Skip to main content

Protocol Support for High Availability of IKEv2/IPsec
RFC 6311

Revision differences

Document history

Date Rev. By Action
2020-01-21
06 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2018-12-20
06 (System)
Received changes through RFC Editor sync (changed abstract to 'The IPsec protocol suite is widely used for business-critical network traffic. In order to make IPsec …
Received changes through RFC Editor sync (changed abstract to 'The IPsec protocol suite is widely used for business-critical network traffic. In order to make IPsec deployments highly available, more scalable, and failure-resistant, they are often implemented as IPsec High Availability (HA) clusters. However, there are many issues in IPsec HA clustering, and in particular in Internet Key Exchange Protocol version 2 (IKEv2) clustering. An earlier document, "IPsec Cluster Problem Statement", enumerates the issues encountered in the IKEv2/IPsec HA cluster environment. This document resolves these issues with the least possible change to the protocol.

This document defines an extension to the IKEv2 protocol to solve the main issues of "IPsec Cluster Problem Statement" in the commonly deployed hot standby cluster, and provides implementation advice for other issues. The main issues solved are the synchronization of IKEv2 Message ID counters, and of IPsec replay counters. [STANDARDS-TRACK]')
2017-05-16
06 (System) Changed document authors from "Yaron Sheffer, Dacheng Zhang, Yoav Nir" to "Yaron Sheffer, Dacheng Zhang, Yoav Nir, Kalyani Garigipati, Rajeshwar Jenwar"
2016-11-30
06 Wesley Eddy Closed request for Last Call review by TSVDIR with state 'Unknown'
2015-10-14
06 (System) Notify list changed from ipsecme-chairs@ietf.org, draft-ietf-ipsecme-ipsecha-protocol@ietf.org to (None)
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2011-07-14
06 Cindy Morgan State changed to RFC Published from RFC Ed Queue.
2011-07-13
06 (System) RFC published
2011-06-21
(System) Posted related IPR disclosure: Microsoft Corporation's Statement about IPR related to draft-ietf-ipsecme-ipsecha-protocol-06
2011-06-20
(System) Posted related IPR disclosure: Microsoft Corporation's Statement about IPR related to draft-ietf-ipsecme-ipsecha-protocol-06
2011-05-10
06 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-05-10
06 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2011-05-10
06 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-05-09
06 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-05-09
06 (System) IANA Action state changed to In Progress
2011-05-09
06 Amy Vezza IESG state changed to Approved-announcement sent
2011-05-09
06 Amy Vezza IESG has approved the document
2011-05-09
06 Amy Vezza Closed "Approve" ballot
2011-05-09
06 Amy Vezza Approval announcement text regenerated
2011-05-09
06 Amy Vezza Ballot writeup text changed
2011-05-06
06 Adrian Farrel [Ballot comment]
Thank you for addressing my Discuss and Comments
2011-05-06
06 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-05-06
06 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-05-06
06 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-06.txt
2011-04-28
06 Cindy Morgan Removed from agenda for telechat
2011-04-28
06 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-04-28
06 Jari Arkko [Ballot Position Update] New position, Recuse, has been recorded
2011-04-28
06 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-04-27
06 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-04-27
06 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-04-27
06 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
06 Adrian Farrel
[Ballot comment]
I also have a few minor suggestions you might consider to help polish the document

---

I missed a reference to RFC 6027 …
[Ballot comment]
I also have a few minor suggestions you might consider to help polish the document

---

I missed a reference to RFC 6027 in Section 1.

---

Please consider whether a reference figure showing a "cluster" would
help the reader.   

---

Section 1

  This document proposes an extension to the IKEv2 protocol to solve
  the main issues of IKE Message ID synchronization and IPsec SA replay
  counter synchronization and gives implementation advice for others.
  Following is a summary of the solutions provided in this document:

This is a Standards Track document, so you "define" not "propose".

Ditto Section 5

Additionally could you clarify "for others"? I think this is "to
address other issues."

---

It would be helpful if this document made a distinction between 2119
langauge for behavior that is defined in this document and behavior
defined in another document (such as the based spec.) Perhaps use
lower case for behavior defined elsewhere, and include an explicit
reference to where the behavior is defined.

---                                 

I think:

10.  Interaction with other drafts

...should s/drafts/specifications/
2011-04-26
06 Adrian Farrel
[Ballot discuss]
I have two concerns with this document that I would be happy to discuss.

---

I had some difficulty understanding that Section 7 …
[Ballot discuss]
I have two concerns with this document that I would be happy to discuss.

---

I had some difficulty understanding that Section 7 says:

  The standby member can initiate the synchronization of IKEv2 Message
  ID's under different circumstances.
  o  When it receives a problematic IKEv2/IPsec packet, i.e. a packet
      outside its expected receive window.

