<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-kampati-ipsecme-ikev2-sa-ts-payloads-opt-04" category="std">

  <front>
    <title abbrev="IKEv2 Optional Child SA&amp;TS Payloads">IKEv2 Optional SA&amp;TS Payloads in Child Exchange</title>

    <author initials="S." surname="Kampati" fullname="Sandeep Kampati">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>Divyashree Techno Park, Whitefield</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560066</code>
          <country>India</country>
        </postal>
        <email>sandeepkampati@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhuatai District</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code></code>
          <country>China</country>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Bharath" fullname="Meduri S S Bharath">
      <organization abbrev="Mavenir">Mavenir Systems Pvt Ltd</organization>
      <address>
        <postal>
          <street>Manyata Tech Park</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code></code>
          <country>India</country>
        </postal>
        <email>bharath.meduri@mavenir.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization abbrev="CMCC">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street, West District</street>
          <city>Beijing</city>
          <region>Beijing</region>
          <code>100053</code>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>

    <date year="2021" month="April" day="20"/>

    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method for reducing the size of the
Internet Key Exchange version 2 (IKEv2) exchanges at time of rekeying
IKE SAs and Child SAs by removing or making optional of SA &amp; TS
payloads. Reducing size of IKEv2 exchanges is desirable for low
power consumption battery powered devices. It also helps to avoid IP
fragmentation of IKEv2 messages.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The Internet Key Exchange protocol version 2 (IKEv2) specified in
<xref target="RFC7296"></xref> is used in the IP Security (IPsec) architecture for the
purposes of Security Association (SA) parameters negotiation and
authenticated key exchange. The protocol uses UDP as the transport
for its messages, which size varies from less than one hundred bytes
to several kilobytes.</t>

<t>According to <xref target="RFC7296"></xref>, the secret keys used by IKE/IPSec SAs should
be used only for a limited amount of time and to protect a limited
amount of data. When the lifetime of an SA expires or is about to
expire, the peers can rekey the SA to reestablish a new SA to take
the place of the old one.</t>

<t>For security gateways/ePDG in 4G networks and cRAN/Cloud in 5G
networks, they will support more than 100,000 IKE/IPSEC tunnels. So
on an average, for every second there may be hundreds or thousands of
IKE SAs and Child SAs that are rekeying. This takes huge amount of
bandwidth, packet fragmentation and more processing resources. For
these devices, these problems can be solved by introducing the
solution described in this document.</t>

<t>This is also useful in Internet of Things (IoT) devices which
utilizing lower power consumption technology. The appendix A of
<xref target="I-D.mglt-6lo-diet-esp-requirements"/> gives some estimate data. For
these devices, reducing the length of IKE/Child SA rekeying messages
can save the bandwidth consumption. At the same time, it can also
save the computing processes by less payload are included.</t>

<t>Most devices don’t prefer to change cryptographic suites frequently.
By taking this advantage the SA and TS payloads can be made optional
at the time of rekeying IKE SAs and Child SAs. In such situation,
only a new SPI value is needed to create the new IKE SA and Child SA.
So a new Notify payload which contains the needed SPI value can be
sent instead of the SA and TS payloads.</t>

<t>In case of rekeying IKE SAs, the SA payloads can be optimized if
there is no change of cryptographic suites. In case of rekeying
Child SAs, the SA and TS payloads can be optimized if there is no
change of cryptographic suites and ACL configuration.</t>

</section>
<section anchor="conventions-used-in-this-document" title="Conventions Used in This Document">

<section anchor="requirements-language" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
</section>
<section anchor="protocol-details" title="Protocol Details">

<t>This section provides protocol details and contains the normative
parts.</t>

<t>Before using this new optimization, the IPSec implementation who
supports it has to know that the peer also supports it. Without the
support on both sides, the optimized rekeying messages sent by one
peer may be unrecognizable for the other peer. To prevent this failure
from happening, the first step is to negotiate the support of this
optimization between the two peers. There are two specific rekeying
SAs cases: rekeying IKE SAs and rekeying Child SAs. After the
negotiation, the initiator can optimize the rekeying message payloads
in both cases. In other words, once the negotiation of support for
optimizing payloads at rekeying IKE SAs and Child SAs is complete,
both IKE SAs and Child SAs rekeying are supported by the two sides.
The responder can react based on the received rekeying message.</t>

<section anchor="negotiation" title="Negotiation of Support for Optimizing Optional Payload at Rekeying IKE SAs and Child SAs">

