<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt"?>
<rfc category="std"
    consensus="true"
     docName="draft-ietf-ipsecme-encrypted-esp-ping-03"
     ipr="trust200902"
    sortRefs="true"
    submissionType="IETF"
    symRefs="true"
    tocDepth="3"
    tocInclude="true"
    updates="9347"
    version="3">
  <front>
    <title abbrev="Encrypted Esp Ping">Encrypted ESP Echo Protocol</title>
<author initials='A.' surname='Antony' fullname='Antony Antony'><organization abbrev="secunet">secunet Security Networks AG</organization>
<address><email>antony.antony@secunet.com</email></address>
</author>
<author initials='S.' surname='Klassert' fullname='Steffen Klassert'><organization abbrev="secunet">secunet Security Networks AG</organization>
<address><email>steffen.klassert@secunet.com</email></address>
</author>
  <date/>
    <area>Internet</area>
    <workgroup>IP Security Maintenance and Extensions</workgroup>
<keyword>IPsec</keyword>
<keyword>ESP</keyword>
<keyword>Ping</keyword>
<abstract><t></t>

<t>This document defines the Encrypted ESP Echo Function, a mechanism
to assess the reachability of IP Security (IPsec) network
paths using Encapsulating Security Payload (ESP) packets. It detects
end-to-end path status by exchanging only encrypted ESP packets between
IPsec peers. The Encrypted Echo message can either use existing
congestion control payloads from RFC9347 or a new message format
defined here, with an option to specify a preferred return path when
there is more than one pair of IPsec SAs between the same set of
IPsec peers.</t>

<t>A peer can announce support using a new IKEv2 Status Notification
ENCRYPTED_PING_SUPPORTED.</t></abstract>
  </front>
  <middle>
<section title="Introduction">
<t>In response to the operational need for a data-plane
failure-detection mechanism for IP Security (IPsec) Encapsulating
Security Payload (ESP) from <xref target="RFC4303"/>, this document introduces
Encrypted ESP Ping, including the Echo Request and Response.
This protocol assesses network path reachability dynamically and can
optionally specify a return path for echo Reply messages.</t>

<t>Encrypted ESP Ping supports two modes of operation. In the first
mode, peers that have negotiated USE_AGGFRAG <xref target="RFC9347"/> can use the
existing Congestion Control payload for echo requests and responses.
In the second mode, peers negotiate ENCRYPTED_PING_SUPPORTED via
IKEv2, which uses a new payload format defined in this document and
commits the peer to responding.</t>

<t>The approach for specifying a preferred return path is inspired by
Return Path Specified LSP Ping <xref target="RFC7110"/>.</t>

<t>This document covers only Encrypted ESP Ping, typically used after
an IKE negotiation, while <xref target="I-D.ietf-ipsecme-esp-ping"/> specifies
an unauthenticated ESP Ping to be used before IKE negotiation.</t>

<t>This document updates <xref target="RFC9347"/> by defining new AGGFRAG_PAYLOAD
sub-types for ESP Echo Request and Response, which may be used under
ENCRYPTED_PING_SUPPORTED negotiation without requiring USE_AGGFRAG.</t>
<section title="Terminology">
<t>This document uses the following terms defined in <xref target="RFC4301"/>:
Encapsulating Security Payload (ESP), Security Association (SA),
Security Policy Database (SPD).</t>

<t>This document uses the following terms defined in <xref target="RFC9347"/>:
AGGFRAG tunnel.</t>

