<?xml version="1.0" encoding="UTF-8"?>

<rfc category="std" submissionType="IETF" ipr="trust200902" docName="draft-smyslov-ipsecme-ikev2-qr-alt-07">

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="no"?>
<?rfc iprnotified="no" ?>
<?rfc strict="yes" ?>

    <front>
        <title abbrev="Alternative PPK for IKEv2">Alternative Approach for Mixing Preshared Keys in IKEv2 for Post-quantum Security</title>
        <author initials='V.' surname="Smyslov" fullname='Valery Smyslov'>
            <organization>ELVIS-PLUS</organization>
            <address>
                <postal>
                    <street>PO Box 81</street>
                    <city>Moscow (Zelenograd)</city>
                    <code>124460</code>
                    <country>RU</country>
                </postal>
                <phone>+7 495 276 0211</phone>
                <email>svan@elvis.ru</email>
            </address>
        </author>
        <date/>

        <keyword>internet key exchange</keyword>
        <keyword>quantum computer</keyword>
        <keyword>post quantum</keyword>
        <keyword>post-quantum</keyword>
        <keyword>quantum safe</keyword>

        <abstract>
            <t> An IKEv2 extension defined in <xref target="RFC8784" /> 
            allows IPsec traffic to be protected against someone storing VPN communications today
            and decrypting it later, when (and if) cryptographically relevant quantum computers are available. However, 
            this protection doesn't cover an initial IKEv2 SA, which might be unacceptable in some scenarios. 
            This specification defines an alternative way get protection against quantum computers, 
            but unlike the <xref target="RFC8784" /> solution it covers the initial IKEv2 SA too.
            </t>
        </abstract>
    </front>

    <middle>
        <section title="Introduction">
            <t> The Internet Key Exchange Protocol version 2, defined in <xref target="RFC7296" />,
            is used in the IPsec architecture to perform authenticated key exchange.
            <xref target="RFC8784" /> defines an extension of IKEv2 for protecting 
            today's VPN traffic against future quantum computers. At the time this extension was being developed,
            it was a consensus in the IPSECME WG that only IPsec traffic needs to have such a protection. 
            It was believed that no sensitive information is transferred over IKE SA and extending the protection 
            to also cover IKE SA traffic would require serious modifications to core IKEv2 protocol, that 
            contradicted to one of the goals to minimize such changes. For the cases when this 
            protection is needed it was suggested to immediately rekey IKE SA once it is created.
            </t>

            <t> In some situations it is desirable to have this protection for IKE SA from the very beginning,
            when an initial IKE SA is created. An example of such situation is Group Key Management protocol using IKEv2, 
            defined in <xref target="I-D.ietf-ipsecme-g-ikev2" />. In this protocol session keys are transferred 
            from Group Controller/Key Server (GCKS) to Group Members (GM) immediately once an initial IKE SA is created. 
            While it is possible to postpone transfer of the keys until the IKE SA is rekeyed (and <xref target="I-D.ietf-ipsecme-g-ikev2" />
            specifies how to do this), the needed sequence of actions introduces an additional delay and adds unnecessary complexity 
            to the protocol.
            </t>

            <t> Since <xref target="RFC8784" /> was written, a new IKE_INTERMEDIATE exchange for IKEv2 was 
            defined in <xref target="RFC9242" />. While the primary motivation for developing 
            this exchange was to allow multiple key exchanges to be used in IKEv2 (which is defined in <xref target="I-D.ietf-ipsecme-ikev2-multiple-ke" />),
            the IKE_INTERMEDIATE exchange itself can be used for other purposes too. 
            </t>

            <t> This specification makes use of the IKE_INTERMEDIATE exchange to define an alternative approach to 
            <xref target="RFC8784" />, which allows getting protection against quantum 
            computers for initial IKE SA.
            </t>
        </section>

        <section anchor="mustshouldmay" title="Terminology and Notation">
            <t> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", 
            "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted 
            as described in BCP 14 <xref target="RFC2119" /> <xref target="RFC8174" /> when, and only when, 
            they appear in all capitals, as shown here.
            </t>

            <t> We will use a term Conventional Approach in the content of using PPK to refer to the 
            <xref target="RFC8784" /> and a term Alternative Approach to refer to this specification.
            </t>
        </section>

        <section anchor="protocol" title="Alternative Approach Description">
            <t> The IKE initiator who supports the IKE_INTERMEDIATE exchange and wants to use PPK
            includes both the INTERMEDIATE_EXCHANGE_SUPPORTED and the USE_PPK notifications in the IKE_SA_INIT request.
            If the responder supports the IKE_INTERMEDIATE exchange and is willing to use PPK,
            it includes both these notifications in the response.