<t>The initiator indicates its support for optimizing optional payloads
at rekeying IKE SAs and Child SAs by including a Notify payload of
type MINIMAL_REKEY_SUPPORTED in the IKE_AUTH request message. By
observing the MINIMAL_REKEY_SUPPORTED notification in the received
message, the responder can deduce the initiator’s support of this
extension. If the responder also supports this extension, it
includes the MINIMAL_REKEY_SUPPORTED notification in the
corresponding response message. After receiving the response
message, the initiator can also know the support of this extension of
the responder side.</t>

<t>The IKE_AUTH message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(MINIMAL_REKEY_SUPPORTED)} -->
                              <-- HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr,
                                      N(MINIMAL_REKEY_SUPPORTED)}
]]></artwork></figure>

<t>If the responder doesn’t support this extension, it MUST ignore the
MINIMAL_REKEY_SUPPORTED notification sent by the initiator and MUST
NOT respond error to the initiator. With no MINIMAL_REKEY_SUPPORTED
notification in the response message, the initiator can deduce that
the responder doesn’t support this extension. In this case, the IKE
SAs and Child SAs rekeyings happen as the usual way without the
optimizations defined in this document.</t>

<t>The IKE_AUTH message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(MINIMAL_REKEY_SUPPORTED)} -->
                              <-- HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr}
]]></artwork></figure>

</section>
<section anchor="payload-optimization-at-rekeying-ike-sas" title="Payload Optimization at Rekeying IKE SAs">

<t>The payload optimization at rekeying IKE SAs MUST NOT be used unless
both peers have indicated their support of this extension by using
the negotiation method described in <xref target="negotiation"/>. If the initiator
decides to optimize the payloads at the time of rekeying IKE SAs,
then it includes the SA_UNCHANGED notification in its CREATE_CHILD_SA
exchange message. If the initiator decides not to do the
optimization, then it just sends the rekeying request message as the
original way, the rekeying is conducted as <xref target="RFC7296"/> defined.
If the initiator and responder decides to do the optimization,
then the IKE SA rekeying uses PFS by default.</t>

<section anchor="ikerekeynochange" title="Rekeying IKE SAs When No Change of Initiator and Responder’s Cryptographic Suites">

<t>At the time of rekeying an IKE SA, when the initiator determines
there is no change on its cryptographic suites since this IKE SA was
created or last rekeyed, it MAY send the SA_UNCHANGED notification
payload instead of the SA payloads in the rekeying request message.
In this SA_UNCHANGED notification, it contains the initiator’s new
Security Parameter Index (SPI) used for creating the new IKE SA.</t>

<t>After receiving the initiator’s rekeying request message with the
SA_UNCHANGED notification and no SA payloads, the responder knows
that the initiator wants to optimize the rekeying payload. Then when
it determines that there is also no change in its cryptographic
suites, the responder MAY send the rekeying respond message to the
initiator with the SA_UNCHANGED notification payload instead of the
SA payloads. In this SA_UNCHANGED notification, it contains the
responder’s new SPI used for creating the new IKE SA.</t>

<t>According to the initiator’s new SPI and the responder’s new SPI, the
initiator and the responder can rekey the IKE SA on both sides.</t>

<t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(SA_UNCHANGED), Ni, KEi} -->
                              <-- HDR, SK {N(SA_UNCHANGED), Nr, KEr}
]]></artwork></figure>

<t>The initiator sends a SA_UNCHANGED notification payload, a Nonce
payload and a Diffie-Hellman value in the KEi payload. A new
initiator SPI is supplied in the SPI field of the SA_UNCHANGED
notification payload.
These messages also follow the original PFS with the signature
and encryption algorithms used as last message.</t>

<t>The responder replies (using the same Message ID to respond) with a
SA_UNCHANGED notification payload, a Nonce payload and a Diffie-Hellman
value in the KEr payload. A new responder SPI is supplied in
the SPI field of the SA_UNCHANGED notification payload.</t>

<t>This SA_UNCHANGED notification MUST be included in a CREATE_CHILD_SA
exchange message when there is no SA payloads included. When the
SA_UNCHANGED notification payload is included, the SA payload MUST
NOT be included.</t>

</section>
<section anchor="rekeying-ike-sas-when-responders-cryptographic-suites-changed" title="Rekeying IKE SAs When Responder’s Cryptographic Suites Changed">

<t>At the time of or before rekeying IKE SAs, the responder’s
cryptographic suites may be changed while there is no change of
initiator’s cryptographic suites. New cryptographic suites may be
added to the responder, or some outdated cryptographic suites may be
deleted from the responder. In this situation, the initiator MAY
send the SA_UNCHANGED notification payload instead of the SA payloads
in the CREATE_CHILD_SA request message at the time of rekeying IKE
SAs.</t>

<t>If the responder decides to continue using the previously negotiated
cryptographic suite to rekey the IKE SA, it MAY send the SA_UNCHANGED
notification payload in the CREATE_CHILD_SA response message, then
the rekeying is conducted like the way described in <xref target="ikerekeynochange"/>.</t>

