<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC4301 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC7296 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
]>


<rfc ipr="trust200902" docName="draft-mglt-ipsecme-dscp-np-01" category="std" consensus="true" submissionType="IETF" updates="RFC4301" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DSCP Notify Payload">Differentiated Services Field Codepoints Internet Key Exchange version 2 Notification</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization>Ericsson</organization>
      <address>
        <email>joel.halpern@ericsson.com</email>
      </address>
    </author>
    <author initials="U." surname="Parkholm" fullname="U. Parkholm">
      <organization>Ericsson</organization>
      <address>
        <email>ulf.x.parkholm@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Liu" fullname="Daiying Liu">
      <organization>Ericsson</organization>
      <address>
        <email>harold.liu@ericsson.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="03"/>

    <area>Security</area>
    <workgroup>IPsecme</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 42?>

<t>IPsec supports "classifier" mechanism to send traffic with specific Differentiated Services Field Codepoints (DSCP) over different tunnels. However, such classification is not explicitly notified to the other peer.
This document specifies the DSCP Notification Payload, which, in a CREATE_CHILD_SA Exchange, explicitly mentions which DSCP code points will be tunneled in the newly created tunnel.</t>



    </abstract>



  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t><xref section="4.1" sectionFormat="comma" target="RFC4301"/> acknowledges that aggregating traffic with multiple DSCP over the same SA may result in inappropriate discarding of lower priority packets due to the windowing mechanism used by this feature.
To address such concern, <xref section="4.1" sectionFormat="comma" target="RFC4301"/> recommends the sender implements a "classifier" mechanism which dispatches the traffic over multiple SAs.
However, the peer is not able to indicate the other peer it is classifying traffic according to its DSCP values, nor how DSCP values are classified.</t>

<t>While <xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> mentions the "DSCP values" fields in the Security Association Database (SAD), <xref target="RFC7296"/> does not provides a way to for peers to indicate which "DSCP values" are associated to the created SA.
This document fills that gap and specifies the DSCP Notification Payload, which, in a CREATE_CHILD_SA Exchange, explicitly mentions which DSCP code points will be tunneled in the newly created tunnel.</t>

</section>
<section anchor="sec-rfc4301"><name>RFC4301 clarification</name>

<t><xref section="4.4.2.1" sectionFormat="comma" target="RFC4301"/> mentions</t>

<figure><artwork><![CDATA[
    o DSCP values -- the set of DSCP values allowed for packets carried
      over this SA.  If no values are specified, no DSCP-specific
      filtering is applied.  If one or more values are specified, these
      are used to select one SA among several that match the traffic
      selectors for an outbound packet.  Note that these values are NOT
      checked against inbound traffic arriving on the SA.
]]></artwork></figure>

<t>The text does not clearly specify what happens when the DSCP of a packet does not match any of the corresponding DSCP values.
This document proposes the following text:</t>

<t><list style="symbols">
  <t>DSCP values -- the set of DSCP values allowed for packets carried
   over this SA. If no values are specified, no DSCP-specific
   filtering is applied.  If one or more values are specified, these
   are used to select one SA among several that match the traffic
   selectors for an outbound packet. In case of multiple matches a preference to the most selective list DSCP value could be implemented by the peer's policy. 
   If the DSCP value of the packet does not match any of the DSCP values provided by the associated matching SAs and there is at least one SA with no DSCP-specific filtering, then, one of these SA SHOULD be selected. On the other hand, if all SAs have a DSCP filtering, then, any of the matching SAs can be selected. Note that these values MUST NOT be checked against inbound traffic arriving on the SA.</t>
</list></t>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<t>The illustrative example of this section considers Expedited Forwarding (EF) with low latency traffic has its own IPsec tunnel, Assured Forward (AF) classes with different drop precedence and may take a different route have their own tunnel and all remaining DSCP values are put in another tunnel.<br />
This section details how a peer uses the DSCP Notify Payload to classify traffic carrying the DSCP values AF11 or AF3 in one tunnel, traffic carrying a DSCP value of EF in another tunnel and traffic with other DSCP values a third tunnel.
This latest SA is designated as the default no-DSCP specific SA. It is RECOMMENDED to configure the Security Policy Data Base (SPD), so that such a default no-DSCP specific SA is created and it is RECOMMENDED its creation happens prior the SA with specific DSCP values. 
Note that according to <xref target="sec-rfc4301"/>, there is no specific ordering, but starting with the no-DSCP specific SA ensures compatibility with IPsec implementation that would for example discard or create a new SA when the DSCP do not match.</t>

<t>Generally, it is recommended that the outer DSCP value matches the inner DSCP value so that the tunneled packet be treated similarly to the inner packet. Such behavior is provided by setting the Bypass DSCP to True.
If the initiator prefers for example every tunneled packet being treated similarly, then, an explicit mapping needs to be indicated. Typically, the initiator may be willing to prevent reordered traffic to fall outside the anti-replay windows.
Note that such policy is implemented by each peer.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {IDi, [CERT,] [CERTREQ,]
       [IDr,] AUTH, SAi2,
       TSi, TSr}  -->

                                <--  HDR, SK {IDr, [CERT,] AUTH,
                                         SAr2, TSi, TSr}
]]></artwork></figure>