This seems to conflict with the DoS avoidance described in Section 11.
It seemed to me that this trigger is not needed since the standby
member since whenever a failure (or forced) take-over has happened the
new active member will know that it has taken over as in the third
bullet in the list.

Your trade-off here seems to be that you would like to not have to
resynch when the new active member is already in synch, and the only
way you can find out that you are out of synch is by waiting for a
message.

Similarly the second trigger:

  o  When it has to send the first IKEv2/IPsec packet after a failover
      event.

...can only serve to spread the load of resynch, and is really just a
sub-case of the third trigger in the list.

Yet the third trigger:

  o  When it has just received control from the active member and
      wishes to update the values proactively, so that it need not start
      this exchange later, when sending or receiving the request.

...is rather vague with "just received control" and, in the case of
a very large number of peers, such behavior might very well cripple the
new active member.

So I think you should look again at the tirggers:
- in the light of DoS protection (perhaps the first case can only be
  applied once per peer per take-over)
- in order to take load distribution more explicitly into account.

---

Section 8.2 says:

  For IPsec, there is often a trade-off between security and
  reliability of the protected protocols.  Here again there is some
  leeway for local policy.  Some implementations might accept incoming
  traffic that is outside the replay window for some time after the
  failover event.  Strict implementations will only accept traffic
  that's inside the "safe" window.

Shouldn't you at least be recommending against this behavior? Isn't
this like saying tat an IPsec implementation can sometimes ignore
the fact that it is a security implementation? You should at least
draw out this case in Section 11 if itis really something that is
considered as an option.
2011-04-26
06 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded
2011-04-26
06 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
06 Pete Resnick
[Ballot comment]
Please insert in section 6, just before 6.1.

  All multi-octet fields representing integers are laid out in big
  endian order (also …
[Ballot comment]
Please insert in section 6, just before 6.1.

  All multi-octet fields representing integers are laid out in big
  endian order (also known as "most significant byte first", or
  "network byte order").

(This should have appeared at the top of section 3 of RFC 5996, but unfortunately it only appears in section 3.1. Just trying to avoid confusion.)
2011-04-26
06 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
06 Robert Sparks
[Ballot comment]
Please add a little more detail to the examples on page 22 (explain what the tuples represent), and verify that the examples are …
[Ballot comment]
Please add a little more detail to the examples on page 22 (explain what the tuples represent), and verify that the examples are correct.
2011-04-26
06 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-04-26
06 Stephen Farrell
[Ballot comment]
- I guess there's a 4th case for the list on the end of p10 - that
the newly active member does neither …
[Ballot comment]
- I guess there's a 4th case for the list on the end of p10 - that
the newly active member does neither if the peer didn't support this
spec. Maybe worth a mention.

- 5.2 says a "rekey SHOULD follow shortly..." is that really 2119
language or just what's going to happen when you add a large
increment? If the latter, then maybe s/SHOULD/is likely to/

- 6.4: The sentence "Note that this solution requires that
all these Child SAs either use or do not use Extended Sequence
Numbers" seems odd - I guess you mean "requires that either all
Child SAs use Extended Sequence Numbers or else that no Child SA
uses Extended Sequence Numbers," which is different.

- a nit, 5.1, 1st sentence; s/two counter value/two counter/values/
2011-04-26
06 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded
2011-04-25
06 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-04-21
06 Russ Housley [Ballot comment]
Please consider the editorial comments from the Gen-ART Review by
  Alexey Melnikov on 9-Apr-2011.
2011-04-21
06 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-04-13
06 Sean Turner State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-04-13
06 Sean Turner [Ballot Position Update] New position, Yes, has been recorded for Sean Turner
2011-04-13
06 Sean Turner Ballot has been issued
2011-04-13
06 Sean Turner Created "Approve" ballot
2011-04-13
06 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-04-12
06 Amanda Baber

IANA understands that, upon approval of this document, there is a single
IANA Action that needs to be completed.

In the IKEv2 Notify Message Types …

IANA understands that, upon approval of this document, there is a single
IANA Action that needs to be completed.

In the IKEv2 Notify Message Types - Status Types subregistry of the
Internet Key Exchange Version 2 (IKEv2) Parameters located at:

http://www.iana.org/assignments/ikev2-parameters

four new registrations are to be made. Each of new Notify Message Types
must be assigned values between 16396 and 40959.

