<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Optimized Rekey of IKE &amp; Child SAs">Optimized Rekeys in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt-08"/>
    <author initials="S." surname="Kampati" fullname="Sandeep Kampati">
      <organization abbrev="Microsoft">Microsoft</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>skampati@microsoft.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization abbrev="Huawei">Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhuatai District</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code/>
          <country>China</country>
        </postal>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="P." surname="Wouters" fullname="Paul Wouters">
      <organization abbrev="Aiven">Aiven</organization>
      <address>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <author initials="M." surname="Bharath" fullname="Meduri S S Bharath">
      <organization abbrev="Mavenir">Mavenir Systems Pvt Ltd</organization>
      <address>
        <postal>
          <street>Manyata Tech Park</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code/>
          <country>India</country>
        </postal>
        <email>bharath.meduri@mavenir.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization abbrev="CMCC">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street, West District</street>
          <city>Beijing</city>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="V." surname="Smyslov" fullname="Valery Smyslov">
      <organization abbrev="ELVIS-PLUS">ELVIS-PLUS</organization>
      <address>
        <postal>
          <street>PO Box 81</street>
          <city>Moscow (Zelenograd)</city>
          <code>124460</code>
          <country>Russian Federation</country>
        </postal>
        <phone>+7 495 276 0211</phone>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <date year="2026" month="March" day="18"/>
    <area>Security</area>
    <workgroup>IPSECME Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 88?>

<t>This document describes a method for reducing the size of the Internet Key Exchange version 2 (IKEv2) CREATE_CHILD_SA exchanges used for rekeying of the IKE or Child SA by replacing the SA and TS payloads with a Notify Message payload.
Reducing size and complexity of IKEv2 exchanges is especially useful for low power consumption battery powered devices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsec Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange protocol version 2 (IKEv2) <xref target="RFC7296"/> is used to negotiate Security Association (SA) parameters for the IKE SA and the Child SAs. Cryptographic key material for these SAs have a limited lifetime before it needs to be refreshed, a process referred to as "rekeying". IKEv2 uses the CREATE_CHILD_SA exchange to rekey either the IKE SA or the Child SAs.</t>
      <t>When rekeying, a full set of negotiation parameters are exchanged. However, most of these parameters will be the same as before. This means that the security properties of the IKE or Child SA in practice do not change during a typical rekey.</t>
      <t>For example, the Traffic Selectors (TS) negotiated for the new Child SA must cover the Traffic Selectors negotiated for the old Child SA. And in practically all cases, a new Child SA does not need to cover a wider set of traffic. In the rare case where this would be needed, either a standard rekey could be used or a new Child SA could be negotiated followed by a deletion of the replaced Child SA. Further, per RFC 7296, the Traffic Selectors and algorithms should not change when rekeying the Child SA.</t>
      <t>This document specifies a method to omit these parameters and replace them with a single Notify Message declaring that all these parameters are identical to the originally negotiated parameters.</t>
      <t>Large scale IKEv2 gateways such as Evolved Packet Data Gateway (ePDG) in 4G networks or Centralized Radio Access Network (cRAN/Cloud) gateways in 5G networks typically support more than 100,000 IKE/IPsec connections. At any point in time, there will be hundreds or thousands of IKE SAs and Child SAs that are being rekeyed. This takes a large amount of bandwidth and CPU power and any protocol simplification or bandwidth reducing would result in a significant resource saving.</t>
      <t>For Internet of Things (IoT) devices which utilize low power consumption technology, reducing the size of the CREATE_CHILD_SA exchange for rekeying reduces its power consumption, as sending bytes over the air is usually the most power consuming operation of such a device. Reducing the CPU operations required to verify the rekey exchanges parameters will also save power and extend the lifetime for these devices.</t>
      <t>When using identical parameters for the IKE SA or Child SA rekey, the SA and TS payloads can be omitted thanks to the optimization defined in this document. For an IKE SA rekey, instead of the (large) SA payload, only a Key Exchange (KE) payload, a Nonce payload, and a new Notify Type payload with the new Security Parameter Index (SPI) are required. For a Child SA rekey, instead of the SA or TS payloads, only an optional KE payload (when using PFS), a Nonce payload, and a new Notify Type payload with the new SPI are needed. This makes the rekey exchange packets much smaller and the peers do not need to verify that the SA or TS parameters are compatible with the old SA parameters.</t>
    </section>
    <section anchor="conventions-used-in-this-document">
      <name>Conventions Used in This Document</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="negotiation-of-support-for-optimized-rekey">
      <name>Negotiation of Support for Optimized Rekey</name>
      <t>To indicate support for the optimized rekey negotiation, the initiator includes the OPTIMIZED_REKEY_SUPPORTED notify payload in the IKE_AUTH exchange request.
