…ts in RFC 4145 based on the value in the offer. If an agent is utilizing SRTP [ RFC3711 ], it MAY include a mix of UDP and TCP candidates. If ICE selects a TCP candidate pair, it is RECOMMENDED that the agent still utilizes SRTP but runs it over the connection established by ICE.…
…m, like what is specified in "The Secure Real-time Transport Protocol (SRTP)" [ RFC3711 ], producing a Secured RTP Stream ( Section 2.1.14 ). Either an RTP stream ( Section 2.1.10 ) or a redundancy RTP stream ( Section 2.1.12 ) can be used as input to this transformation. In SRTP…
…h types of content. Technology for providing this service (for instance, SRTP [ RFC3711 ], DTLS [ RFC6347 ] and DTLS-SRTP [ RFC5763 ]) is well understood. However, we must examine this technology in the WebRTC context, where the threat model is somewhat different. In general, it …
…el Indication December 2011 In the Secure Real-time Transport Protocol (SRTP) [ RFC3711 ], RTP header extensions are authenticated but not encrypted. When this header extension is used, audio levels are therefore visible on a packet-by-packet basis to an attacker passively observ…
…age as the RTP header itself. When Secure Real-time Transport Protocol (SRTP) [ RFC3711 ] is used to protect RTP sessions, the RTP payload may be both encrypted and integrity protected, while the RTP header is either unprotected or integrity protected. Therefore, it is inappropri…
…m, like what is specified in "The Secure Real-time Transport Protocol (SRTP)" [ RFC3711 ], producing a Secured RTP Stream ( Section 2.1.14 ). Either an RTP stream ( Section 2.1.10 ) or a redundancy RTP stream ( Section 2.1.12 ) can be used as input to this transformation. In SRTP…
…not be protected even in a Secure Real-time Transport Protocol (SRTP) session [ RFC3711 ] might be of concern in some cases where the activity of a particular participant in a conference is confidential. Also, as discussed in [ SRTP-VBR-AUDIO ], an attacker might be able to infer…
…ts in RFC 4145 based on the value in the offer. If an agent is utilizing SRTP [ RFC3711 ], it MAY include a mix of UDP and TCP candidates. If ICE selects a TCP candidate pair, it is RECOMMENDED that the agent still utilizes SRTP but runs it over the connection established by ICE.…
…ts in RFC 4145 based on the value in the offer. If an agent is utilizing SRTP [ RFC3711 ], it MAY include a mix of UDP and TCP candidates. If ICE selects a TCP candidate pair, it is RECOMMENDED that the agent still utilizes SRTP but runs it over the connection established by ICE.…
…cable RTP profile such as RTP/AVP [ RFC3551 ], RTP/AVPF [ RFC4585 ], RTP/SAVP [ RFC3711 ] or RTP/ SAVPF [ RFC5124 ]. However, as "Securing the RTP Protocol Framework: Why RTP Does Not Mandate a Single Media Security Solution" [ RFC7202 discusses, it is not an RTP payload format's…
…a path is secured (e.g., using the Secure Real-time Transport Protocol (SRTP) [ RFC3711 ]), the attacker will not be able to process the data packets, but will only be able to discard them, effectively disabling the data stream. However, this attack requires the agent to disrupt …
…e fake candidate, the attack is easier to coordinate. However, if SRTP is used [RFC3711], the attacker will not be able to play the media packets, but will only be able to discard them, effectively disabling the media stream for the call. However, this attack requires the agent t…
… fake candidate, the attack is easier to coordinate. However, if SRTP is used [ RFC3711 ], the attacker will not be able to play the media packets, but will only be able to discard them, effectively disabling the media stream for the call. However, this attack requires the agent …
…er authentication techniques. In the case of real-time traffic, usage of SRTP [ RFC3711 ] prevents these attacks. ¶ In some situations, the TURN server may be situated in the network such that it is able to send to hosts to which the client cannot directly send. This can happen, …
…er authentication techniques. In the case of real-time traffic, usage of SRTP [ RFC3711 ] prevents these attacks. In some situations, the TURN server may be situated in the network such that it is able to send to hosts to which the client cannot directly send. This can happen, fo…