Skip to main content

Extended Secure RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/SAVPF)
draft-ietf-avt-profile-savpf-12

Revision differences

Document history

Date Rev. By Action
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Magnus Westerlund
2007-11-28
12 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-11-28
12 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-11-28
12 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-11-27
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-11-27
12 (System) IANA Action state changed to In Progress
2007-11-27
12 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-11-26
12 Amy Vezza IESG state changed to Approved-announcement sent
2007-11-26
12 Amy Vezza IESG has approved the document
2007-11-26
12 Amy Vezza Closed "Approve" ballot
2007-11-26
12 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-11-21
12 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2007-11-21
12 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2007-11-21
12 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2007-11-20
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-11-20
12 (System) New version available: draft-ietf-avt-profile-savpf-12.txt
2007-10-19
12 (System) Removed from agenda for telechat - 2007-10-18
2007-10-18
12 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-10-18
12 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-10-18
12 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-10-18
12 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-10-18
12 Sam Hartman
[Ballot comment]
I think Jon's comment is getting at the same issue.
Long term we want people to be able to offer best-effort security--offer both …
[Ballot comment]
I think Jon's comment is getting at the same issue.
Long term we want people to be able to offer best-effort security--offer both secure and non-secure and select secure if it is available at both ends.
The important thing will be to let the user know whether we have security rather than to fail if we do not.
I think it is fine to ignore this issue for now provided that we plan on updating this spec wehn the appropriate mmusic work concludes.
2007-10-18
12 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman
2007-10-18
12 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-10-18
12 Jon Peterson
[Ballot comment]
Following on Magnus' DISCUSS, I also think it's premature to discuss  SDP capability negotiation scenarios in this document. Perhaps it would be better …
[Ballot comment]
Following on Magnus' DISCUSS, I also think it's premature to discuss  SDP capability negotiation scenarios in this document. Perhaps it would be better to say that you MUST not offer secure and insecure media simultaneously in the absence of some future protocol mechanism updating this specification. I just wanted to point out that more affected text lives in the second paragraph of 3.3.4, and of course in the paragraph above the one in 3.3.1 cited by Magnus. Furthermore, all of 3.3.1 seems hastily written and should be cleared of various grammar woes ("the answerer the answerer", etc).

Also, at the end of the first paragraph of the Sec Cons:

  The SAVP profile does not add, nor take away,
  any security services compared to SAVP. 

Surely this should be "The SAVPF profile does not add..." etc
2007-10-18
12 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-10-18
12 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-10-17
12 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-10-17
12 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2007-10-17
12 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-10-17
12 Magnus Westerlund
[Ballot discuss]
Section 3.1.1:

  "If an offer contains multiple alternative profiles the answerer the
  answerer SHOULD prefer a secure profile (if supported) over …
[Ballot discuss]
Section 3.1.1:

  "If an offer contains multiple alternative profiles the answerer the
  answerer SHOULD prefer a secure profile (if supported) over non-
  secure ones.  Among the secure or insecure profiles, the answerer
  SHOULD select the first acceptable alternative to respect the
  preference of the offerer. "

I think we have an issue here in relation to describing how one offers alternatives. The above text makes no references to how one accomplish the indication of alternatives. Which I think is the only reasonable solution given that we have no defined way of providing alternatives. SDPcapneg is under development and grouping of media lines (RFC 3388) does lack an attribute with the appropriate semantic.

Due to this there is a serious issue with the Section 3.4, Example 4:

This SDP indicates to the RTSP client that it should setup both media streams, one with SAVPF the other with AVPF.

I would also like to point out that the SDP lacks a=control to indicate control URLs.

Section 5:

"  Note that the rules for sharing master keys apply as described in
  [4] (e.g., Section 9.1). In particular, the same rules for avoiding
  the two-time pad (keystream reuse) apply: a master key MUST NOT be
  shared among different RTP sessions if the SSRCs used are unique
  across all the RTP streams of the RTP sessions that share the same
  master key."

I think there is missing "unless guaranteed" in the above rule sentence. Only if the SSRCs over all the session using the same keys are unique can the same master key be used.
2007-10-17
12 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund
2007-10-17
12 Magnus Westerlund
[Ballot comment]
Section 3.3.2:

"        Note: To change any of the profiles in use, the client needs
        tear …
[Ballot comment]
Section 3.3.2:

"        Note: To change any of the profiles in use, the client needs
        tear down the RTSP session (using the TEARDOWN method) and re-
        establish it using SETUP.  This may change as soon as media
        updating (similar to a SIP UPDATE or re-INVITE) becomes
        specified. "

This is not totally correct, as it is possible to teardown an individual media stream without tearing down the whole RTSP session I therefore suggest the following formulation:

        Note: To change any of the profiles in use, the client needs
        tear down that media stream (and possibly the whole RTSP session)
      (using the TEARDOWN method) and re-establish it using SETUP.  This
        may change as soon as media updating (similar to a SIP UPDATE or
        re-INVITE) becomes specified.
2007-10-17
12 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2007-10-16
12 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Nicolas Williams.
2007-10-16
12 Tim Polk
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for …
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for integrity protection for the a=key-mgmt
attribute.