            <figure align="center">
                <artwork align="left"><![CDATA[
Initiator                       Responder
------------------------------------------------------------------
HDR, SAi1, KEi, Ni, 
N(INTERMEDIATE_EXCHANGE_SUPPORTED),
N(USE_PPK)              --->
                        <---    HDR, SAr1, KEr, Nr, [CERTREQ,] 
                                N(INTERMEDIATE_EXCHANGE_SUPPORTED),
                                N(USE_PPK)
            ]]></artwork>
            </figure>

            If this is the case, then the initiator <bcp14>MAY</bcp14> choose to use the IKE_INTERMEDIATE exchange to negotiate PPK identity with 
            the responder. Note, that it is up to the initiator whether to use the alternative or conventional approaches, i.e.
            whether to send PPK identity in the IKE_INTERMEDIATE exchange or in the IKE_AUTH exchange,
            as defined in the <xref target="RFC8784" />. 
            </t>
    
            <t> If the initiator decides to use alternative approach, it includes one or more 
            PPK_IDENTITY_KEY notification containing PPK identities the initiator believes 
            are appropriate for the IKE SA being created, into the IKE_INTERMEDIATE request.
            </t>

            <t> The PPK_IDENTITY_KEY is a Status Type IKEv2 notification. Its Notify Message Type
            is &lt;TBA by IANA&gt;, Protocol ID and SPI Size fields are both set to 0.
            The format of the notification data is shown below on <xref target="ppk_identity_key_format" />.
            </t>

            <figure title="PPK_IDENTITY_KEY Notification Data Format" anchor="ppk_identity_key_format">
              <preamble></preamble>
              <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                             PPK_ID                            ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                        PPK Confirmation                       +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
               ]]></artwork>
              <postamble></postamble>
            </figure>
  
            <t>Where:</t>
  
            <t><list style="symbols">
               <t>PPK_ID (variable) -- PPK_ID as defined in Section 5.1 of <xref target="RFC8784" />.
               </t>
  
              <t>PPK Confirmation (8 octest) -- value, which allows the responder to check whether it has the same PPK as the initiator for a given PPK_ID.
              This field contains the first 8 octets of a string computed as prf( PPK, Ni | Nr | SPIi | SPIr ),
              where prf is the negotiated PRF; PPK is the key value for a specified PPK_ID; Ni, Nr, SPIi, SPIr -- nonces and IKE SPIs for the SA being established.
              </t>
            </list>
            </t>

            <t> If a series of the IKE_INTERMEDIATE exchanges takes place, the PPK_IDENTITY_KEY notification(s)
            <bcp14>MUST</bcp14>bcp14> be sent in the last one, i.e. in the IKE_INTERMEDIATE exchange immediately preceding the IKE_AUTH exchange. 
            If the last IKE_INTERMEDIATE exchange contains other payloads aimed for some other purpose, 
            then the notification(s) <bcp14>MAY</bcp14> be piggybacked with these payloads.
    
            <figure align="center">
                <artwork align="left"><![CDATA[
Initiator                         Responder
------------------------------------------------------------------
HDR, SK { ... N(PPK_IDENTITY_KEY, PPK_ID_1)
           [, N(PPK_IDENTITY_KEY, PPK_ID_2)] ...
           [, N(PPK_IDENTITY_KEY, PPK_ID_n)]}   --->
                ]]></artwork>
            </figure>

            Depending on the responder's capabilities and policy the following situations are possible.
            </t>

            <list style="letters">
            <t> If the responder doesn't support the alternative approach, it will ignore the received PPK_IDENTITY_KEY
            notification(s) and won't include any additional notifications in the response. 

