…often needed for those streams. The Secure Real-time Transport Protocol (SRTP) [RFC3711] provides security services for RTP media and is signaled by use of secure RTP transport (e.g., "RTP/SAVP" or "RTP/SAVPF") in an SDP media (m=) line. However, there are no means within SDP its…
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…based feedback (RTP/AVPF) [ RFC4585 ] , and the secure RTP profile (RTP/SAVP) [ RFC3711 ] . ¶ The RTCP-based feedback extensions [ RFC4585 ] are needed for the improved RTCP timer model. This allows more flexible transmission of RTCP packets in response to events, rather than str…
… secret, which is then used to generate keys and salt for a Secure RTP (SRTP) [ RFC3711 ] session. ZRTP borrows ideas from [ PGPfone ]. A reference implementation of ZRTP is available in [ Zfone ]. The ZRTP protocol has some nice cryptographic features lacking in many other appro…
…based feedback (RTP/AVPF) [ RFC4585 ] , and the secure RTP profile (RTP/SAVP) [ RFC3711 ] . ¶ The RTCP-based feedback extensions [ RFC4585 ] are needed for the improved RTCP timer model. This allows more flexible transmission of RTCP packets in response to events, rather than str…
…vidual session. Such negotiation MUST NOT cause a two-time pad (Section 9.1 of [RFC3711]). R-PSTN: The media security key management protocol MUST support termination of media security in a PSTN gateway. This requirement is from Section 4.4. 5.2. Security Requirements This sectio…
…s is performed via DTLS [ RFC6347 ] and DTLS-SRTP [ RFC5763 ] keying for SRTP [ RFC3711 ] for the media channel and SCTP over DTLS [ RFC8261 ] for data channels. Specifically, Alice and Bob perform a DTLS handshake on every component which has been established by ICE. The total n…
… Minimal Control [ RFC3551 ] o The Secure Real-time Transport Protocol (SRTP) [ RFC3711 ] o SDP: Session Description Protocol [ RFC4566 ] o Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols [ RFC5245…
…m, like what is specified in "The Secure Real-time Transport Protocol (SRTP)" [ RFC3711 ], producing a Secured RTP Stream ( Section 2.1.14 ). Either an RTP stream ( Section 2.1.10 ) or a redundancy RTP stream ( Section 2.1.12 ) can be used as input to this transformation. In SRTP…
…h types of content. Technology for providing this service (for instance, SRTP [ RFC3711 ], DTLS [ RFC6347 ] and DTLS-SRTP [ RFC5763 ]) is well understood. However, we must examine this technology in the WebRTC context, where the threat model is somewhat different. In general, it …
…el Indication December 2011 In the Secure Real-time Transport Protocol (SRTP) [ RFC3711 ], RTP header extensions are authenticated but not encrypted. When this header extension is used, audio levels are therefore visible on a packet-by-packet basis to an attacker passively observ…
…age as the RTP header itself. When Secure Real-time Transport Protocol (SRTP) [ RFC3711 ] is used to protect RTP sessions, the RTP payload may be both encrypted and integrity protected, while the RTP header is either unprotected or integrity protected. Therefore, it is inappropri…
…m, like what is specified in "The Secure Real-time Transport Protocol (SRTP)" [ RFC3711 ], producing a Secured RTP Stream ( Section 2.1.14 ). Either an RTP stream ( Section 2.1.10 ) or a redundancy RTP stream ( Section 2.1.12 ) can be used as input to this transformation. In SRTP…