<t>If the responder decides to re-negotiate the cryptographic suite, it
MUST send NO_PROPOSAL_CHOSEN notification payload in the
CREATE_CHILD_SA response message. After receiving this error
notification, the initiator MUST retry the CREATE_CHILD_SA exchange
with the SA payloads. Then the rekeying is conducted in the original
way defined in <xref target="RFC7296"/>. The CREATE_CHILD_SA message exchange in
this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(SA_UNCHANGED), Ni, KEi} -->
                              <-- HDR, SK {N(NO_PROPOSAL_CHOSEN),
                                      Nr, KEr}
HDR, SK {SA, Ni, KEi} -->
                              <-- HDR, SK {SA, Ni, KEi}
]]></artwork></figure>

<t>Besides, if the responder only supports the Child SA rekeying
optimization and doesn’t support the IKE SA rekeying optimization, it
can also follow the way described above, i.e., it MUST send
NO_PROPOSAL_CHOSEN notification payload in the CREATE_CHILD_SA
response message when receiving the SA_UNCHANGED notification at the
time of rekeying IKE SAs.</t>

</section>
</section>
<section anchor="payload-optimization-at-rekeying-child-sas" title="Payload Optimization at Rekeying Child SAs">

<t>The payload optimization at rekeying Child SAs MUST NOT be used
unless both peers have indicated their support of this extension by
using the negotiation method described in <xref target="negotiation"/>. If the
initiator decides to optimize the payloads at the time of rekeying
Child SAs, then it includes the SA_TS_UNCHANGED notification in its
CREATE_CHILD_SA exchange message. If the initiator decides not to do
the optimization, then it just sends the rekeying request message as
the original way, the rekeying is conducted as <xref target="RFC7296"/> defined.</t>

<t>This SA_TS_UNCHANGED notification MUST be included in a
CREATE_CHILD_SA exchange message when there is no SA and TS payloads
included. The new Child SA is created with the SPI value in the
SA_TS_UNCHANGED notification.</t>

<section anchor="childrekeynochange" title="Rekeying Child SAs When No Change of Initiator and Responder’s Cryptographic Suites and ACL Configuration">

<t>At the time of rekeying Child SAs, the initiator MAY send the
SA_TS_UNCHANGED notification payload instead of the SA and TS
payloads when there is no change in its cryptographic suites and ACL
configuration since last negotiation. After receiving the
initiator’s request message with the SA_TS_UNCHANGED notification,
the responder MAY respond to the initiator with the SA_TS_UNCHANGED
notification payload instead of the SA and TS payloads if there is
also no change in its cryptographic suites and ACL configuration
since last negotiation.</t>

<t>At the time of rekeying a Child SA, when the initiator determines
there is no change in its cryptographic suites and ACL configuration
since this Child SA was created or last rekeyed, it MAY send the
SA_TS_UNCHANGED notification payload instead of the SA and TS
payloads in the rekeying request message. In this SA_TS_UNCHANGED
notification, it contains the initiator’s new Security Parameter
Index (SPI) used for creating the new Child SA.</t>

<t>After receiving the initiator’s rekeying request message with the
SA_TS_UNCHANGED notification and no SA and TS payloads, the responder
knows that the initiator wants to optimize the rekeying payload.
Then when it determines that there is also no change in its
cryptographic suites and ACL configuration, the responder MAY send
the rekeying respond message to the initiator with the
SA_TS_UNCHANGED notification payload instead of the SA and TS
payloads. In this SA_TS_UNCHANGED notification, it contains the
responder’s new SPI used for creating the new Child SA.</t>

<t>According to the initiator’s new SPI and the responder’s new SPI, the
initiator and the responder can rekey the Child SA on both sides.</t>

<t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(REKEY_SA), N(SA_TS_UNCHANGED),
    Ni, [KEi,]} -->
                              <-- HDR, SK {N(SA_TS_UNCHANGED),
                                      Nr, [KEr,]}
]]></artwork></figure>

<t>This SA_TS_UNCHANGED notification MUST be included in a
CREATE_CHILD_SA exchange message when there is no SA and TS payloads
included at the time of rekeying Child SAs. When the SA_TS_UNCHANGED
notification payload is included, the SA and TS payloads MUST NOT be
included.</t>

</section>
<section anchor="rekeying-child-sas-when-responders-cryptographic-suites-or-acl-configuration-changed" title="Rekeying Child SAs When Responder’s Cryptographic Suites or ACL Configuration Changed">

<t>At the time of or before rekeying Child SAs, the responder’s
cryptographic suites or ACL configuration may be changed while there
is no change of initiator’s cryptographic suites and ACL
configuration. In this situation, the initiator MAY send the
SA_TS_UNCHANGED notification payload instead of the SA and TS
payloads in the CREATE_CHILD_SA request message at the time of
rekeying Child SAs.</t>