</section>

</section>
<section title="Requirements Language">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/>when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section title="Use cases">
<t>Diagnosing operational problems in IPsec can be challenging.
Encrypted ESP Echo addresses these challenges; Encrypted ESP Ping is
one such tool.</t>
<section title="ESP Blocked or Filtered">
<t>An IPsec session typically employs ESP, using IP or IPv6 packets. ESP
parameters are negotiated using IKEv2, with default IKEv2 messages
exchanged over UDP port 500. In scenarios where ESP packets are not
encapsulated in UDP (i.e., using the ESP protocol), successful IKE
negotiation may occur, but ESP packets might fail to reach the peer
due to differences in the packet path or filtering policies compared
to IKE packets (e.g., UDP is allowed while ESP is filtered, typically
due to misconfiguration). When using UDP encapsulation,
ESP packets may encounter different filtering policies. This is
typically due to broken packet filtering. Although this is less
likely, it is still possible and can be difficult to diagnose.
Operational experience suggests that networks and some home routers
that drop ESP packets are common enough to cause problems for general-
purpose VPN applications that require reliable performance on the
Internet. Encrypted ESP Ping would greatly assist in diagnosing these
scenarios. When IKEv2 operates over TCP to accommodate
large post-quantum key exchanges while ESP may use a separate network
path, Encrypted ESP Ping can verify ESP reachability
independently of the IKEv2 control channel
<xref target="I-D.ietf-ipsecme-ikev2-reliable-transport"/>.</t>

</section>
<section title="Probing Multiple Paths">
<t>When there are multiple paths created using multiple Child SAs with
identical Traffic Selectors as specified in <xref target="RFC7296"/>, there is a
need to probe each Child SA, including the network path,
independently from an IPsec peer. Each SA may traverse different
network paths and may have different policies. Encrypted ESP Ping determines the reachability of each path
independently.</t>

</section>
<section title="Probe Return Path">
<t>IPsec Security Associations (SAs) are negotiated as a pair,
consisting of two unidirectional SAs in one exchange. IKEv2
<xref target="RFC7296"/> Section 2.9 allows installing multiple Child SAs with
identical Traffic Selectors. When there are multiple paths, the
Encrypted ESP Ping SHOULD support requesting an echo response via a
specific return path IPsec SA. To request a return path, additional
attributes are necessary. The initiator would propose a specific SPI as
the preferred return path. A specific return path SPI is necessary
when to probe a specific path among multiple possible SAs between
same peer. Multiple paths can exist for various reasons, such as a
primary and secondary path scenario. For example over a satellite link and over fiber, the
receiving peer may have a policy to respond via the fiber path even
when the request arrives via the satellite link. If the initiator
requests a return path, the responder SHOULD try to respond via that
IPsec SA. However, the final decision is up to the responder.
If the responder decides to send the response via a different path
than the requested return path, the initiator SHOULD detect this
mismatch and report it, e.g., via a status code to the requesting, local, process.</t>

</section>
<section title="Manually Probing a Constant Rate on the AGGFRAG Tunnel">
<t>AGGFRAG probes, whether sent at a constant or variable rate, can
derive reachability information for the IPsec SA, similar to
Encrypted ESP Ping. Since the probes are sent over an IPsec tunnel,
the reachability information is reliable. IP Traffic Flow Security
(IP-TFS) <xref target="RFC9347"/> uses AGGFRAG at a constant rate; an Encrypted
ESP Ping application may also send AGGFRAG payloads for manual
diagnostic purposes.</t>

</section>
<section title="Why Not Use Existing IP Tools">
<t>Existing tools such as ICMP ping or traceroute assume IP
connectivity. However, in IPsec gateway setups, the gateway itself
may not have an IP address that matches the IPsec Security Policy
Database (SPD). A peer MUST accept Encrypted ESP Ping messages even
when it does not math a local SPD.</t>

<t>In the case of multiple SAs as mentioned above, IP
tools would find it hard, if not impossible, to generate IP traffic
to explore multiple paths specifically</t>

</section>
<section title="Also Track Incoming Traffic for liveness check">
<t>Outgoing probes alone do not cover IPsec path health; incoming traffic must also be monitored. Incoming per-SA byte and packet counters maintained by IPsec are
cryptographically verified: a counter can only increment if a valid
authenticated ESP packet was received. These counters reliably
indicate a viable path. This should be
taken into account when probing IPsec paths. For example, when the
crypto subsystem is overloaded, the responder may miss out on
Encrypted ESP Ping responses. Tracking the incoming traffic after the ping probe is sent allows
applications to confirm the IPsec path is still viable.</t>