            <figure align="center">
                <artwork align="left"><![CDATA[
Initiator                       Responder
---------------------------------------------------------------
                        <---    HDR, SK { ... }
                    ]]></artwork>
                </figure>

            In this case the initiator cannot make an initial IKE SA to be a quantum computer resistant,
            so if this is a requirement for the initiator, then it <bcp14>MUST</bcp14>bcp14> abort creating IKE SA.
            Otherwise, the initiator continues with the IKE_AUTH exchange and <bcp14>MAY</bcp14> try to use PPK
            as described in <xref target="RFC8784" />. 
            </t>

            <t>If the responder supports this extension, but doesn't have any of the PPKs which IDs were sent by the initiator
            or it has some of proposed PPKs, but their values mismatch the initiator's ones 
            (based on the information from the PPK Confirmation field), then it <bcp14>MUST</bcp14>bcp14> return the PPK_IDENTITY notification containing no data.

<figure align="center">
    <artwork align="left"><![CDATA[
Initiator                       Responder
---------------------------------------------------------------
                        <---    HDR, SK { N(PPK_IDENTITY) }
        ]]></artwork>
    </figure>

            In this case the initiator cannot achieve quantum computer resistance using the proposed PPKs.
            If this is a requirement for the initiator, then it <bcp14>MUST</bcp14>bcp14> abort creating IKE SA.
            Otherwise, the initiator continues with the IKE_AUTH exchange as defined in <xref target="RFC7296" />. 
            The initiator <bcp14>SHOULD</bcp14> NOT fall back to the IKE_AUTH exchange defined in <xref target="RFC8784" /> in this case, 
            since the initiator already knows that no one of the proposed PPKs is suitable for the responder.
            If using PPK is mandatory for the responder, then it will send back the AUTHENTICATION_FAILED notification
            in the IKE_AUTH response (as specified in Table 1 of <xref target="RFC8784" />). 
            Otherwise the IKE SA will be created as per <xref target="RFC7296" />.
            </t>

            <t> If the responder supports this extension and is configured with one of the PPKs
            which IDs were sent by the initiator and this PPK matches the initiator's one
            (based on the information from the PPK Confirmation field), then the responder selects this PPK 
            and returns back its identity in the PPK_IDENTITY notification.

                <figure align="center">
                    <artwork align="left"><![CDATA[
Initiator                       Responder
---------------------------------------------------------------
               <---    HDR, SK { ... N(PPK_IDENTITY, PPK_ID_i)}
                    ]]></artwork>
                </figure>

            In this case the IKE_AUTH exchange is performed as defined in <xref target="RFC7296" />, so that 
            neither PPK_IDENTITY nor NO_PPK_AUTH notifications are sent, since it's already known which PPK to use.
            However, the keys for the IKE SA are computed using PPK, as described in <xref target="keys" />.
            If the responder returns PPK identity that was not proposed by the initiator, then the initiator
            must treat this as a fatal error and <bcp14>MUST</bcp14>bcp14> abort the IKE SA establishment.
            </t>
            </list>

            <t> Since the responder selects PPK before it knows the identity of the initiator, a situation may occur,
            when the responder agrees to use some PPK in the IKE_INTERMEDIATE exchange, but later discovers during the 
            IKE_AUTH exchange that this particular PPK is not associated with the initiator's identity in its local policy.
            Note, that the responder does have this PPK, but it is just not listed among the PPKs for using with this initiator.
            In this case the responder <bcp14>SHOULD</bcp14> abort negotiation and return back the AUTHENTICATION_FAILED notification
            to be consistent with its policy. However, if using PPK with this initiator is marked optional in the local policy, 
            then the responder <bcp14>MAY</bcp14> continue creating IKE SA using the negotiated "wrong" PPK.
            </t>
        </section>

        <section anchor="keys" title="Computing IKE SA Keys">
            <t> Once the PPK is negotiated in the last IKE_INTERMEDIATE exchange, the IKE SA keys are recalculated.
            Note that if the IKE SA keys are also recalculated as the result of the other actions performed in the IKE_INTERMEDIATE exchange
            (for example, as defined in <xref target= "I-D.ietf-ipsecme-ikev2-multiple-ke" />, then applying PPK
            <bcp14>MUST</bcp14>bcp14> be done after all of them, so that recalculating IKE SA keys with PPK 
            is the last action before they are used in the IKE_AUTH exchange.
            </t>

            <t> The IKE SA keys are computed differently compared to <xref target="RFC8784" />.
            A new SKEYSEED' value is computed using the negotiated PPK and the most recently computed SK_d key.
            Note, that the PPK is applied to SK_d exactly how it is specified in <xref target="RFC8784" />, 
            and the result is used as SKEYSEED'.