<t>If the responder decides to continue using the previously negotiated
cryptographic suite and Traffic Selectors to rekey the Child SA, it
MAY send the SA_TS_UNCHANGED notification payload in the
CREATE_CHILD_SA response message, then the rekeying is conducted like
<xref target="childrekeynochange"/>.</t>

<t>If the responder decides to re-negotiate the cryptographic suite or
Traffic Selectors, it MUST send NO_PROPOSAL_CHOSEN notification
payload in the CREATE_CHILD_SA response message. After receiving
this error notification, the initiator MUST retry the CREATE_CHILD_SA
exchange with the SA and TS payloads. Then the rekeying is conducted
in the original way defined in <xref target="RFC7296"/>. The CREATE_CHILD_SA
message exchange in this case is shown below:</t>

<figure><artwork><![CDATA[
Initiator                         Responder
--------------------------------------------------------------------
HDR, SK {N(SA_TS_UNCHANGED), Ni, KEi} -->
                              <-- HDR, SK {N(NO_PROPOSAL_CHOSEN),
                                      Nr, KEr}
HDR, SK {N(REKEY_SA), SA, Ni, [KEi,]
    TSi, TSr}   -->
                             <--  HDR, SK {SA, Nr, [KEr,]
                                      TSi, TSr}
]]></artwork></figure>

<t>Besides, if the responder only supports the IKE SA rekeying
optimization and doesn’t support the Child SA rekeying optimization,
it can also follow the way described above, i.e., it MUST send
NO_PROPOSAL_CHOSEN notification payload in the CREATE_CHILD_SA
response message when receiving the SA_TS_UNCHANGED notification at
the time of rekeying Child SAs.</t>

</section>
</section>
</section>
<section anchor="payload-formats" title="Payload Formats">

<section anchor="minimalrekeysupported-notification" title="MINIMAL_REKEY_SUPPORTED Notification">

<t>The MINIMAL_REKEY_SUPPORTED notification is used by the initiator and
responder to inform their ability of optimizing optional payload at
the time of rekeying IKE SAs and Child SAs to the peers. It is
formatted as follows:</t>

<figure><artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Protocol ID (1 octet) - MUST be 0.</t>
  <t>SPI Size (1 octet) - MUST be 0, meaning no SPI is present.</t>
  <t>Notify Message Type (2 octets) - MUST be &lt;Need to get value from IANA&gt;, the value assigned for the MINIMAL_REKEY_SUPPORTED notification.</t>
</list></t>

<t>This notification contains no data.</t>

</section>
<section anchor="saunchanged-notification" title="SA_UNCHANGED Notification">

<t>The SA_UNCHANGED notification is used to replace the SA payloads at
the time of rekeying IKE SAs when there is no change of cryptographic
suites in initiator or responder. It is formatted as follows:</t>

<figure><artwork><![CDATA[
 0                 1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Protocol ID    | SPI Size (=8) |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Security Parameter Index (SPI)                 |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Protocol ID (1 octet) - MUST be 1.</t>
  <t>SPI Size (1 octet) - MUST be 8.</t>
  <t>Notify Message Type (2 octets) - MUST be &lt;Need to get value from IANA&gt;, the value assigned for the SA_UNCHANGED notification.</t>
  <t>SPI (8 octets) - Security Parameter Index. The initiator sends initiator SPI. The responder sends responder SPI.</t>
</list></t>

</section>
<section anchor="satsunchanged-notification" title="SA_TS_UNCHANGED Notification">

<t>The SA_TS_UNCHANGED notification is used to replace the SA payloads
and TS payloads at the time of rekeying Child SAs when there is no
change of cryptographic suites and ACL configuration in initiator or
responder. The SPI of the new Child SA is included in this payload,
and the SPI of the old Child SA is in the REKEY_SA notification payload.
The SA_TS_UNCHANGED notification is formatted as follows:</t>

<figure><artwork><![CDATA[
 0                 1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Protocol ID    | SPI Size (=4) |      Notify Message Type      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Security Parameter Index (SPI)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Protocol ID (1 octet) - MUST be either (2) to indicate AH or (3) to indicate ESP.</t>
  <t>SPI Size (1 octet) - MUST be 4.</t>
  <t>Notify Message Type (2 octets) - MUST be &lt;Need to get value from IANA&gt;, the value assigned for the SA_TS_UNCHANGED notification.</t>
  <t>SPI (4 octets) - Security Parameter Index. The initiator sends initiator SPI. The responder sends responder SPI.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document defines two new Notify Message Types in the “IKEv2
Notify Message Types - Status Types” registry. IANA is requested to
assign codepoints in this registry.</t>