<t>Once the no-DSCP specific SA is created, all traffic with any DSCP value is steered to that SA. The initiator then creates the child SA associated with specific DSCP values. In this example, it creates the SA associated with the DSCP value AF11 or AF3, followed by the one associated with  value of EF, but this does not follow any specific ordering.
The initiator specifies the DSCP values being classified in that SA with a DSCP Notify Payload that carries the DSCP values.</t>

<t>If the responder supports the DSCP Notify Payload, it SHOULD respond with a Notify Payload that indicates the DSCP values selected for that tunnel. 
By default these values SHOULD be the ones specified by the initiator, but the responder's policy MAY select other values. If the responder does not want to perform DSCP filtering, the responder SHOULD send a empty DSCP Notify Payload in order to at least indicate the support of the DSCP Notify Payload.</t>

<t>As specified in <xref section="3.10.1" sectionFormat="comma" target="RFC7296"/>, Notify Payload with status type MUST be ignored if not recognized.
The absence of a DSCP Notify Payload by the responder may be due to the responder not supporting the notification or not advertising the application of DSCP filtering. 
We do not consider that the absence of classification by the responder  prevents the SA to be created. The classification is at least performed for the outbound stream, which is sufficient to justify the creation of the additional SA.
Note also that DSCP values are not agreed, and the responder cannot for example narrow down the list of DSCP values being classified.
If that would cause a significant issue, the responder can create another SA with the narrow down list of DSCP values. The responder may also REKEY_SA the previously SA to redefine the DSCP values to be considered.</t>

<t>When multiple DSCP values are indicated, and the initiator is mapping the outer DSCP value, the outer DSCP value is expected to be one of these values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, AF11, AF3)} -->

                                <--  HDR, SK {SA, Nr, KEr, 
                                          N(DSCP, AF11, AF3)}
]]></artwork></figure>

<t>The initiator may then create additional child SAs specifying other DSCP values.</t>

<figure><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SK {SA, Ni, KEi, N(DSCP, EE)} -->

                                <--  HDR, SK {SA, Nr, KEr}
]]></artwork></figure>

</section>
<section anchor="protocol-description"><name>Protocol Description</name>

<t>During the CREATE_CHILD_SA exchange, the initiator or the responder MAY indicate to the other peer the DSCP filtering policy applied to the SA. This is done via the DSCP Notify Payload indicating the DSCP values being considered for that SA.</t>

<t>The initiator MAY send an empty DSCP Notify Payload to indicate support of the DSCP Notify Payload as well as an indication the negotiated SA as a no-DSCP specific SA. This SA MAY be followed by the creation of  DSCP specific SA.</t>

<t>Upon receiving a DSCP Notify Payload, if the responder supports the notification it SHOULD respond with a DSCP Notify Payload. The value indicated SHOULD be the one selected by the initiator.</t>

<t>There is no specific error handling.</t>

</section>
<section anchor="payload-description"><name>Payload Description</name>

<t>The DSCP Notify Payload is based on the format of the Notify Payload as described in <xref section="3.10" sectionFormat="comma" target="RFC7296"/> and represented in <xref target="fig-np"/>.</t>

<figure title="Notify Payload" anchor="fig-np"><artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol ID  |   SPI Size    |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                       Notification Data                       ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields Next Payload, Critical Bit, RESERVED, and Payload Length are defined in <xref target="RFC7296"/>.  Specific fields defined in this document are:</t>

<t><list style="symbols">
  <t>Protocol ID (1 octet):  Set to zero.</t>
  <t>Security Parameter Index (SPI) Size (1 octet):  Set to zero.</t>
  <t>Notify Message Type (2 octets):  Specifies the type of notification message.  It is set to DSCP_VALUES (see <xref target="sec-iana"/>).</t>
  <t>Notification Data (variable length): lists the DSCP values that are considered for the SA. Each value is encoded over a single byte.</t>
</list></t>

</section>
<section anchor="sec-iana"><name>IANA Considerations</name>

<t>IANA is requested to allocate one value in the "IKEv2 Notify Message Types - Status Types" registry:
(available at https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-16) with the following definition:</t>

<figure><artwork><![CDATA[
  Value    Notify Messages - Status Types
-----------------------------------------
  TBD      DSCP 
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As the DSCP value field is already defined by <xref target="RFC4301"/> in the SA structure. As such security considerations of <xref target="RFC4301"/> apply.
The DSCP Notification Payload communicates clearly the DSCP value field to the responder.</t>

<t>When the tunnel mode is used, the communication of the DSCP value field could be easily interpreted by monitoring the received DSCP values of the inner traffic when that traffic is encapsulated, and so no secret information is revealed.
When the transport mode is used, that value may be changed by the network and eventually, the value of the field could be unknown to the other peer. However, this cannot be considered as a protection mechanism, and the communication of the DSCP value cannot be considered as revealing information that was previously not revealed.</t>

<t>The ability to indicate the other peer to set the DSCP value does not lead to the consumption of additional resources nor additional constraints. First, these SAs are anyway created either with DSCP values or without. Then, the responder may also ignore the DSCP Notification Payload and the fact that the SA has set a DSCP value field to specific values does not prevent the responder to send traffic with a different DSCP value over that SA.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Scott Fluhrer for his useful comments; Valery Smyslov, Tero Kivinen for their design suggestions we carefully followed.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

&RFC4301;
&RFC7296;


    </references>



<?line 207?>



  </back>

<!-- ##markdown-source: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-->

</rfc>