The four new registrations are as follows:

Value NOTIFY MESSAGES - STATUS TYPES Reference
---------- ------------------------------- ---------
TBD1 IKEV2_MESSAGE_ID_SYNC_SUPPORTED [RFC-to-be]
TBD2 IPSEC_REPLAY_COUNTER_SYNC_SUPPORTED [RFC-to-be]
TBD3 IKEV2_MESSAGE_ID_SYNC [RFC-to-be]
TBD4 IPSEC_REPLAY_COUNTER_SYNC [RFC-to-be]

IANA understands that this is the only action required upon approval of
this document.
2011-04-11
06 Wesley Eddy Request for Last Call review by TSVDIR is assigned to Hannes Tschofenig
2011-04-11
06 Wesley Eddy Request for Last Call review by TSVDIR is assigned to Hannes Tschofenig
2011-04-06
06 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2011-04-06
06 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2011-04-02
06 Sean Turner Placed on agenda for telechat - 2011-04-28
2011-04-02
06 Sean Turner Status Date has been changed to 2011-04-03 from None
2011-03-30
06 Cindy Morgan Last call sent
2011-03-30
06 Cindy Morgan
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Protocol Support for High Availability of IKEv2/IPsec) to Proposed Standard


The IESG has received a request from the IP Security Maintenance and
Extensions WG (ipsecme) to consider the following document:
- 'Protocol Support for High Availability of IKEv2/IPsec'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-04-13. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-ipsecha-protocol/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-ipsecha-protocol/

2011-03-30
06 Sean Turner Last Call was requested
2011-03-30
06 Sean Turner State changed to Last Call Requested from Publication Requested.
2011-03-30
06 Sean Turner Last Call text changed
2011-03-30
06 (System) Ballot writeup text was added
2011-03-30
06 (System) Last call text was added
2011-03-30
06 (System) Ballot approval text was added
2011-03-29
05 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-05.txt
2011-03-25
06 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

        Yaron Sheffer, co-chair of the IPsecME WG, is Shepherd for this document. I am also a coauthor on the latest version. I have reviewed this version and believe it is ready for publication.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

        The document has had a significant amount of review during F2F meetings and on the list. The WG raised issues which were tracked and closed. I have no concerns regarding the quality of review.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

        The document is within the core focus area of the IPsecME WG. I am not aware of any particular additional community that needs to review it.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

        The is general consensus in the group that the document deals with issues that need to be solved. In fact, it follows an earlier Problem Statement (RFC 6027). An IPR disclosure was recently submitted (https://datatracker.ietf.org/ipr/1515/). There was no WG discussion of this disclosure.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

        There is solid consensus behind this document.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

        No extreme discontent.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

        I have verified ID nits. Out of the issues reported by the nits checker, only one is real (a normative ref to the Problem Statement), and should be fixed for the next revision. There are no formal criteria to be met.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

References are split. As mentioned above, there is one normative reference to an Informational RFC.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The document defines a few extensions (IKEv2 notification types), and the IANA considerations are appropriate.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

        There are no such sections.

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:
    Technical Summary
        Relevant content can frequently be found in the abstract
        and/or introduction of the document. If not, this may be
        an indication that there are deficiencies in the abstract
        or introduction.

  The IPsec protocol suite is widely used for business-critical network traffic. In order to make IPsec deployments highly available, more scalable and failure-resistant, they are often implemented as IPsec High Availability (HA) clusters. However there are many issues in IPsec and IKEv2 HA clustering. This document proposes an extension to the IKEv2 protocol to solve the main issues raised in the "IPsec Cluster Problem Statement" for the commonly deployed hot-standby cluster, and provides implementation advice for other issues.  The main issues to be solved are the synchronization of IKEv2 Message ID counters, and of IPsec Replay Counters.

    Working Group Summary
        Was there anything in WG process that is worth noting? For
        example, was there controversy about particular points or
        were there decisions where the consensus was particularly
        rough?

        There were no notable issues with the WG process. The initial document review was more than satisfactory. More recently the WG has had a lower level of energy, and consequently fewer reviews of ongoing work.

    Document Quality
        Are there existing implementations of the protocol? Have a
        significant number of vendors indicated their plan to
        implement the specification? Are there any reviewers that
        merit special mention as having done a thorough review,
        e.g., one that resulted in important changes or a
        conclusion that the document had no substantive issues? If
        there was a MIB Doctor, Media Type or other expert review,
        what was its course (briefly)? In the case of a Media Type
        review, on what date was the request posted?

We are not aware of implementations of this protocol. However this protocol is solving a set of well-known issues, so we expect vendors to implement it as IKEv2 becomes mainstream.
2011-03-25
06 Cindy Morgan Draft added in state Publication Requested
2011-03-25
06 Cindy Morgan [Note]: 'Yaron Sheffer (yaronf.ietf@gmail.com) is the document shepherd.' added
2011-03-10
(System) Posted related IPR disclosure: Telefonaktiebolaget LM Ericsson (publ)'s Statement about IPR related to draft-ietf-ipsecme-ipsecha-protocol-04
2011-03-02
04 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-04.txt
2011-02-08
03 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-03.txt
2010-10-25
02 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-02.txt
2010-10-11
01 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-01.txt
2010-09-06
00 (System) New version available: draft-ietf-ipsecme-ipsecha-protocol-00.txt