft Renaming ESN in IKEv2 December 2024
Smyslov Expires 19 June 2025 [Page]
Workgroup:
Network Working Group
Internet-Draft:
draft-ietf-ipsecme-ikev2-rename-esn-01
Updates:
7296 (if approved)
Published:
Intended Status:
Standards Track
Expires:
Author:
V. Smyslov
ELVIS-PLUS

Renaming Extended Sequence Number (ESN) Transform Type in the Internet Key Exchange Protocol Version 2 (IKEv2)

Abstract

This documents clarifies and extends the meaning of transform type 5 in IKEv2. It updates RFC 7296 by renaming the transform type 5 from "Extended Sequence Numbers (ESN)" to "Sequence Numbers Properties (SNP)". It also renames two currently defined values for this transform type: value 0 from "No Extended Sequence Numbers" to "32-bit Sequential Numbers" and value 1 from "Extended Sequence Numbers" to "Partially Transmitted 64-bit Sequential Numbers".

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 19 June 2025.

Table of Contents

1. Introduction

IP Security (IPsec) Architecture [RFC4301] defines a set of security services provided by IPsec protocols Authentication Header (AH) [RFC4302] and Encapsulating Security Payload (ESP) [RFC4303]. One of these services is replay protection, which is called there anti-replay. In IPsec the anti-replay service is optional, each receiver of AH and ESP packets individually selects whether to enable it. The replay protection in AH and ESP is achieved by means of a monotonically increasing counter that never wraps around, which is sent in each AH or ESP packet in the Sequence Number field. The receiver maintains a sliding window that allows to detect duplicate packets.

Both AH and ESP allow to use either a 32-bit counter or a 64-bit counter. The latter case is referred to as Extended Sequence Numbers (ESN) in AH and ESP specifications. Since the Sequence Number field in both AH and ESP headers is only 32 bits in size, in case of ESN the high-order 32 bits of the counter are not transmitted and are instead deduced on the receiver based on previously received packets.

Since the decision whether to enable the anti-replay service is taken by the receiver based only on the receiver's local policy, the sender in accordance with AH ([RFC4302] Section 3.3.2) and ESP ([RFC4303] Section 3.3.3) specifications should always assume that the replay protection is enabled on receiving side. Thus the sender should always send the increasing counter values and should take care that the counter never wraps around. AH and ESP specifications also discuss situations when replay protection is not possible to achieve even if senders do all as prescribed -- like in multicast Security Associations (SAs) with multiple unsynchronized senders. Both AH and ESP specifications allow the sender to avoid maintaining the counter if the sender has been notified somehow that the anti-replay service is disabled by the receiver or is not possible to achieve.

AH and ESP Security Associations are usually established using the Internet Key Exchange protocol version 2 (IKEv2) [RFC7296]. The process of SA establishment includes calculation of a shared key and negotiation of various SA parameters, such as cryptographic algorithms. This negotiation in IKEv2 is performed via so called transforms (see Section 3.3.2 of [RFC7296]). The type of transform determines what parameter is being negotiated. Each transform type has an associated list of possible values (called Transform IDs), that determine the possible options for negotiation. See [IKEV2-IANA] for the list of transform types and associated transform IDs.

Transform type 5 "Extended Sequence Numbers (ESN)" is used in IKEv2 to negotiate the way sequence numbers for replay protection are generated, transmitted and processed in the context of an SA. For this transform type two values are defined -- "No Extended Sequence Numbers" and "Extended Sequence Numbers".

2. Problem Description

IKEv2 currently has no means to negotiate the case when both peers agree that replay protection is not needed. Even when both peers locally disable anti-replay service as receivers, they still need to maintain increasing sequence numbers as senders, taking care that they never wrap around (see [I-D.pan-ipsecme-anti-replay-notification]).

There is also no way to inform receivers that replay protection is not possible for a particular SA (for example in case of a multicast SA with several unsynchronized senders).

Future IPsec security protocols may provide more options for the handling of anti-replay counters, like sending full 64-bit sequence numbers or completely omitting them in packets (see [I-D.klassert-ipsecme-eesp]). These options will require means to be negotiated in IKEv2.

Transform type 5 looks like an appropriate candidate for addressing these issues: it is already used for negotiation of how sequence numbers are handled in AH and ESP and it is possible to define additional transform IDs that could be used in the corresponding situations. However, the current definition of transform type 5 is too narrow -- its name implies that this transform can only be used for negotiation of using ESN.