If the responder supports this optimized rekey and is configured to use it, then it includes the OPTIMIZED_REKEY_SUPPORTED in the IKE_AUTH response message.
If multiple IKE_AUTH exchanges are sent, the OPTIMIZED_REKEY_SUPPORTED notify payload should be in the first IKE_AUTH request and the last IKE_AUTH response.
During the IKE_AUTH exchanges, the entire SA and TS payloads are included as normal. Note that the notify indicates support for optimized rekey for both IKE and Child SAs.</t>
      <t>A responder that does not support the optimized rekey exchange processes the SA and TS payloads as normal, and does not include the new Notify. As per regular IKEv2 processing, a responder that does not recognize this new Notify, will ignore it. Responders may have been administratively configured with the optimization turned off for local reasons. The absence of the Notify indicates to the initiator that the optimization is not available, and regular rekey should be used.</t>
      <t>The IKE_AUTH message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {IDi, [CERT,] [CERTREQ,]
    [IDr,] AUTH, SAi2, TSi, TSr,
    N(OPTIMIZED_REKEY_SUPPORTED)} -->
                            <-- HDR, SK {IDr, [CERT,] AUTH,
                                    SAr2, TSi, TSr,
                                    N(OPTIMIZED_REKEY_SUPPORTED)}
]]></artwork>
      <t>If both peers have exchanged OPTIMIZED_REKEY_SUPPORTED notifies, peers <bcp14>SHOULD</bcp14> use the optimized rekey method for rekeys.
Non-optimized, regular rekey requests <bcp14>MUST</bcp14> always be accepted.
The regular rekey can be retried when the optimized rekey fails.</t>
      <t>Note that, except for the key and identification information such as the SPI, the optimized rekey <bcp14>MUST</bcp14> inherit all other properties of the SA being rekeyed.
This means the configurations related to the SA being rekeyed are supposed to have no changes.
If there is a change to the configurations, the regular rekey <bcp14>MUST</bcp14> be used instead.
If the configuration change occured on an initiator of the rekey, it just starts the regular rekey instead of the optimized rekey.</t>
      <t>If a responder fails to process the optimized rekey request for any reason (e.g., there is a change in the responder's configuration or optimized rekey is administratively prohibited or the initiator tries to use the optimized rekey for initial Child SA when KE methods are not yet determined, see <xref target="initial"/>), it <bcp14>MUST</bcp14> return an error notification of type NO_PROPOSAL_CHOSEN. After receiving the error response of the optimized rekey, the initiator can retry the regular rekey.</t>
      <t>After the regular rekey, the next rekey can use the optimized way if there is no change to the configuration.</t>
    </section>
    <section anchor="optimized-rekey-of-ike-sa">
      <name>Optimized Rekey of IKE SA</name>
      <t>The initiator of an optimized rekey request sends a CREATE_CHILD_SA request with the OPTIMIZED_REKEY notify payload containing the new SPI for the new IKE SA. It omits the SA payload.</t>
      <t>The responder of an optimized rekey request replies with an included OPTIMIZED_REKEY notify with its new IKE SPI and also omits the SA payload.</t>
      <t>Both parties send their nonce and KE payloads just as they would do for a regular IKE SA rekey.</t>
      <t>Using the old SPI from the IKE header and the two new SPIs respectively from the initiator and responder's OPTIMIZED_REKEY payloads, both parties can perform the IKE SA rekey operation.</t>
      <t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {N(OPTIMIZED_REKEY,newSPIi),
         Ni, KEi} -->
                            <-- HDR, SK {N(OPTIMIZED_REKEY,newSPIr),
                                         Nr, KEr}
]]></artwork>
    </section>
    <section anchor="optimized-rekey-of-child-sas">
      <name>Optimized Rekey of Child SAs</name>
      <t>The initiator of an optimized rekey request sends a CREATE_CHILD_SA request with the OPTIMIZED_REKEY notify payload containing the new SPI for the new Child SA.
It omits the SA and TS payloads.
If the Child SA being rekeyed was negotiated with Perfect Forward Secrecy (PFS), a KEi payload is included as well.
If no PFS was negotiated for the Child SA being rekeyed, a KEi payload is not included.