<figure><artwork><![CDATA[
NOTIFY messages: status types            Value
----------------------------------------------------------
MINIMAL_REKEY_SUPPORTED                  TBD
SA_UNCHANGED                             TBD
SA_TS_UNCHANGED                          TBD
]]></artwork></figure>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC7296" target='https://www.rfc-editor.org/info/rfc7296'>
<front>
<title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
<author initials='C.' surname='Kaufman' fullname='C. Kaufman'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='Y.' surname='Nir' fullname='Y. Nir'><organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'><organization /></author>
<author initials='T.' surname='Kivinen' fullname='T. Kivinen'><organization /></author>
<date year='2014' month='October' />
<abstract><t>This document describes version 2 of the Internet Key Exchange (IKE) protocol.  IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs).  This document obsoletes RFC 5996, and includes all of the errata for it.  It advances IKEv2 to be an Internet Standard.</t></abstract>
</front>
<seriesInfo name='STD' value='79'/>
<seriesInfo name='RFC' value='7296'/>
<seriesInfo name='DOI' value='10.17487/RFC7296'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.mglt-6lo-diet-esp-requirements">
<front>
<title>Requirements for Diet-ESP the IPsec/ESP protocol for IoT</title>

<author initials='D' surname='Migault' fullname='Daniel Migault'>
    <organization />
</author>

<author initials='T' surname='Guggemos' fullname='Tobias Guggemos'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='July' day='8' year='2016' />