3. Extending the Semantics of Transform Type 5

This document extends the semantics of transform type 5 in IKEv2 to the following definition.

Transform type 5 defines the set of properties of sequence numbers of IPsec packets of a given SA when these packets enter the network.

This definition requires some clarifications.

Given this definition, transform type 5 in the IANA registries for IKEv2 [IKEV2-IANA] is renamed from "Extended Sequence Numbers (ESN)" to "Sequence Numbers Properties (SNP)".

It is expected that new transform IDs will be defined for this transform type in future (like in G-IKEv2 [I-D.ietf-ipsecme-g-ikev2] for the case of multicast SAs). Documents defining new transform IDs should include description of the properties the sequence numbers would have if the new transform ID is selected. In particular, this description should include discussion whether these properties allow to achieve replay protection. Some existing protocols (like Implicit IV in ESP [RFC8750] or Aggregation and Fragmentation for ESP [RFC9347]) rely on properties that are guaranteed for the currently defined transform IDs, but this might not be true for other transform IDs. The description of the sequence numbers properties for a new transform ID should also include discussion whether these protocols can be used if this transform ID is selected.

The two currently defined transform IDs for this transform type define the following sequence numbers properties.

Given the descriptions above and the new definition of transform type 5, the two currently defined transform IDs are renamed to better reflect the properties of sequence numbers they assume.

Note, that the above descriptions do not change the existing semantics of these transform IDs, they only provide clarification. Note also, that ESP and AH packet processing for these transform IDs is not affected, and bits on the wire do not change.

4. Security Considerations

This document does not affect security of the AH, ESP and IKEv2 protocols.

5. IANA Considerations

This document makes the following changes in the "Internet Key Exchange Version 2 (IKEv2) Parameters" IANA registries [IKEV2-IANA]. It is assumed that RFCXXXX refers to this specification.

6. Acknowledgements

This document was created as a result of discussions with Russ Housley, Tero Kivinen, Paul Wouters and Antony Antony about the best way to extend the meaning of the Extended Sequence Numbers transform in IKEv2.

7. References

7.1. Normative References

[IKEV2-IANA]
IANA, "Internet Key Exchange Version 2 (IKEv2) Parameters", <http://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml>.
[RFC4301]
Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, , <https://www.rfc-editor.org/info/rfc4301>.
[RFC4302]
Kent, S., "IP Authentication Header", RFC 4302, DOI 10.17487/RFC4302, , <https://www.rfc-editor.org/info/rfc4302>.
[RFC4303]
Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, DOI 10.17487/RFC4303, , <https://www.rfc-editor.org/info/rfc4303>.
[RFC7296]
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, , <https://www.rfc-editor.org/info/rfc7296>.

7.2. Informative References

[I-D.ietf-ipsecme-g-ikev2]
Smyslov, V. and B. Weis, "Group Key Management using IKEv2", Work in Progress, Internet-Draft, draft-ietf-ipsecme-g-ikev2-18, , <https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-g-ikev2-18>.
[I-D.klassert-ipsecme-eesp]
Klassert, S., Antony, A., and C. Hopps, "Enhanced Encapsulating Security Payload (EESP)", Work in Progress, Internet-Draft, draft-klassert-ipsecme-eesp-01, , <https://datatracker.ietf.org/doc/html/draft-klassert-ipsecme-eesp-01>.
[I-D.pan-ipsecme-anti-replay-notification]
Pan, W., He, Q., and P. Wouters, "IKEv2 Support for Anti-Replay Status Notification", Work in Progress, Internet-Draft, draft-pan-ipsecme-anti-replay-notification-01, , <https://datatracker.ietf.org/doc/html/draft-pan-ipsecme-anti-replay-notification-01>.
[RFC8750]
Migault, D., Guggemos, T., and Y. Nir, "Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)", RFC 8750, DOI 10.17487/RFC8750, , <https://www.rfc-editor.org/info/rfc8750>.
[RFC9347]
Hopps, C., "Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)", RFC 9347, DOI 10.17487/RFC9347, , <https://www.rfc-editor.org/info/rfc9347>.

Author's Address

Valery Smyslov
ELVIS-PLUS
Russian Federation