</section>

</section>
<section title="Protocol Specification">
<t>After an IPsec SA negotiation, <xref target="RFC7296"/>, an IPsec peer wishing to
verify the viability of the current network path for ESP packets MAY initiate an ESP Echo
Request. The ESP Echo Request MUST be sent as an ESP packet using
the established SA, receiving the same level of protection as any
other traffic on that SA. It SHOULD use an SPI value previously
established, whether negotiated through IKEv2 or configured manually.</t>

<t>The initiator sets the ESP Next Header field to AGGFRAG_PAYLOAD (144),
as specified in <xref target="RFC9347"/>. The ESP payload contains one of the echo
request sub-type payloads defined in this document, optionally
followed by padding.</t>

<t>The receiving IPsec peer, having established ESP through IKE, MAY
respond with an ESP Echo Response. The ESP Echo Response MUST be
sent as an ESP packet using the corresponding SA and SPI. The
responder also sets the ESP Next Header field to AGGFRAG_PAYLOAD (144),
followed by the response sub-type payload.</t>

<t>Two payload formats are defined: the existing Congestion Control
payload (Section 4.1) and the new Encrypted ESP Ping payload
(Section 4.2).</t>
<section title="Using Congestion Control Payload">
<t>IP-TFS Congestion Control AGGFRAG_PAYLOAD Payload Format as specified
in <xref target="RFC9347"/> Section 6.1.2 can be used for Echo Request and
response. When using this payload for Echo Request and response, IPv4
or IPv6 Data Block MUST NOT be concatenated, especially when
USE_AGGFRAG is not successfully negotiated. This request does
not support requesting a specific return path.</t>

<t>[AA when using USE_AGGFRAG tunnel is negotiated, responder may
concatenate AGGFRAG_PAYLOAD Congestion control probe]</t>

<t>The Echo request and response payloads are not subject to IPsec
Security Policy (SP), typically negotiated using IKEv2 and manually
configured. End padding would be necessary if the tunnel
is always sending fixed size ESP payload or to possibly detect path
anomalies.</t>

<t>When probing do not take the lack of a response alone as an
indication of the unreachability of the return path using ESP echo;
also consider the received bytes on the return path. IPsec has a
unique advantage over other tunneling protocols when the return path
shows incoming bytes, indicating that the path is partially
functional. This is especially useful when used as a liveness check
on busy paths. When there is no response, instead of concluding that
the path is not viable and taking action, such as tearing down the
IPsec connection, read the incoming bytes. This would help avoid
tearing down busy paths due to the missing ESP echo response.</t>

</section>
<section title="Encrypted ESP Ping Payload Format">
<t>Control Payload Format</t>
<sourcecode><![CDATA[

                    1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Sub-type    |R|  Reserved   |          Data Length          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Identifier (ID)              |Sequence Number                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Return path SPI                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data ...
+-+-+-+-+-+-+-+-+-+-+-
]]></sourcecode>

<ul>
<li><t>Sub-Type: ESP-ECHO-REQUEST or ESP-ECHO-RESPONSE</t></li>
<li><t>Return path (R): 1 bit flag, set when requesting a specific return path SPI</t></li>
<li><t>Reserved: 7 bits</t></li>
<li><t>Data Length: number of data octets following, length 16 bits</t></li>
<li><t>Identifier : A 16-bit request identifier. The identifier SHOULD be set
to a unique value to distinguish between different ESP Request
sessions. The responder copies it from the request.</t></li>
<li><t>Sequence number: A 16-bit field that increments with each echo
request sent.</t></li>
<li><t>Return path: 32 bits, optional requested return path SPI, when R is
set to one.</t></li>
<li><t>Data : Optional data that follows the Echo request.</t></li>
</ul>