<abstract><t>IPsec/ESP is used to secure end-to-end communications.  This document lists the requirements Diet-ESP should meet to design IPsec/ESP for IoT.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-mglt-6lo-diet-esp-requirements-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-mglt-6lo-diet-esp-requirements-02.txt' />
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAPjFf2AAA+1c/3PaSJb/nSr+h76kasfeA8Z2MpmMa29vCCYxGxtzxtm5
1OxUSqAGei0kTmpBWCdb92/cv3d/yb33+otaQgLsZHOZuyFVMYhWd79vn/f6
0y2azWa9JoUM+Cnrve4uT9jVQooo9AI2bP/uZsgG3jqIPD9hImSdmQh81n0/
nnnhlNdr3mgU8+XGjapZ/vZ6zY/GoTeHYfzYm8jmrTdfeFI0xSLh4zlvilu+
PGkmXlMmzYW+qRktZPPoab029iSfRvH6lCXSr9fqNbGIT5mM00SeHB39cHQC
c4m5d8qGfJzGQq7rtVUU307jKF3A9AbDbueyy36CSyKcsld4uV675Wto5MP3
oeRxyGXzDGeG3SfSC/13XhCFnIYBWRfitF5jTEbjU7bmCb5PoljGfJJkF9Zz
5zPMKZWzKIb7mqA9uDxssddKbGyttDGEkThfuF9E8fSUnafeigt2w8ezMAqi
qVBDGJWrr/EKn3siAMWofrRaf5zR961xNKeJwTy5PGVnYrn2khl80B2DfeLb
BvtpJiSfCB742Hoc+TCxb757dnT07Nk3dAVUespegNVBJzHHSzGfgrVPYd5x
6Env1lN3pqFEM/VCX3hW7p9aME6YyfwTCKYvPEjWlQgC4c1bCy+ELypkPT46
ZsNoIlfgGay95GHKG+xtCo2lJ0AT0E6MZSbvo0eZpH0v/Ct4iivnnwRIn6Q5
KcHRw0zKyxZ7MfNiT84ySS+5D/7IhvDP+Y6EvvRgTiJmw3Ui+Txhg6VkF9J3
BddNHMlHqpPWnPr9ca4aFEW/9MI1SEkKJQuXS/lge4KknRkPXTFFgJFlrpKA
pB12GY1EwF2pOpedjiPSGO6Zq/t/HOMtc7qjKNOTE/bvKdg7nfMQHCiRbEjf
NNSHEnseHx0dfffElZeLolWdS52CVeu1MIrnEEtLTpF//bJzcnz8wynBTzhx
vlP/ms0miAiz8MaEITczkTAAPZywZD5PxrEY8YR5bM4BFnwGXcA8/HSMmpMz
zhLxN86iCb6v1wwosdd8bSGXLXmcwMTZCTsg0D1kXH8FHUsmxZx6iDmAG8kF
rQCJ4cvQt7icsNEamsyjJY4Ms5h7hIuRAXDoYdhmv2M3Q8A9jcUtdm3mauap
YD+bAMrLExF7o4CTdEG0gg6iFY/BJmGSzmkANvIkyLZm9A334aalGHMYoSeZ
FyQRm/FgkQDUMm8ZCR/wu16bxN4UFelRD3bwOU8SD8ZuGQvMhe+ju9VrjxHX
4wjmjLcoi3BWrtZFHAGwR0GJfpMFHwuARh9cv177Gbzg+5Mfnv2CwqYJXSXb
9QY298CtA8hph8yLx4irY5nGSh9k2EUaL6IE1IVaNre0kyQaCyXcwbB9yBYQ
5+AnMB0WQuqT+jswo0oroAqBWdFnYGlrgxZDGa00KQ7z5mzAvIQmCb4ZJgvI
WqBPmI6QiVVgg61mAtCCbLv0YoBgNomjOQugAdzsgdJDzmZp6KPJRmuJGA0m
SjjoDHzmVgQRXSVTtMdjSK3k2BGzSmsoN+fjGAwA89YqBG8EZX8LaZqPyT2T
WZRiKhpx1SAKgzUp0GOBmAuUGlACwpWiBX0e3RtGQslB31k7UJZt6AOstSDV
cWWxQEy4iReQDhyev1+IGA0To3W9UZRCREX1mrquJr/gaJIx3EAxRtfgVhgb
wAjKhlEgkhmMH/KVvg5YClanewNvbAKcRQHKxUlbL2HExLjCFKy68tbJt3xw
9grd6+kr6E1iPaPCeHzd7n/bCaKUnO+7VwBU+mua4prSI0vSBVqazQHflf0A
DxsAiUbX3Q6TaRjyAAJvCFKSd0HEgTWnICyqG027xplFqN4ZBCtAxZqNrB+Q
rgDMUqw+0KOrAAcmAFaB+w0yoaeCklE5CfQGMWgNBXaHm1fCl7MGxMH4Fpwl
H/7YN8kF9gbgSNDPwHBRGhOMgDpJ4Qk30EKKSag9YNNcGRDESKJgqRxQaKzQ
WAwlYBSkNJhBbh3qDqi3LMyjuyBwgbdO0gAbWpwBc0MTKB0AFqKbQzMjFW71
GowRiL/hqAHh5CZaSlMVrVV0e4sFh2z8nrVJV3d3/9prnrXm00A2nwVR0xdQ
