@techreport{ietf-ipsecme-encrypted-esp-ping-02, number = {draft-ietf-ipsecme-encrypted-esp-ping-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ipsecme-encrypted-esp-ping/02/}, author = {Antony Antony and Steffen Klassert}, title = {{Encrypted ESP Echo Protocol}}, pagetotal = 10, year = 2026, month = apr, day = 3, abstract = {This document defines the Encrypted ESP Echo Function, a mechanism designed to assess the reachability of IP Security (IPsec) network paths using Encapsulating Security Payload (ESP) packets. The primary objective is to reliably and efficiently detect the status of end-to-end paths by exchanging only encrypted ESP packets between IPsec peers. The Encrypted Echo message can either use existing congestion control payloads from RFC9347 or a new message format defined here, with an option to specify a preferred return path when there is more than one pair of IPsec SAs between the same set of IPsec peers. A peer MAY announce the support using a new IKEv2 Status Notifcation ENCRYPTED\_PING\_SUPPORTED.}, }