<t>The responder SHOULD copy the request message and MUST change the
Sub-type to ESP-ECHO-RESPONSE. The SHOULD allows a responder to send
a minimal response with a shorter or empty data section when
resources are constrained.</t>

</section>
<section title="Return Path Validation">
<t>On the initiator, the return path SPI in the request MUST be in the
local SADB with the same peer as the destination. The responder
should also validate the requested return path SPI. When the SPI does
not match the initiator in the SPD, the responder MUST NOT respond
via the requested SPI. This is specifically to avoid amplification or
DDoS. However, the responder MAY respond using the SPI of the SA
on which the request was received.</t>

</section>

</section>
<section title="IKEv2 Notification">
<t>A peer negotiates support for Encrypted ESP Ping Mode 2 using the
Notification Status Type `ENCRYPTED_PING_SUPPORTED` during the IKEv2
negotiation, in the IKE_AUTH exchange. When this has been negotiated,
the peer has committed to responding to ESP Echo Requests on all ESP
SAs between the two peers, and the initiator can reliably interpret
a lack of response as path failure.</t>

<t>When ENCRYPTED_PING_SUPPORTED has been negotiated, the peer SHOULD
respond to ESP Echo Requests. Responding remains subject to local
resource constraints, but the negotiation represents a commitment to
support this functionality. A lack of response after a configurable
timeout MAY be treated as an indication of path failure.</t>

<t>For Mode 1 (USE_AGGFRAG), the commitment to respond is implicit in
the USE_AGGFRAG negotiation itself.</t>

</section>
<section title="IANA Considerations">
<t>This document defines two new registrations for the IANA ESP
<xref target="AGGFRAG"/> PAYLOAD Sub-Types.</t>

<sourcecode><![CDATA[

Value   ESP AGGFRAG_PAYLOAD Sub-Type       Reference
-----   ------------------------------    ---------------
[TBD2]  ESP-ECHO-REQUEST                  [this document]
[TBD3]  ESP-ECHO-RESPONSE                 [this document]

]]></sourcecode>

<t>This document defines one new registration for the IANA
"IKEv2 Notify Message Status Types" <xref target="STATUSNOTIFY"/>.</t>

<sourcecode><![CDATA[

Value     Notify Message Status Type      Reference
-------  ----------------------------    ---------------
[TBD1]    ENCRYPTED_PING_SUPPORTED.       [this document]

]]></sourcecode>

</section>
<section title="Operational Considerations">
<t>When an explicit return path is requested and the ESP Echo responder
SHOULD make best effort to respond via this path, however, if local
policies do not allow this respond via another SA.</t>

<t>A typical implementation involves creating an ESP Echo socket, which
allows setting an outgoing SPI during initialization,and matching
source and destination address. Once socket is setup before sending any
data, only write payload with optionally specifying return path.</t>

</section>
<section title="Acknowledgments">
<t>The authors thank Valery Smyslov for his thorough review and comments.</t>

</section>
<section title="Security Considerations">
<t>The security considerations are similar to other unconnected
request-reply protocols such as ICMP or ICMPv6 echo. The proposed ESP
echo and response does not constitute an amplification attack because
the ESP Echo Reply is almost same size as the ESP Echo Request.
It can also be rate limited or filtered using ingress filtering
per BCP 38 <xref target="RFC2827"/></t>