                <figure align="center">
                    <artwork align="left"><![CDATA[
SKEYSEED' = prf+ (PPK, SK_d)
                    ]]></artwork>
                </figure>

            Then the SKEYSEED' is used to recalculate all SK_* keys as defined in Section 2.14 of <xref target="RFC7296" />.

                <figure align="center">
                    <artwork align="left"><![CDATA[
{SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr}
                           = prf+ (SKEYSEED', Ni | Nr | SPIi | SPIr )

                    ]]></artwork>
              </figure>

           In the formula above Ni and Nr are nonces from the IKE_SA_INIT exchange and SPIi, SPIr - SPIs of the IKE SA being created.
           Note, that SK_d, SK_pi, and SK_pr are not individually recalculated using PPK, as it is defined in <xref target="RFC8784" />.
           </t> 

           <t> The resulting keys are then used in the IKE_AUTH exchange and in the created IKE SA.
           </t>
        </section>

        <section anchor="comparison" title="Comparison of the Conventional and the Alternative Approaches">
            <t> This specification isn't intended to be a replacement for <xref target="RFC8784" />.
            Instead, it is supposed to be used in situations where the conventional approach has a 
            significant shortcomings. However, if the partners support both approaches, then the alternative approach 
            <bcp14>MAY</bcp14> also be used in situations where convenient approach suffices.
            </t>

            <t> The alternative approach has the following advantages:
            <list style="numbers">
                <t> The main advantage of the alternative approach is that it allows an initial IKE SA to be protected
                against quantum computers. This is important for those IKE extensions which transfer sensitive information,
                e.g. cryptographic keys, over initial IKE SA. The prominent example of such extensions is <xref target="I-D.ietf-ipsecme-g-ikev2"/>.</t>
                <t> Using the alternative approach allows the initiator to specify several appropriate PPKs and the responder
                to choose one of them. This feature could simplify PPK rollover.</t>
                <t> With the alternative approach there is no need for the initiator to calculate the content of the AUTH
                payload twice (with and without PPK) to support a situation when using PPK is optional for both sides.</t>
            </list>
            The main disadvantage of the alternative approach is that it requires an additional round trip (the IKE_INTERMEDIATE exchange)
            to set up IKE SA. However, if the IKE_INTERMEDIATE exchange has to be used for some other purposes in any case,
            then PPK stuff can be piggybacked with other payloads, thus eliminating this penalty.
            </t>
        </section>

        <section anchor="security" title="Security Considerations">
            <t> Security considerations of using Post-quantum Preshared Keys
            in the IKEv2 protocol are discussed in <xref target="RFC8784" />. This
            specification defines an alternative way of exchanging PPK identity information.
            </t>
        </section>

        <section anchor="iana" title="IANA Considerations">
            <t>This document defines a new Notify Message Type in the "IKEv2 Notify Message Types - Status Types" registry:</t>
            <figure align="center">
                <artwork align="left"><![CDATA[
<TBA>       PPK_IDENTITY_KEY
                ]]></artwork>
            </figure>
        </section>

        <section title="Acknowledgements" anchor="acknowledgements">
            <t> The author would like to thank Paul Wouters for valuable comments and Tero Kivinen for 
            pointing out to the problem of mismatched preshared keys.</t>
        </section>
    </middle>

    <back>
        <references title='Normative References'>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml" ?>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml" ?>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml" ?>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8784.xml" ?>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9242.xml" ?>
        </references>

        <references title='Informative References'>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-g-ikev2.xml" ?>
            <?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ipsecme-ikev2-multiple-ke.xml" ?>
        </references>
    </back>
</rfc>


