Skip to main content

RTP Retransmission Payload Format
draft-ietf-avt-rtp-retransmission-12

Revision differences

Document history

Date Rev. By Action
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Scott Hollenbeck
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Jon Peterson
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Brian Carpenter
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Mark Townsley
2012-08-22
12 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2005-10-18
12 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-10-12
12 Amy Vezza IESG state changed to Approved-announcement sent
2005-10-12
12 Amy Vezza IESG has approved the document
2005-10-12
12 Amy Vezza Closed "Approve" ballot
2005-10-12
12 Allison Mankin Removed from agenda for telechat - 2005-10-13 by Allison Mankin
2005-10-12
12 Allison Mankin State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Allison Mankin
2005-10-12
12 Allison Mankin [Note]: 'proto shepherd: colin perkins (csp@csperkins.org)
' added by Allison Mankin
2005-10-12
12 Mark Townsley [Ballot Position Update] Position for Mark Townsley has been changed to No Objection from Discuss by Mark Townsley
2005-10-07
12 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Discuss by Jon Peterson
2005-10-06
12 Allison Mankin
[Note]: 'proto shepherd: colin perkins (csp@csperkins.org)
Need to check on Discusses - DLNA requests approval by 12 Oct.  The
rev was given to …
[Note]: 'proto shepherd: colin perkins (csp@csperkins.org)
Need to check on Discusses - DLNA requests approval by 12 Oct.  The
rev was given to the ADs (not published) Aug 22, then submitted Sep 15
with another request for re-review.  (Before Aug: some discussion of the issues).' added by Allison Mankin
2005-10-06
12 Allison Mankin Placed on agenda for telechat - 2005-10-13 by Allison Mankin
2005-10-06
12 Allison Mankin
[Note]: 'proto shepherd: colin perkins (csp@csperkins.org)
Need to check on Discusses - DLNA requests approval by 12 Oct - rev with
fixes was …
[Note]: 'proto shepherd: colin perkins (csp@csperkins.org)
Need to check on Discusses - DLNA requests approval by 12 Oct - rev with
fixes was presented (pre-pub) 22 Aug, then published 15 Sep. ' added by Allison Mankin
2005-09-15
12 (System) New version available: draft-ietf-avt-rtp-retransmission-12.txt
2005-05-01
12 Russ Housley
The authors agreed to make significant changes to the Security Considerations.  I leave it to the Proto Shepherd and the Shepherd AD to ensure that …
The authors agreed to make significant changes to the Security Considerations.  I leave it to the Proto Shepherd and the Shepherd AD to ensure that these words appear in the approved document.  Thay are:

"12. Security considerations

RTP packets using the payload format defined in this specification are subject to the general security considerations discussed in RTP, Section 9.

In common streaming scenarios message authentication, data integrity, replay protection and confidentiality are desired. The absence of authentication may enable man-in-the-middle and replay attacks, which can be very harmful for RTP retransmission. For example: tampered RTCP packets may trigger inappropriate retransmissions that effectively reduce the actual bitrate share allocated to the original data stream, tampered RTP retransmission packets could cause the client's decoder to crash, tampered retransmission requests may invalidate the SSRC association mechanism described in Section 5 of this document. On the other hand, replayed packets could lead to false re-ordering and RTT measurements (required for the retransmission request strategy) and may cause the receiver buffer to overflow. Further, in order to ensure confidentiality of the data, the original payload data needs to be encrypted. There is actually no need to encrypt the 2-byte retransmission payload header since it does not provide any hints about the data content.

Furthermore, it is RECOMMENDED that the cryptography mechanisms used for this payload format provide protection against known plaintext attacks. RTP recommends that the initial RTP timestamp SHOULD be random to secure the stream against known plaintext attacks. This payload format does not follow this recommendation as the initial timestamp will be the media timestamp of the first retransmitted packet. However, since the initial timestamp of the original stream is itself random, if the original stream is encrypted, the first retransmitted packet timestamp would also be random to an attacker. Therefore, confidentiality would not be compromised.

If cryptography is used to provide security services on the original stream, then the same services, with equivalent cryptographic strength, MUST be provided on the retransmission stream.  The use of the same key for the retransmitted stream and the original stream may lead to security problems, e. g., two-time pads.  Refer to Section 9.1 of the Secure Real-Time Transport Protocol (SRTP)[12] for a discussion the implications of two-time pads and how to avoid them.

At the time of writing this document, SRTP does not provide all the security services mentioned. There are, at least, two reasons for this: 1) the ocurrence of two-time pads and 2) the fact that this payload format typically works under the RTP/AVPF profile while SRTP only supports RTP/AVP.  An adapted variant of SRTP shall solve these shortcomings in the future.