</section>
</middle>
<back>
<references title="Normative References">
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>
<reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303">
  <front>
    <title>IP Encapsulating Security Payload (ESP)</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4303"/>
  <seriesInfo name="DOI" value="10.17487/RFC4303"/>
</reference>
<reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9347" target="https://www.rfc-editor.org/info/rfc9347">
  <front>
    <title>Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)</title>
    <author fullname="C. Hopps" initials="C." surname="Hopps"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>This document describes a mechanism for aggregation and fragmentation of IP packets when they are being encapsulated in Encapsulating Security Payload (ESP). This new payload type can be used for various purposes, such as decreasing encapsulation overhead for small IP packets; however, the focus in this document is to enhance IP Traffic Flow Security (IP-TFS) by adding Traffic Flow Confidentiality (TFC) to encrypted IP-encapsulated traffic. TFC is provided by obscuring the size and frequency of IP traffic using a fixed-size, constant-send-rate IPsec tunnel. The solution allows for congestion control, as well as nonconstant send-rate usage.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9347"/>
  <seriesInfo name="DOI" value="10.17487/RFC9347"/>
</reference>
<reference anchor="AGGFRAG" target='https://www.iana.org/assignments/esp-aggfrag-payload/esp-aggfrag-payload.xhtml'>
<front>
<title>ESP AGGFRAG_PAYLOAD Registry</title>
<author><organization>IANA</organization></author>
<date/>
</front>
</reference>
<reference anchor="STATUSNOTIFY" target='https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16'>
<front>
<title>IKEv2 Notify Message Status Types</title>
<author><organization>IANA</organization></author>
<date/>
</front>
</reference>
</references>
<references title="Informative References">
<reference anchor="RFC7110" target="https://www.rfc-editor.org/info/rfc7110">
  <front>
    <title>Return Path Specified Label Switched Path (LSP) Ping</title>
    <author fullname="M. Chen" initials="M." surname="Chen"/>
    <author fullname="W. Cao" initials="W." surname="Cao"/>
    <author fullname="S. Ning" initials="S." surname="Ning"/>
    <author fullname="F. Jounay" initials="F." surname="Jounay"/>
    <author fullname="S. Delord" initials="S." surname="Delord"/>
    <date month="January" year="2014"/>
    <abstract>
      <t>This document defines extensions to the data-plane failure-detection protocol for Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs) known as "LSP ping". These extensions allow a selection of the LSP to be used for the echo reply return path. Enforcing a specific return path can be used to verify bidirectional connectivity and also increase LSP ping robustness.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7110"/>
  <seriesInfo name="DOI" value="10.17487/RFC7110"/>
</reference>
<reference anchor="I-D.ietf-ipsecme-esp-ping" target="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-esp-ping-01">
  <front>
    <title>ESP Echo Protocol</title>
    <author fullname="Lorenzo Colitti" initials="L." surname="Colitti">
      <organization>Google</organization>
    </author>
    <author fullname="Jen Linkova" initials="J." surname="Linkova">
      <organization>Google</organization>
    </author>
    <author fullname="Michael Richardson" initials="M." surname="Richardson">
      <organization>Sandelman Software Works</organization>
    </author>
    <date day="1" month="March" year="2026"/>
    <abstract>
      <t>This document defines an IPsec ESP echo function which can be used to detect whether a given network path supports IPsec ESP packets.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-esp-ping-01"/>
</reference>
<reference anchor="I-D.ietf-ipsecme-ikev2-reliable-transport" target="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-ikev2-reliable-transport-02">
  <front>
    <title>Separate Transports for IKE and ESP</title>
    <author fullname="Valery Smyslov"/>
    <author fullname="Tirumaleswar Reddy"/>
    <date day="18" month="April" year="2026"/>
    <abstract>
      <t>The Internet Key Exchange protocol version 2 (IKEv2) can operate
   either over unreliable (UDP) transport or over reliable (TCP)
   transport.  If TCP is used, then IPsec tunnels created by IKEv2 also
   use TCP.  This document specifies how to decouple IKEv2 and IPsec
   transports so that IKEv2 can operate over TCP, while IPsec tunnels
   use unreliable transport.  This feature allows IKEv2 to effectively
   exchange large blobs of data (e.g., when post-quantum algorithms are
   employed) while avoiding performance problems that arise when IPsec
   uses TCP.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-reliable-transport-02"/>
</reference>
</references>
<section title="Additional Stuff">
<t>TBD</t>

</section>
  </back>
</rfc>