Two small changes could address this issue.  First, in section 3.4, Example 1
should note that an integrity protected channel was required to support the
security negotiations.  (Examples 3-5 share that requirement, but I would hope
that careful wording in Example 1 could keep us from repeating ourselves.)
More importantly, the security considerations section needs some text about
integrity protection with an explicit pointer to the security considerations in
RFC 4576.
2007-10-16
12 Tim Polk
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for …
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for integrity protection for the a=key-mgmt
attribute.

Two small changes could address this issue.  First, in section 3.4, Example 1
should note that an integrity protected channel was required to support the
security negotiations.  (Examples 3-5 share that requirement, but I would hope
that careful wording in Example 1 could keep us from repeating ourselves.)
More importantly, the security considerations section needs some text about
integrity protection with an explicit pointer to the security considerations in
RFC 4576.
2007-10-16
12 Tim Polk
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for …
[Ballot discuss]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for integrity protection for the a=key-mgmt
attribute.

Two small changes could address this issue.  First, in section 3.4, Example 1
should note that an integrity protected channel was required to support the
security negotiations.  (Examples 3-5 share that requirement, but I would hope
that careful wording in Example 1 could keep us from repeating ourselves.)
More importantly, the security considerations section needs some text about
integrity protection with an explicit pointer to the security considerations in
RFC 4576.
2007-10-16
12 Tim Polk [Ballot comment]
2007-10-16
12 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2007-10-16
12 Tim Polk
[Ballot comment]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for …
[Ballot comment]
This document does a nice job hightlighting confidentiality requirements when
exchanging the a=crypto attribute, but does not adequately highlight the
corresponding requirement for integrity protection for the a=key-mgmt
attribute.

Two small changes could address this issue.  First, in section 3.4, Example 1
should note that an integrity protected channel was required to support the
security negotiations.  (Examples 3-5 share that requirement, but I would hope
that careful wording in Example 1 could keep us from repeating ourselves.)
More importantly, the security considerations section needs some text about
integrity protection with an explicit pointer to the security considerations in
RFC 4576.
2007-10-15
12 Russ Housley
[Ballot comment]
Please consider the comments offered by Ben Campbell in his
  Gen-ART Review.  The review was done on 27-Aug-2007, but the
  document …
[Ballot comment]
Please consider the comments offered by Ben Campbell in his
  Gen-ART Review.  The review was done on 27-Aug-2007, but the
  document has not been revised since.  The review is available
  at: http://www.alvestrand.no/ietf/gen/reviews/draft-ietf-avt
  -profile-savpf-11-campbell.txt
2007-10-15
12 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2007-10-05
12 Cullen Jennings State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Cullen Jennings
2007-10-05
12 Cullen Jennings Placed on agenda for telechat - 2007-10-18 by Cullen Jennings
2007-10-05
12 Cullen Jennings [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings
2007-10-05
12 Cullen Jennings Ballot has been issued by Cullen Jennings
2007-10-05
12 Cullen Jennings Created "Approve" ballot
2007-09-10
12 Cullen Jennings Waiting to resolve GEN Art review comments
2007-08-30
12 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-08-27
12 Yoshiko Fong
IANA Last Call Comment:

Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per …
IANA Last Call Comment:

Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per [RFC4566]" registry
located at

http://www.iana.org/assignments/sdp-parameters

sub-registry "proto"

Type SDP Name Reference
---- ------------------ ---------
proto
RTP/SAVPF [RFC-avt-profile-savpf-11]

We understand the above to be the only IANA
Action for this document.
2007-08-27
12 Yoshiko Fong
IANA Last Call Comment:

Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per …
IANA Last Call Comment:

Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per [RFC4566]" registry
located at

http://www.iana.org/assignments/sdp-parameters

sub-registry "proto"

Type SDP Name Reference
---- ------------------ ---------
proto
RTP/SAVPF [RFC-avt-profile-savpf-11]

We understand the above to be the only IANA
Action for this document.
2007-08-21
12 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2007-08-21
12 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2007-08-16
12 Amy Vezza Last call sent
2007-08-16
12 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-08-16
12 Cullen Jennings Last Call was requested by Cullen Jennings
2007-08-16
12 Cullen Jennings State Changes to Last Call Requested from AD Evaluation::AD Followup by Cullen Jennings
2007-08-16
12 (System) Ballot writeup text was added
2007-08-16
12 (System) Last call text was added
2007-08-16
12 (System) Ballot approval text was added
2007-07-25
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-07-25
11 (System) New version available: draft-ietf-avt-profile-savpf-11.txt
2007-07-24
12 Cullen Jennings the 11 version fixes this
2007-03-27
12 Cullen Jennings State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings
2007-03-27
12 Cullen Jennings
Sent email ...