yPJk0Yz5f6TgtjjR5ONHNoVcBZEVgcODnwpIXlxHRJm6cnkp4OFUzjTofmuM
ak1pMQTr9BAK0SWn26wVXXFarC0VCgC8Uew2AIfIHqhB0Lu5HfL/ArQD/Wsr
c8pbhEc6KZFHiXAcpD73yRqXUSKtiv0o/O///C8J9/MJKBViUcP9OF4vZDSN
vQUYASIFkALRDhQGygrW0NOLNbqmUgAa11964HxTbuIdPRBWNyY5Gn+aez63
aRSwR4lazMqsNEYg/YHyUsJgmZKjNzAqAfo0nAx6gMxBytHdQs5BZpIJFj5S
TQxbqb5zXYM8w0h30odUMllbBSrQB/tATRwmuhPqORtNyQaWwToGWkkON2oU
21QFmQEkGXtJqdANc19Rd6i2OWQfiLMJ+WOsBLVWg87KDEd6K45Wr1m9NnbY
zB2XOcOCN28dl/prdy5QexMxTWMyWUuVHp0oXGKKBsdnb3SZQEhxprGDmj2G
mioLUnYBw6XelJtaBfMLrlAT9ujyzfDmUUP9Zf0ren/d/bc3vevuGb4fnrcv
Luwb1aJeg09Xby50A3yX3dq5urzs9s/U3XCVFS5dtt/CHxTx0dXgpnfVb188
2gBAij9wwRFGIeAdBBrl5iQPmi86UMAdP2V3d/+ki2jAI/Xh+fH3T+HDCpKy
Go38XX2kXIZo58XYixcECDALIQEoGjgIlAmrkKHFtNYHpvA54+DPQWLxGVIY
YSkgyVLA3LISyVctVWLNhYEp8LEEjqXy6xd8gmknTSwyYExpD1Ihq6tBLGXE
fBHwLGutZghvKi0nCHozj4rc2zBaqQRpCgyVTJymULYITLNS5yad27GWjiQC
hq9znOPNG/DMKIABQqHsAKFwHJ3N0zCGHD8NQQZTulNfGA00Icg8WFxx9Gkl
9wS0luLKkYrEGSUlGExNYiJigGEAigWGEohoSlgFU3b6E+oLQM5RIMxHrriu
0aCsURUXpT7QPDkcXNRV+dgJeARUhAFYn5YCrb3oIG57Irkuy50qWwkhQoGf
QRcIFEav9FVRtRZTcGWoTEIzIWhSWqQ4boDqxwaqs6Ie9GBUMsFcrMei1GfA
Crxje/pATWPKDCAEIfRpEuUNbT+oTD2wKoKMysmfWgqEoK5aQPnHY130wuoW
MruqyrUyxlwsSxyupTGunxd1mIlKlKGW1LKHA5PbJaDjVonvHjta/GhQM7Ob
gDIJ10gJrXQcFTNHw3bRm9lwt66pYMSyg9RYTKpYlsn1grPLXr932b54d919
3X37bvhmMLi6vume2TXj6+679pubc0aVB0SMURx7sQYvGCU8XpoarKqrEIdG
KVG7Im+Rek132NCXXUv6WOHxvKdDtZRsRid/L3mYUO3WmxR6ygMVIYNtjoUd
BgSVZ8l9pQCsj2I9kK7v4S1keaskFbxKWKMm06ogej6WadIadTfQKJu/smNO
XAyMlqUSjPkMCphVuM2TVJUIk6hGHEp8oov+Di8sksykql7XZmDiNj75Va+d
n1032PA1u+udiQb7udO9vmn8ov5CNdH4BXkuxn7uncVwGWWD1m1x0oC6SeB/
cUO16B9UWPLwI2s2/6gaVb/+0GwyZypxNhUac9ft5jVsx5tT2/3aMnljGjBO
0dP9iCdqOWEcZtPbGZVnYhqqNTd44V4Ob/Jy3lMRcbC/eg3LMz0RxuM4oqVM
rrGqD7BWrhgQycwyoMjHVFmwWJzwZDEadqmE0p8NhIbBPJWqy3NSoksJw1il
SQrQvPKQ1HAKILdgwGJzIsLq9flvkfqVRaoTZlAemHx/5RaBJcnfGNNm2UL7
jZRt1krM0IhpiOSBro0UkTdDtsHUCcRxiXhLRoAgpdpfRYJbw2lOP7fuubtz
65OPNn3aAKvXfChjKTlG+QrTrfu2UQgNmkmI2JNLtMP2uzf9znm7/6oku2I1
1Lnutm+67zrnvYuzd8M2ZnkdEja/FmfLzGShP5ywH20GIwU5TeevKS4BONKC
uZK5UOvoQIdeYjEVoQr2Rv4WqmxDJPLV4lItHZFRhqWjDv6Whew8gjpolala
zTy/btOK1BiV47eIRh+8HKL5YTgvDaSubR9vlqjEL/cjwDZDHvRyE7JI8Q0Y
IUcrDBWtcPdY3HIaO4yUSai0bVc4AkC0GrpBy+YNk0GNNAcFJeWUinKGUnoD
/JxwH27QCll5SPER3eQj8Rt4iQ477qv0135LJt/ugnZPqYRMWjinDba5TYs4
Jppc5TiKWHTX9PlCF5bukIoM7T4wGy6418nfs4PhoHeocANXDCS2qTIznk1t
dpQUovmhKr0fs5ry/+qIRa8BkznaKdbzWMuSgTVaZPZfeUgsFdHFTkd3SKvr
kPwHCnbpeI3lJZTnUOWcuY8ocR9kJ9B/inPM+YajD1XWGH1IjSmOBFpDWyCt
3J1QpRkrye7vLvWanb3xF2JF9/MJdwOs1PeoL88qpGSkRlEXG60LG1E6TnO0
kC2CCoj/a6yF+geu9Q4brA8FxeuuuH8ps9lTjD25pUmeS1CZzNvthQ3iAwA6