If the Child SA being rekeyed was created with IP compression, then IPCOMP_SUPPORTED notifications <bcp14>MUST</bcp14> be sent as they contain the required updated Compression Parameter Indexes (CPIs).</t>
      <t>The responder of an optimized rekey request performs the same process. It includes the OPTIMIZED_REKEY notify with its new SPI for the new Child SA and omits the SA and TS payloads. Depending on the PFS and IP compression negotiation of the Child SA being rekeyed, the responder correspondingly includes a KEr payload and/or the IPCOMP_SUPPORTED Notify payload.</t>
      <t>Both parties send their nonce payloads just as they would do for a regular Child SA rekey.</t>
      <t>Using the old SPI from the REKEY_SA payload and the two new SPIs respectively from the initiator and responder's OPTIMIZED_REKEY payloads, both parties can perform the Child SA rekey operation.</t>
      <t>Except for the key and identification information such as the SPI and CPI, all other properties of the Child SA being rekeyed <bcp14>MUST</bcp14> be inherited to the one newly created by the optimized rekey. Notify payloads that can affect these properties, such as USE_TRANSPORT_MODE, ESP_TFC_PADDING_NOT_SUPPORTED, ROHC_SUPPORTED <xref target="RFC5857"/> or USE_AGGFRAG <xref target="RFC9347"/> <bcp14>MUST NOT</bcp14> be sent.
In contrast, the Post-quantum Preshared Keys (PPKs) defined in <xref target="RFC9867"/> can be considered as part of the key information since they are used in the session keys calculations, therefore, the PPKs negotiation <bcp14>MUST</bcp14> be included in the optimized Child SA rekey if <xref target="RFC9867"/> are used.</t>
      <t>The CREATE_CHILD_SA message exchange in this case is shown below:</t>
      <artwork><![CDATA[
Initiator                       Responder
--------------------------------------------------------------------
HDR, SK {N(REKEY_SA,oldSPI), N(OPTIMIZED_REKEY,newSPIi),
         Ni, [KEi,]} -->
                            <-- HDR, SK {N(OPTIMIZED_REKEY,newSPIr),
                                         Nr, [KEr,]}
]]></artwork>
      <section anchor="initial">
        <name>Optimized Rekey of the Initial Child SA</name>
        <t>For the initial Child SA that was negotiated as part of an initial IKE exchange (e.g., IKE_AUTH), at the time of its creation the parameters of PFS and KE method(s) for Child SAs are not negotiated.
However, <xref target="I-D.ietf-ipsecme-child-pfs-info"/> provides a mechanism to negotiate these parameters during the creation of the initial Child SA.</t>
        <t>If both peers support and use <xref target="I-D.ietf-ipsecme-child-pfs-info"/>, the PFS policy and KE method(s) for the initial Child SA is known during its creation.
Therefore, in this situation, when rekeying the initial Child SA for the first time, the optimized way <bcp14>SHOULD</bcp14> be used.
If <xref target="I-D.ietf-ipsecme-child-pfs-info"/> is not supported or used, a regular rekey <bcp14>MUST</bcp14> be used for the first time to negotiate these parameters. Then, the next rekey can use the optimized way.</t>
      </section>
    </section>
    <section anchor="payload-formats">
      <name>Payload Formats</name>
      <section anchor="optimizedrekeysupported-notify">
        <name>OPTIMIZED_REKEY_SUPPORTED Notify</name>
        <t>The OPTIMIZED_REKEY_SUPPORTED Notify Message type notification is used by the initiator and responder to indicate their support for the optimized rekey negotiation.</t>
        <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Protocol ID (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
          </li>
          <li>
            <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0, meaning no SPI is present.</t>
          </li>
          <li>
            <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD1</tt>.</t>
          </li>
        </ul>
        <t>This Notify Message type contains no data.</t>
      </section>
      <section anchor="optimizedrekey-notify">
        <name>OPTIMIZED_REKEY Notify</name>
        <t>The OPTIMIZED_REKEY Notify Message type is used to perform an optimized IKE SA or Child SA rekey.</t>
        <artwork><![CDATA[
 0                 1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-+-------------+-------------------------------+
| Next Payload  |C|  RESERVED   |         Payload Length        |
+---------------+-+-------------+-------------------------------+
|Protocol ID(=0)| SPI Size (=0) |      Notify Message Type      |
+---------------+---------------+-------------------------------+
|                                                               |
~                            New SPI                            ~
|                                                               |
+---------------------------------------------------------------+
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>Protocol ID (1 octet) - <bcp14>MUST</bcp14> be 0.</t>
          </li>
          <li>
            <t>SPI Size (1 octet) - <bcp14>MUST</bcp14> be 0. The "Security Parameter Index (SPI)" field is not used in this Notify, and the new SPI is placed in the "Notification Data" field.</t>
          </li>
          <li>
            <t>Notify Message Type (2 octets) - <bcp14>MUST</bcp14> be set to the value <tt>TBD2</tt>.</t>
          </li>
        </ul>
        <t>The Notification Data for this notify contains new SPI. Its size depends on the type of SA being rekeyed. In case of IKE SA it <bcp14>MUST</bcp14> be 8 octets. In case of Child SA it <bcp14>MUST</bcp14> be equal to the SPI Size field in the REKEY_SA notification that identifies the SA being rekeyed.</t>
