Skip to main content

STUN Usage for Consent Freshness and Session Liveness
draft-muthu-behave-consent-freshness-01

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Expired & archived
Authors Muthu Arul Perumal , Dan Wing , Hadriel Kaplan
Last updated 2013-01-17 (Latest revision 2012-07-16)
Replaced by draft-ietf-rtcweb-stun-consent-freshness, RFC 7675
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Verification of peer consent is necessary in WebRTC deployments to ensure that a malicious JavaScript cannot use the browser as a platform for launching attacks. A related problem is session liveness. WebRTC applications may want to detect connection failure and take appropriate actions. This document describes a STUN usage that enables a WebRTC browser to perform the following on a candidate pair ICE is using for a media component after session establishment:

Authors

Muthu Arul Perumal
Dan Wing
Hadriel Kaplan

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)