Ok - I know you are going to hate to get this email from me but there
still seems to be stuff …
Sent email ...

Ok - I know you are going to hate to get this email from me but there
still seems to be stuff that is pointing at the 0 m line port stuff.
I would suggest the following edits.


In Section 1.1

Remove
"Grouping of m= lines in SDP may cause
several SDP session level descriptions to define (alternatives
of) the same RTP session for the same media type."

In section 3.3.1 where you have (i.e. per m= line in SDP).
change this from "i.e." to "e.g"

Later in this section change "(e.g., for best-effort SRTP [14])" to
reference the draft-ietf-mmusic-sdp-capability-negotiation instead of
the kaplan document

Remove
If an offer contains multiple alternative profiles the answerer
MUST select exactly only one and reject the other(s), e.g., by
setting the port number in the respect m= line to 0.

In section 3.3.2 remove
To offer two or more alternative RTP
profiles for a particular media stream, the SDP description MUST
contain exactly one m= line for this media stream for each profile
and all the same transport address (IP address and port number).
The profiles SHOULD be listed in the order of preference. This is
similar to formulating an offer per section 3.3.1.

In section 3.4, example 4, remove the word "grouping" from the sentence
"Note that a future grouping mechanism will allow to explicitly"

Remove reference 14 and add references to draft-ietf-mmusic-sdp-
capability-negotiation
2007-03-15
12 Cullen Jennings Status date has been changed to 2007-03-24 from
2007-03-05
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-03-05
10 (System) New version available: draft-ietf-avt-profile-savpf-10.txt
2007-02-18
12 Cullen Jennings
The 10 version of this should be good to go - was emailed Jan 25 but something weird happened and did not get in drafts …
The 10 version of this should be good to go - was emailed Jan 25 but something weird happened and did not get in drafts directory.
2007-02-18
12 Cullen Jennings Status date has been changed to 2007-02-25 from
2006-12-15
12 Cullen Jennings
2006-11-14
12 Cullen Jennings
2006-11-14
12 Cullen Jennings State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings
2006-11-14
12 Cullen Jennings
It seems to me that the best path forward is to follow roughly what is in AVPF and basically remove the text on offer/answer and …
It seems to me that the best path forward is to follow roughly what is in AVPF and basically remove the text on offer/answer and others things that seem largely MMUSIC topics. Thoughts? Right now the text seems to normatively conflict with some of the way we might choose to solve profile negotiation.
2006-11-14
12 Cullen Jennings [Note]: 'PROTO shepherd is Colin' added by Cullen Jennings
2006-10-27
12 Cullen Jennings
This draft still has substantial text on alternatives and how they are negotiated. Given this is a topic with at least two drafts being discussed …
This draft still has substantial text on alternatives and how they are negotiated. Given this is a topic with at least two drafts being discussed in the next mmuisc meeting, I'm very uncomfortable with an AVT document making normative statements about it. I would like to talk about this at the next IETF and see what happens in MMUSIC.
2006-10-27
12 Cullen Jennings
2006-10-27
12 Cullen Jennings State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.comjf.mule@cablelabs.com  from csp@csperkins.org, magnus.westerlund@ericsson.com
2006-10-27
12 Cullen Jennings State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com from csp@csperkins.org, magnus.westerlund@ericsson.com, cullen@iii.ca
2006-10-25
09 (System) New version available: draft-ietf-avt-profile-savpf-09.txt
2006-10-20
08 (System) New version available: draft-ietf-avt-profile-savpf-08.txt
2006-10-06
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-10-06
07 (System) New version available: draft-ietf-avt-profile-savpf-07.txt
2006-08-09
12 Cullen Jennings State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings
2006-06-29
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-06-29
06 (System) New version available: draft-ietf-avt-profile-savpf-06.txt
2006-05-08
12 Cullen Jennings State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings
2006-04-07
12 Cullen Jennings Test - please ignore
2006-04-07
12 Cullen Jennings State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com, cullen@iii.ca from csp@csperkins.org, magnus.westerlund@ericsson.com
2006-04-07
12 Cullen Jennings State Changes to AD Evaluation::AD Followup from AD Evaluation by Cullen Jennings
2006-04-07
12 Cullen Jennings
I had no concerns with the parts about combining SAVP and AVPF to form SAVPF.