      </section>
    </section>
    <section anchor="interaction-with-ikev2-extensions">
      <name>Interaction with IKEv2 Extensions</name>
      <section anchor="multiple-key-exchanges">
        <name>Multiple Key Exchanges</name>
        <t><xref target="RFC9370"/> defines the use of multiple key exchange methods for the purpose of IKE SA and Child SA establishment in IKEv2. If multiple key exchange methods are used for an SA, then optimized rekey of this SA <bcp14>MUST</bcp14> use the same key exchange methods. It means that the CREATE_CHILD_SA will be followed by some IKE_FOLLOWUP_KE exchanges and the number of these exchanges will be determined by the number of additional key exchange methods used for the SA being rekeyed.</t>
      </section>
      <section anchor="ike-session-resumption">
        <name>IKE Session Resumption</name>
        <t>IKE Session Resumption <xref target="RFC5723"/> defines an IKEv2 extension, that allows peers to quickly restore IKE SA when it is for some reason deleted. When used with optimized rekey, the following rules apply.</t>
        <ul spacing="normal">
          <li>
            <t>Support for optimized rekeys <bcp14>MUST</bcp14> be re-negotiated during the resumption (in the IKE_AUTH exchange).</t>
          </li>
          <li>
            <t>If support for optimized rekey is negotiated during resumption, then all IKE SA algorithms, including key exchange methods, are taken from the resumption ticket (i.e., from the SA being resumed), since they are not negotiated in the IKE_SA_RESUME exchange.</t>
          </li>
          <li>
            <t>The initial Child SA created during the resumption is considered as been created with key exchange methods for the IKE SA, that were stored in the resumption ticket. This is despite the fact, that during the resumption no key exchanges (e.g., Diffie-Hellman) take place, the session keys are derived from the keys stored in the resumption ticket.</t>
          </li>
        </ul>
      </section>
      <section anchor="mixing-preshared-keys-in-the-createchildsa-exchanges">
        <name>Mixing Preshared Keys in the CREATE_CHILD_SA Exchanges</name>
        <t><xref target="RFC9867"/> defines how PPKs can be mixed into the session keys calculations. In particular, this document allows PPKs to be used in the CREATE_CHILD_SA exchanges when SAs are being rekeyed.
If peers support <xref target="RFC9867"/> and a PPK was used for the SA being rekeyed, then they <bcp14>MUST NOT</bcp14> silently re-use this PPK in case of optimized rekey and <bcp14>MUST</bcp14> re-negotiate the use of PPKs in the CREATE_CHILD_SA exchange.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new Notify Message Types in the "IKEv2 Notify Message Types - Status Types" registry. IANA is requested to assign codepoints in this registry.</t>
      <artwork><![CDATA[
NOTIFY messages: status types            Value
----------------------------------------------------------
OPTIMIZED_REKEY_SUPPORTED                TBD1
OPTIMIZED_REKEY                          TBD2
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Some implementations allow sending rekey messages with a different set of Traffic Selectors or cryptographic parameters in response to a configuration update. IKEv2 <xref target="RFC7296"/> states this "<bcp14>SHOULD NOT</bcp14>" be done. But if there is a configuration change that changes the Traffic Selectors, cryptographic parameters, or other properties of the SA, the regular rekey should be used to make the configuration change active, since the optimized rekey can't express such changes.</t>
      <t>Two peers <bcp14>MUST</bcp14> have the same PFS policy and contain mutally acceptable KE method(s), otherwise, the rekey (regardless of regular or optimized way) of the initial Child SA created in the IKE_AUTH exchange would fail. This issue is also discussed in detail in <xref target="I-D.ietf-ipsecme-child-pfs-info"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The optimized rekey removes sending unnecessary new parameters that originally would have to be validated against the original parameters. In that sense, this optimization enhances the security of the rekey process by reducing the complexity and code required.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Special thanks go to Antony Antony and Tobias Brunner.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC5723">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>The Internet Key Exchange version 2 (IKEv2) protocol has a certain computational and communication overhead with respect to the number of round trips required and the cryptographic operations involved. In remote access situations, the Extensible Authentication Protocol (EAP) is used for authentication, which adds several more round trips and consequently latency.</t>
              <t>To re-establish security associations (SAs) upon a failure recovery condition is time consuming especially when an IPsec peer (such as a VPN gateway) needs to re-establish a large number of SAs with various endpoints. A high number of concurrent sessions might cause additional problems for an IPsec peer during SA re-establishment.</t>
              <t>In order to avoid the need to re-run the key exchange protocol from scratch, it would be useful to provide an efficient way to resume an IKE/IPsec session. This document proposes an extension to IKEv2 that allows a client to re-establish an IKE SA with a gateway in a highly efficient manner, utilizing a previously established IKE SA.</t>