Congestion control considerations with the use of retransmission are dealt with in Section 7 of this document."
2005-05-01
12 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-03-31
12 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2005-03-31
12 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by Amy Vezza
2005-03-31
12 Amy Vezza [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Discuss by Amy Vezza
2005-03-31
12 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2005-03-31
12 Allison Mankin [Note]: 'proto shepherd: colin perkins (csp@csperkins.org)' added by Allison Mankin
2005-03-31
12 Margaret Cullen [Ballot comment]
I share Jon Peterson's concerns about the congestion control discussion, but I'm happy to let him hold the discuss.
2005-03-31
12 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2005-03-31
12 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Undefined by Bert Wijnen
2005-03-31
12 Bert Wijnen [Ballot comment]
No further objections
2005-03-31
12 Bert Wijnen [Ballot Position Update] New position, Undefined, has been recorded for Bert Wijnen by Bert Wijnen
2005-03-31
12 Brian Carpenter [Ballot discuss]
It mentions Panasonic IPR disclosures
All I can find is a very general RAND disclosure from Matsushita
2005-03-31
12 Brian Carpenter [Ballot Position Update] New position, Discuss, has been recorded for Brian Carpenter by Brian Carpenter
2005-03-31
12 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2005-03-30
12 Jon Peterson
[Ballot discuss]
I'm a bit concerned about Section 7, and the whole story regarding congestion control here.

In the first place, we do not make …
[Ballot discuss]
I'm a bit concerned about Section 7, and the whole story regarding congestion control here.

In the first place, we do not make a practice of passing Proposed Standard congestion control systems which lack sufficient implementation experience. It is more common for such mechanisms to spend considerable time as Experimental RFCs before we consider them for PS. Is there any reason why this document is not going to Experimental now?

The sorts of statements made in Section 7 seem to provide just cause for caution. The entire section is scoped to a SHOULD, and offers no guidance as to when or why this SHOULD might not apply. The same applies to the other SHOULDs sprinkled through the ensuing paragraphs - if the authors envision a condition like the following:

  If the packet loss rate exceeds an
  acceptable level, it SHOULD be concluded that congestion is not
  kept under control and retransmission SHOULD NOT then be used.

... i.e., in which implementations merely SHOULD NOT ignore evidence of increasing packet loss due to the use of this mechanism, then this specification would be the right place to raise counterexamples; otherwise these normative statements ought to be MUSTs.

The second paragraph of Section 7 seems to allude to the congestion control guidance in Section 2 of RFC3551, and the remainder of the section uses this guidance as a yardstick. However, this document offers no concrete advice to implementers on how an application might determine if packet loss is within acceptable limits as those guidelines suggest.
2005-03-30
12 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to Discuss from Undefined by Jon Peterson
2005-03-30
12 Jon Peterson [Ballot Position Update] New position, Undefined, has been recorded for Jon Peterson by Jon Peterson
2005-03-30
12 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-03-30
12 Russ Housley
[Ballot discuss]
The introduction says:
  >
  > At this point, the attention of the reader is called to the fact
  > that …
[Ballot discuss]
The introduction says:
  >
  > At this point, the attention of the reader is called to the fact
  > that the retransmission mechanism for RTP described in this
  > document may be encumbered by patent applications filed from
  > Panasonic.  Please refer to the IPR Notices section for details.
  >
  Thanks for the warning, but we should not name Panasonic here.
  The first sentence could end after "patent applications."
  Alternatively, the whole paragraph could be deleted.

  Sections 8.2, 8.3, 8.4, and 8.5 include change controller
  items.  They indicate that change control is with the AVT WG.
  I assume that the AVT WG will shut down at some point.  I think
  this should indicate that IETF standards action is needed to
  make a change.

  The first paragraph of the security considerations says:
  >
  > If cryptography is used to provide security services on the
  > original stream, then the same services, with equivalent
  > cryptographic strength, MUST be provided on the retransmission
  > stream.  Old keys will likely need to be cached so that when the
  > keys change for the original stream, the old key is used until it
  > is determined that the key has changed on the retransmission
  > packets as well.
  >
  > The use of the same key for the retransmitted stream and the
  > original stream may lead to security problems, e.g. two-time pads. 
  > This sharing has to be evaluated towards the chosen security
  > protocol and security algorithms.
  >
  I like the first sentence of the first paragraph very much.  However,
  the second sentence implies that the same keying material might be
  used to encrypt the retransmission, even though it is being sent on a
  separate stream.  The second paragraph points to the possible security
  flaw if this is done.  Since a SRTP-variant is the security protocol
  that would be used in this context and SRTP is almost always used with
  counter mode, the result could be a loss of confidentiality.  If the
  same keying material is used, then a mechanism is needed to ensure
  that the counter value will be different.  SRTP seems to be prepared
  to support this situation, but not without some guidance.  RFC 3711
  says:
  >
  > In addition, there can be cases (see Sections 8 and 9.1) where
  > several SRTP streams within a given RTP session, identified by their
  > synchronization source (SSRCs, which is part of the RTP header),
  > share most of the crypto context parameters (including possibly
  > master and session keys).  In such cases, just as in the normal
  > SRTP/SRTCP parameter sharing above, separate replay lists and packet
  > counters for each stream (SSRC) MUST still be maintained.
2005-03-30
12 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-03-30
12 Mark Townsley
[Ballot discuss]
Well-written overall, though I have a few issues:

6.3 Retransmission requests

>    The receiver should not send a retransmission request as soon …
[Ballot discuss]
Well-written overall, though I have a few issues:

6.3 Retransmission requests

>    The receiver should not send a retransmission request as soon as
>    it detects a missing sequence number but should add some extra
>    delay to compensate for packet reordering.  This extra delay may,
>    for example, be based on past observations of the experienced
>    packet reordering.

If packet reordering is determined to be extremely rare (e.g., essentially never - perhaps due to the underlying datalink preventing misordering) then the optimum delay here could in fact be zero except in the rarest of cases. I'm afraid that an implementor might take this too literally and always include some minimum delay, inhibiting performance for no good reason. Perhaps it should be pointed out that "some delay" may in fact be zero in some cases.

Also, the best "possible reorder delay" algorithm may not actually be time based, but packet based. e.g., if n number of packets are received after a gap is detected, then assume that the packet was truly lost rather than out of order (something, incidentally, which may be far easier to code on some platforms as a very short fixed FIFO packet buffer rather than via a timer-based mechanism).

>    To increase the robustness to the loss of a NACK or of a
>    retransmission packet, a receiver may send a new NACK for the same
>    packet.  This is referred to as multiple retransmissions.  Before
>    sending a new NACK for a missing packet, the receiver should rely
>    on a timer to be reasonably sure that the previous retransmission
>    attempt has failed in order to avoid unnecessary retransmissions.

Simply stating "should rely on a timer" doesn't really give the implementor much to go on as to what interval the timer should be set to. Earlier in this section, calculation of an RTT was referenced. Perhaps this RTT should be used as part of the algorithm for when one might send a multiple retransmission NACK request? From this text alone, it isn't obvious what to base this timer on, what the default value might be, whether it should be adaptive, etc.

Page 13, Section 7, Congestion control.

>    In addition, the sender MAY selectively retransmit only the
>    packets that it deems important and ignore NACK messages for other
>    packets in order to limit the bitrate. 

I think this could end up creating a situation where one side asks for a packet repeatedly (multiple retransmission NACKs), and the other side ignores the request repeatedly (not sending due to selective retransmission)? Is this considered a reasonable and expected behavior of the protocol?

>    the one the RTP flow achieves.  If the packet loss rate exceeds an
>    acceptable level, it SHOULD be concluded that congestion is not
>    kept under control and retransmission SHOULD NOT then be used.  It

What is "an acceptable level"?

What I am afraid of in a few cases here is that if someone is handed this document code from without a reference implementation to go by, some of the lack of details in these sections would end up in: (1) several questions posted to a list asking for help, (2) a lot of guesses made, or (3) an unusable number of configuration commands to tweak each and every possible parameter.
2005-03-30
12 Mark Townsley [Ballot Position Update] New position, Discuss, has been recorded for Mark Townsley by Mark Townsley
2005-03-28
12 Allison Mankin State Changes to IESG Evaluation from Waiting for Writeup by Allison Mankin
2005-03-28
12 Scott Hollenbeck [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Discuss by Scott Hollenbeck
2005-03-27
12 Allison Mankin [Ballot Position Update] New position, Yes, has been recorded for Allison Mankin
2005-03-27
12 Allison Mankin Ballot has been issued by Allison Mankin
2005-03-25
12 (System) State has been changed to Waiting for Writeup from In Last Call by system
2005-03-25
12 Scott Hollenbeck
[Ballot discuss]
Please add an RFC Editor note to update the MIME-type change controllers to include "as designated by the IESG".

What exactly is the …
[Ballot discuss]
Please add an RFC Editor note to update the MIME-type change controllers to include "as designated by the IESG".