I do have concerns about how the multiple profiles may …
I had no concerns with the parts about combining SAVP and AVPF to form SAVPF.

I do have concerns about how the multiple profiles may be offered in SDP under offer/answer. I'd like to talk about this and understand it better. It seemed like in some cases this was changing the semantics of how something that did not understand this specification would tread these. It also seemed to be a big problem that it requires a group mechanism, normatively references fid, then points out fid done not have the right semantics.

I am also concerned that this draft is trying to define a way to offer both encrypted and unencrypted media streams but has not addressed many of the requirements that were raised around that issue. It was not clear that a draft dealing with allowing a AVPF feedback in a SRTP session needed to also resolve the issue of offering both SAVP and AVP.

In the security section dealing with two times pads, I think that changing the master key MAY be reused if SSRC are unique runs the risk that because it is MAY implementer may think they can ignore it. Might be better to rephrase as something like master keys "MUST NOT" be reused if the SSRC are not known to be unique.

I was surprised to see the how many packets could use a given key was defined in this draft - I would have hoped that was SRTP but I did not go check to see.
2006-03-24
12 Cullen Jennings Shepherding AD has been changed to Cullen Jennings from Allison Mankin
2006-02-17
12 Allison Mankin State Changes to AD Evaluation from Publication Requested by Allison Mankin
2006-02-08
12 Dinara Suleymanova
PROTO Write-up

1.a) Have the chairs personally reviewed this version of the ID and
do they believe this ID is sufficiently baked to forward to …
PROTO Write-up

1.a) Have the chairs personally reviewed this version of the ID and
do they believe this ID is sufficiently baked to forward to the
IESG for publication?

Yes.

1.b) Has the document had adequate review from both key WG members
and key non-WG members? Do you have any concerns about the
depth or breadth of the reviews that have been performed?

It has received adequate review, by key WG members in AVT and MMUSIC.

1.c) Do you have concerns that the document needs more review from a
particular (broader) perspective (e.g., security, operational
complexity, someone familiar with AAA, etc.)?

No.

1.d) Do you have any specific concerns/issues with this document that
you believe the ADs and/or IESG should be aware of? For
example, perhaps you are uncomfortable with certain parts of the
document, or have concerns whether there really is a need for
it, etc. If your issues have been discussed in the WG and the
WG has indicated it wishes to advance the document anyway, note
if you continue to have concerns.

No issues.

1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

Strong consensus from interested parties.

1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise what are they upset about.

No.

1.g) Have the chairs verified that the document adheres to _all_ of
the ID nits? (see http://www.ietf.org/ID-Checklist.html).

Yes.

1.h) Does the document a) split references into normative/
informative, and b) are there normative references to IDs, where
the IDs are not also ready for advancement or are otherwise in
an unclear state? (Note: the RFC editor will not publish an RFC
with normative references to IDs, it will delay publication
until all such IDs are also ready for publication as RFCs.)

References have been split. There are reference to drafts, however these
are either in the RFC-editor queue or already with the IESG for approval.

1.i) For Standards Track and BCP documents, the IESG approval
announcement includes a writeup section with the following
sections:


* Technical Summary

This memo specifies an RTP profile that combines the features of SRTP
(SAVP) and the Extended Profile for RTCP-based Feedback (AVPF). Thus
allowing SRTP's security functions, encryption and integrity protection
to be used in session which requires more timely RTCP feedback than what
AVP provides. Rules for how multiple profiles may be offered in SDP
under offer/answer are also defined.

* Working Group Summary

There is consensus in the WG to publish this document.


* Protocol Quality

The combination of the two profiles are basically orthogonal. Thus no
new algorithms or other advanced features was needed to be define for
this profile. The main new functionality is the signalling solution
which has been reviewed both in AVT and MMUSIC.
2006-02-08
12 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-12-30
05 (System) New version available: draft-ietf-avt-profile-savpf-05.txt
2005-11-30
04 (System) New version available: draft-ietf-avt-profile-savpf-04.txt
2005-10-18
03 (System) New version available: draft-ietf-avt-profile-savpf-03.txt
2005-07-20
02 (System) New version available: draft-ietf-avt-profile-savpf-02.txt
2004-07-21
01 (System) New version available: draft-ietf-avt-profile-savpf-01.txt
2003-10-21
00 (System) New version available: draft-ietf-avt-profile-savpf-00.txt