2025 Linux IPsec workshop, Madrid (17 - 18 July)

The 2025 Linux IPsec workshop was held on July 17th - 18th in the scorching hot Madrid, directly before the IETF Meeting 123. The workshop began on thrusday morning with the welcome speech by Steffen Klassert, who organized the event.

Presentation Notes and Slides

Recent Developments in strongSwan by Tobias Brunner

Tobias presented an overview of new features added in recent strongSwan releases.

These new features include:

  • Narrowing with Trap Policies
  • Per-CPU SAs
  • AGGFRAG Mode
  • Regular Expressions
  • EAP-Identity Matching

IKEv2 Signature Authentication using ML-DSA by Andreas Steffen

Andreas presented about the current state of the PQC authentication standards, such as ML-DSA, SLH-DSA and FN-DSA. The presentation included the preliminary strongSwan implementation of IKEv2 signature authentication using ML-DSA.

Group IPsec SAs and key management by Valery Smyslov

Valery presented about securing IP multicast using G-IKEv2. The G-IKEv2 document has been in development for more than 15 years, and is expeted to be published as an RFC soon.

Handling IPsec traffic with nftables based firewall by Tuomo Soini

Tuomo gave a presentation about a recent nftables firewall project, Foomuuri. The main focus of the presentation was on how IPsec secured traffic is handled in Foomuuri.

The Autonomic Control Plane (ACP) and Minerva Connect by Michael Richardson

Michael held a presentation about the Autonomic Control Plane (ACP). The presentation included some basics of ACP, as well as some insights to Michael's solution called Minerva. The architecture and challenges in implementation were discussed.

Enterprise Networking with IPsec and Dynamic Routing by Simo Soini

Simo presented his plans for an experiment on enterprise networking using IPsec for securing the traffic and dynamic routing between tunnels.

IPsec Performance Tests by Hannes Tschofenig and Kai Jansen

Hannes and Kai presented their IPsec performance tests with strongSwan and two 100GB Mellanox NICs. The discussion about the results and IPsec performance optimization in general continued during the IETF 123 Hackathon.

Diet-ESP and Integration of IPsec by Daniel Migault

Daniel presented SeCPRI, an IPsec based security layer for eCPRI, which uses Diet-ESP for compressing the encrypted messages.

Enhanced ESP by Steffen Klassert

Steffen presented an overview about the EESP protocol design. There was a lot of discussion concerning the requirements and specifics of the protocol.

Related links:

IKEv2 negotiation for EESP by Tobias Brunner

The second presentation by Tobias was about IKEv2 negotiation for the EESP protocol Steffen Klassert presented about. The focus was on the slight differences between negotiation for ESP versus EESP.

EESP Stateless Encryption Scheme by Frank Xialiang

Industry Trends in HPC/AI workloads and ESP-like Protocols by Anthony Anthony

Anthony gave an overview about industry trends in high-performance computing and AI.

Related links:

Stateless encryption by Valery Smyslov

Valery's second presentation was about stateless encryption, and more specifically about how much security can be sacrificed in favor of performance.

Linux XFRM Code Path by Anthony Anthony

Anthony gave a presentation about the XFRM code in Linux kernel. The XFRM code is challenging to understand by just reading the code, and this started some fruitful conversation about how to better understand and learn this code. Inspired by this discussion, Christian Hopps gave a short demonstration about semantic code navigation using Language Servers. Language servers can communicate with code editors (such as Emacs, Neovim or VSCode) using language server protocol.

Related links:

IPsec Interoperability discussion by Michael Richardson

Michael lead a discussion about interoperability between different IPsec implementations. There was an idea about an event for testing interoperability between as many IPsec implementations as possible.

Handling fragments by Tero Kivinen

Tero presented about handling incoming fragments in IPsec, and the three methods for this as listed in RFC4301.

Future of the IPsec Workshop and Closing by Steffen Klassert

The 2025 IPsec Workshop was finished with some final words about the workshop and it's future from the organizer, Steffen Klassert. Huge thanks to Steffen for organizing the workshop, and to everyone who attended!