What exactly is the CNAME described in section 5.2 et al.?  I don't see a definition or a reference; are we talking about a DNS CNAME?
2005-03-25
12 Scott Hollenbeck [Ballot Position Update] New position, Discuss, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2005-03-25
12 Scott Hollenbeck Created "Approve" ballot
2005-03-11
12 Amy Vezza Last call sent
2005-03-11
12 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-03-10
12 Allison Mankin Last Call was requested by Allison Mankin
2005-03-10
12 Allison Mankin State Changes to Last Call Requested from AD Evaluation::AD Followup by Allison Mankin
2005-03-10
12 (System) Ballot writeup text was added
2005-03-10
12 (System) Last call text was added
2005-03-10
12 (System) Ballot approval text was added
2005-03-10
12 Allison Mankin Telechat date was changed to 2005-03-31 from 2005-03-17 by Allison Mankin
2005-03-10
12 Allison Mankin Placed on agenda for telechat - 2005-03-17 by Allison Mankin
2005-03-08
12 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-03-08
11 (System) New version available: draft-ietf-avt-rtp-retransmission-11.txt
2005-03-06
12 Allison Mankin State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Allison Mankin
2005-03-06
12 Allison Mankin Note field has been cleared by Allison Mankin
2005-03-06
12 Allison Mankin State Changes to AD Evaluation from Expert Review by Allison Mankin
2004-12-22
12 Allison Mankin State Changes to Expert Review from AD Evaluation by Allison Mankin
2004-12-22
12 Allison Mankin [Note]: 'Sent out for Media-Types review - will get signoff that it''s ok at Jan 6 telechat.' added by Allison Mankin
2004-02-14
12 Allison Mankin One strong objection reported to IPR issue on this solution, but other alternative considered also encumbered (Magnus).
2004-02-14
12 Allison Mankin [Note]: 'Rev done, Chairs ready to proceed. ' added by Allison Mankin
2004-02-14
12 Allison Mankin [Note]: 'Rev done, Chairs ready to proceed. ' added by Allison Mankin
2004-02-14
12 Allison Mankin State Changes to AD Evaluation from AD Evaluation::Revised ID Needed by Allison Mankin
2004-02-14
12 Allison Mankin [Note]: 'Rev done, Chairs ready to proceed.' added by Allison Mankin
2004-01-28
10 (System) New version available: draft-ietf-avt-rtp-retransmission-10.txt
2003-12-14
12 Allison Mankin
This is in AD evaluation, in that I'm looking at it after Publication Requested, but the Chairs have informed me that  it will go through …
This is in AD evaluation, in that I'm looking at it after Publication Requested, but the Chairs have informed me that  it will go through a rev because of IPR and other WG issues.  This rev is not based on any AD evaluation.
2003-12-14
12 Allison Mankin
[Note]: 'This is in AD evaluation, in that I''m looking at it after Publication Requested, but the Chairs have informed me that  it will go …
[Note]: 'This is in AD evaluation, in that I''m looking at it after Publication Requested, but the Chairs have informed me that  it will go through a rev because of IPR and other WG issues.
This rev is not based on any AD evaluation.' added by Allison Mankin
2003-12-07
12 Allison Mankin State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Allison Mankin
2003-12-07
12 Allison Mankin
Magnus Westerlund wrote:

Also the "RTP Retransmission Payload Format"
(draft-ietf-avt-rtp-retransmission-09.txt) is on the 3GPP dependencies
list, it has in the current list a …
Magnus Westerlund wrote:

Also the "RTP Retransmission Payload Format"
(draft-ietf-avt-rtp-retransmission-09.txt) is on the 3GPP dependencies
list, it has in the current list a lower priority, however it will soon
be updated to show its higher desirability by 3GPP. 3GPP SA4 decided
last week to take the usage of this draft as a working assumption.

Please note that there is no need to progress the current draft version,
as we due to IPR issue discussions will need to submit an update to the
current version (09) to address these. We will notify you when the new
version is available.
2003-10-01
(System) Posted related IPR disclosure: Matsushita Electric's Statement on IPR claimed in draft-ietf-avt-rtp-retransmission-08.txt
2003-08-05
09 (System) New version available: draft-ietf-avt-rtp-retransmission-09.txt
2003-06-23
12 Allison Mankin State Changes to AD Evaluation from Publication Requested by Mankin, Allison
2003-06-12
12 Natalia Syracuse Draft Added by Syracuse, Natalia
2003-06-06
08 (System) New version available: draft-ietf-avt-rtp-retransmission-08.txt
2003-04-04
07 (System) New version available: draft-ietf-avt-rtp-retransmission-07.txt
2003-03-04
06 (System) New version available: draft-ietf-avt-rtp-retransmission-06.txt
2003-02-04
05 (System) New version available: draft-ietf-avt-rtp-retransmission-05.txt
2002-12-18
04 (System) New version available: draft-ietf-avt-rtp-retransmission-04.txt
2002-11-05
03 (System) New version available: draft-ietf-avt-rtp-retransmission-03.txt
2002-07-01
02 (System) New version available: draft-ietf-avt-rtp-retransmission-02.txt
2002-06-12
01 (System) New version available: draft-ietf-avt-rtp-retransmission-01.txt
2002-03-28
00 (System) New version available: draft-ietf-avt-rtp-retransmission-00.txt