              <t>A client can reconnect to a gateway from which it was disconnected. The proposed approach encodes partial IKE state into an opaque ticket, which can be stored on the client or in a centralized store, and is later made available to the IKEv2 responder for re-authentication. We use the term ticket to refer to the opaque data that is created by the IKEv2 responder. This document does not specify the format of the ticket but examples are provided. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5723"/>
          <seriesInfo name="DOI" value="10.17487/RFC5723"/>
        </reference>
        <reference anchor="RFC9370">
          <front>
            <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
            <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
            <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
              <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
              <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9370"/>
          <seriesInfo name="DOI" value="10.17487/RFC9370"/>
        </reference>
        <reference anchor="RFC9867">
          <front>
            <title>Mixing Preshared Keys in the IKE_INTERMEDIATE and CREATE_CHILD_SA Exchanges of the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-Quantum Security</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>An Internet Key Exchange Protocol Version 2 (IKEv2) extension defined in RFC 8784 allows IPsec traffic to be protected against someone storing VPN communications and decrypting them later, when (and if) a Cryptographically Relevant Quantum Computer (CRQC) is available. The protection is achieved by means of a Post-quantum Preshared Key (PPK) that is mixed into the session keys calculation. However, this protection does not cover an initial IKEv2 Security Association (SA), which might be unacceptable in some scenarios. This specification defines an alternative way to provide protection against quantum computers, which is similar to the solution defined in RFC 8784, but it also protects the initial IKEv2 SA.</t>
              <t>RFC 8784 assumes that PPKs are static and thus they are only used when an initial IKEv2 SA is created. If a fresh PPK is available before the IKE SA expires, then the only way to use it is to delete the current IKE SA and create a new one from scratch, which is inefficient. This specification defines a way to use PPKs in active IKEv2 SAs for creating additional IPsec SAs and rekey operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9867"/>
          <seriesInfo name="DOI" value="10.17487/RFC9867"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-child-pfs-info">
          <front>
            <title>IKEv2 Support for Child SA PFS Policy Information</title>
            <author fullname="Paul Wouters" initials="P." surname="Wouters">
              <organization>Aiven</organization>
            </author>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <date day="18" month="March" year="2026"/>
            <abstract>
              <t>   This document defines an extension for the Internet Key Exchange
   Protocol Version 2 (IKEv2) to support negotiation at the time of
   initial Child Security Association (SA) establishing of Key Exchange
   (KE) method that could be used in subsequent rekeys of this SA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-child-pfs-info-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5857">
          <front>
            <title>IKEv2 Extensions to Support Robust Header Compression over IPsec</title>
            <author fullname="E. Ertekin" initials="E." surname="Ertekin"/>
            <author fullname="C. Christou" initials="C." surname="Christou"/>
            <author fullname="R. Jasani" initials="R." surname="Jasani"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>In order to integrate Robust Header Compression (ROHC) with IPsec, a mechanism is needed to signal ROHC channel parameters between endpoints. Internet Key Exchange (IKE) is a mechanism that can be leveraged to exchange these parameters. This document specifies extensions to IKEv2 that will allow ROHC and its associated channel parameters to be signaled for IPsec Security Associations (SAs). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5857"/>
          <seriesInfo name="DOI" value="10.17487/RFC5857"/>
        </reference>
        <reference anchor="RFC9347">
          <front>
            <title>Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for aggregation and fragmentation of IP packets when they are being encapsulated in Encapsulating Security Payload (ESP). This new payload type can be used for various purposes, such as decreasing encapsulation overhead for small IP packets; however, the focus in this document is to enhance IP Traffic Flow Security (IP-TFS) by adding Traffic Flow Confidentiality (TFC) to encrypted IP-encapsulated traffic. TFC is provided by obscuring the size and frequency of IP traffic using a fixed-size, constant-send-rate IPsec tunnel. The solution allows for congestion control, as well as nonconstant send-rate usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9347"/>
          <seriesInfo name="DOI" value="10.17487/RFC9347"/>
        </reference>
      </references>
    </references>
    <?line 325?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