M5hDs3nsTEwmgjfPeRDMwWqayVcwBzJksdhWyJSNjY4i1MI8ENmWM16mMzsZ
fmZzKxT8pnMSKyv4dURPoiDQq2GbhjHf2dhLYE3jSeL7UBgeUsgTOAVTuEXO
5novF9IzpQWXA8rTSDFHKRJ2YFhUvRd0qf2xd6Z2U6n9oZqDtw0fi4pn2/Re
rxUUHxcU78x0U++q7tuq+NK5ZTuF1U2pXB1l+1nEee+u02zWt7k9n0b15pjd
995Dk9iPubG4XeMsSZ257iiHdtY8qljyS+occP+RIt3LN5JywInVSUklo1lu
pTfa8wp4TmN2o8eJOgLi8v2mPnjJloEgRny9N5ebYQOFoQ1YWMf6VERt7cXn
AW2nEMOe6ynLZtlWYSHxQ7qlHbsdtVhF7nR9iDhtWZJANir56qUKLflb5bxK
VpZj8hVhmu2vcNpzEFGaBOtsD8EvNbMCjXwm3F6UlkMkq5S2hCsJDSVStlIJ
oI6nrpC+KCwMN0r8jzu1E/NmfhulRAmKciUkIZH7V+8G11eDqyGs/zvnV8Nu
v8r6Chp2CV1GuuICGUmpvDo3/BHnFHMZr0u1y+2ZYqfec6q3G7O0KVe1tplJ
XtALqdzSQu6KUZ2i2KMaQtv+vymHNj3lcH9C1dZOtkOMvQfPxr05q8decL3N
KYpBQnvGziYEZxtnVAp7jFgZlLGXm2v/PLmB0WV3EJyqKR/h3ihaYii2eCtj
hTEeMW/eJyA3s38xIFX2zy89t6wkNX1axSa19qXkLHG7NymXUb1FWq5eU7wc
+xRaDjpJspXYg2g5t+J+KC1XPHZSSszdDLdzc5sw/BBuTmWmT+XmdC+fzM1l
1W+19KUF8G5llBbAhbM+dhtSUR1U51uMQBE0qZUln+ysVVY1V059s/zN3P2T
+UBzzKjjHjNid4/HOMT+PGHhPFSuUrT10XYxtxSLSt/ZafFNo2yhjAoHqnDn
1xVVEZG0qnQCt3T/t1i/V9FtWx2xUdznQg0ZoqrI5lR2WVld7jg/555Cg5XE
bsJt63E0WAOUa28rpWyd5SGc8oPnSKBuo3LlZWG5i2v+fG67i3Z2acRqa+/B
PLNN4hmLyX2YZ+dY5+fjnqu1l9HPBU8tLMDrNaKh2cNZaColFA3N7s1CV6z9
Sz2uipsurObKyemS2P9s/lfpX5+bqc770P8GV20D/f8wW6233Nu4NDsoWNQs
r3Ch8zOsdBq/PJDFLut0vzUbDBvDsC7l/VXUaJVMknNy0z7Gs2faLWE0i4nX
WZg49eKu0m5n/Qa+t1m+3YvwLJRu+1CeetB8IVXNg4K8hZP2u3nQinJtP27y
H5e678dSInJuONc/lqekicfeBE8vD3nAx6CSJM9eZuUX0XkFAnMfbe1H5+kV
4XYKEx8xKllrfB7CkiFvuKGNPGuyi8V0zxPsRd1uLB0006fO1j2cxXQ2Z1wW
s/iAzA4y0/Lt7qr7XmSmPfz668qWG7nsK+Izc7nc8JMqbate7dk2eL97tjjZ
At9p8/G+syw5TXcfirRAdO5NkG4+/lc4RuU8zfc1U6RbFjz6oOuW8kM/bqRn
8pIeFUo0eVp15LefgyxV5e53Hj57TDqPRvQweGZjgFz1uwSaL/VGIsAFJhYV
1c87VItb8SSvWiLop3J6kmgK9WsImgJURk8cXCn13+OSaycl157A/UfQ+oQ9
YU/Zd+wZ+549Zz/c51q99s/NT/xXr31gff5eWqOzD50PgIfdYff6z2Ax+Gxn
bJpcqOdm9evD55mFfcatd3bwL0eHH2hpNsQ1NX40s9BPpJgzFTf4NMpnnIUB
nN8zZzrs4JhFkMHkIWvahcJRC1tlcyxr0oBQ9fDpMVoYqEMXUFAl6gj370uF
OThRHSVuT3/5Q5+rjfcpl5q/pd3zXrvf/ssfVTZXl70Ez7To5bHcMxQzIjsX
oHYpDtOnR6o1EuQ2YsrCf8spXR3zVEap3w0o7InujtsqCrb4PKs5sUdEigUX
+nGS7LwBxjnbFeZHvwX5Zw9y6tUN8udfKsgzWfVrx1nZ4utDSRf3fH1ptDre
jVbPvxwkVcKDneXBc2fIKvOoNULxKGPueKFq4jznRk1yJ+EcUMuVThW4tmWT
cye0qUOGLjWzkxDaALuHPb1fhECnvFIqQqVrDqK4h+hSYrTWMucSlTgyfzf+
/Ev+brpsVhlVpwj30e5vKP0VoPTTXxFKf1GI5QKjFMDyUC1Y1BkP1j7HiuPg
Sf5qdzjYjchPvygibzsEoEH56RcGZZo5Esy4+ldAlv30hfMLdBO1l7aK3F+C
cRVmYegR/fgZrMXL2oBQ0pNpoj4+YvhbeomM1y01D2G33UnLgH6kRfpVvkUk
cCfQIKS9M0On/tVN7+Vbez4df/CTxpI0tPP6M1roU1io6odzN143L84Kx6a3
vUzrnKdsb20fh8z8pcSc2FL9yt3IG9/W/gcZuAYVu1UAAA==

-->

</rfc>

