Skip to main content

Encrypted ESP Echo Protocol
draft-antony-ipsecme-encrypted-esp-ping-05

Document Type Replaced Internet-Draft (ipsecme WG)
Expired & archived
Authors Antony Antony , Steffen Klassert
Last updated 2025-04-03 (Latest revision 2024-11-06)
Replaced by draft-ietf-ipsecme-encrypted-esp-ping
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Adopted by a WG
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-ipsecme-encrypted-esp-ping
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document defines the Encrypted ESP Echo Function, a mechanism designed to assess the reachability of IP Security (IPsec) network paths using Encapsulating Security Payload (ESP) packets. The primary objective is to reliably and efficiently detect the status of end-to-end paths by exchanging only encrypted ESP packets between IPsec peers. The Encrypted Echo message can either use existing congestion control payloads from RFC9347 or a new message format defined here, with an option to specify a preferred return path when there is more than one pair of IPsec SAs between the same set of IPsec peers. A peer MAY announce the support using a new IKEv2 Status Notifcation ENCRYPTED_PING_SUPPORTED.

Authors

Antony Antony
Steffen Klassert

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)