Skip to main content

AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP)
draft-ietf-avtcore-srtp-aes-gcm-17

Revision differences

Document history

Date Rev. By Action
2015-12-03
17 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2015-11-23
17 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-11-19
17 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2015-11-19
17 (System) RFC Editor state changed to RFC-EDITOR from IANA
2015-11-18
17 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2015-11-06
17 (System) RFC Editor state changed to IANA from AUTH
2015-10-21
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2015-10-20
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2015-10-16
17 Ben Campbell Changed consensus to Yes from Unknown
2015-10-14
17 (System) Notify list changed from avtcore-chairs@ietf.org, draft-ietf-avtcore-srtp-aes-gcm@ietf.org, "Magnus Westerlund"  to (None)
2015-10-08
17 (System) RFC Editor state changed to AUTH from EDIT
2015-08-10
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2015-07-31
17 (System) RFC Editor state changed to EDIT
2015-07-31
17 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2015-07-31
17 (System) Announcement was received by RFC Editor
2015-07-31
17 (System) IANA Action state changed to In Progress
2015-07-31
17 Cindy Morgan IESG state changed to Approved-announcement sent from IESG Evaluation::AD Followup
2015-07-31
17 Cindy Morgan IESG has approved the document
2015-07-31
17 Cindy Morgan Closed "Approve" ballot
2015-07-31
17 Cindy Morgan Ballot writeup was changed
2015-07-31
17 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2015-07-23
17 Ben Campbell Ballot writeup was changed
2015-07-23
17 Ben Campbell Ballot writeup was changed
2015-07-22
17 Ben Campbell Ballot approval text was generated
2015-06-30
17 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-17.txt
2015-06-29
16 Stephen Farrell [Ballot comment]
Thanks for reducing the number of options here, I think
that's a real improvement.
2015-06-29
16 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to Yes from Discuss
2015-06-07
16 Stephen Farrell
[Ballot discuss]

I'm ready to goto yes with -16  but am just checking if the
chairs/AD prefer me to keep the discuss while the late …
[Ballot discuss]

I'm ready to goto yes with -16  but am just checking if the
chairs/AD prefer me to keep the discuss while the late
breaking issue of short tags is handled.

Before I move to a yes ballot, I want to chat about two
things...

(1) There are perhaps too many choices being offered
here to be useful. It is very possible so much choice
can harm interop and hence security. Do we *need* the
256 bit key options now? Is CCM really *needed* here?
(Surprised the IEEE or h/w argument applies tbh) And
why so many auth. tag lengths? Who really *needs* all
of those? The DISCUSS point here is to validate that
all of those options really *need* (as opposed to can)
be defined, which may have been done already or may
(and we have seen this) simply be a case of defining
everything in the hope that something gets used. That
can cause potential harm to interop. if different
coders pick up different options. And the "but the USG
will use all of these" is not IMO a sufficiently good
argument for defining all of them - we also have
experience with PKI that adding every option that the
most complex deployments may want is not the recipe for
success (e.g. with enrolment protocols).

(2) Unless discuss point (1) results in there being
only one remaining option, (which I doubt:-), which of
the options specified here are MTI, and if you argue
that that needs to be done elsewhere, then where will
that be done? (We already had a major extended
discussion about SRTP MTI things in general.) I would
suggest that saying something like "128 bit GCM with a
tag length of 16 MUST be implemented by any general
purpose implementation of this specification" or
something similar.
2015-06-07
16 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2015-06-05
16 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-16.txt
2015-04-14
15 Kevin Igoe IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2015-04-14
15 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-15.txt
2015-03-25
14 Cindy Morgan Shepherding AD changed to Ben Campbell
2015-01-28
14 Magnus Westerlund Notification list changed to avtcore-chairs@tools.ietf.org, draft-ietf-avtcore-srtp-aes-gcm@tools.ietf.org, "Magnus Westerlund" <magnus.westerlund@ericsson.com> from avtcore-chairs@tools.ietf.org, draft-ietf-avtcore-srtp-aes-gcm@tools.ietf.org
2015-01-28
14 Magnus Westerlund Document shepherd changed to Magnus Westerlund
2015-01-02
14 Pearl Liang IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2014-11-28
14 Jean Mahoney Closed request for Last Call review by GENART with state 'No Response'
2014-10-30
14 Cindy Morgan IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation
2014-10-30
14 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2014-10-30
14 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2014-10-30
14 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-10-29
14 Ted Lemon [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon
2014-10-29
14 Richard Barnes [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes
2014-10-29
14 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2014-10-29
14 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-10-29
14 Stephen Farrell
[Ballot discuss]

Before I move to a yes ballot, I want to chat about two
things...

(1) There are perhaps too many choices being offered …
[Ballot discuss]

Before I move to a yes ballot, I want to chat about two
things...

(1) There are perhaps too many choices being offered
here to be useful. It is very possible so much choice
can harm interop and hence security. Do we *need* the
256 bit key options now? Is CCM really *needed* here?
(Surprised the IEEE or h/w argument applies tbh) And
why so many auth. tag lengths? Who really *needs* all
of those? The DISCUSS point here is to validate that
all of those options really *need* (as opposed to can)
be defined, which may have been done already or may
(and we have seen this) simply be a case of defining
everything in the hope that something gets used. That
can cause potential harm to interop. if different
coders pick up different options. And the "but the USG
will use all of these" is not IMO a sufficiently good
argument for defining all of them - we also have
experience with PKI that adding every option that the
most complex deployments may want is not the recipe for
success (e.g. with enrolment protocols).

(2) Unless discuss point (1) results in there being
only one remaining option, (which I doubt:-), which of
the options specified here are MTI, and if you argue
that that needs to be done elsewhere, then where will
that be done? (We already had a major extended
discussion about SRTP MTI things in general.) I would
suggest that saying something like "128 bit GCM with a
tag length of 16 MUST be implemented by any general
purpose implementation of this specification" or
something similar.
2014-10-29
14 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2014-10-28
14 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2014-10-27
14 Kathleen Moriarty [Ballot comment]
Thank you for addressing the SecDir review comments: https://www.ietf.org/mail-archive/web/secdir/current/msg05182.html
2014-10-27
14 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2014-10-27
14 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-10-27
14 Benoît Claise
[Ballot comment]
As mentioned by KK in his OPS-DIR review.
This document defines how AES-GCM and AES-CCM Authenticated Encryption
with Associated Data algorithms can be …
[Ballot comment]
As mentioned by KK in his OPS-DIR review.
This document defines how AES-GCM and AES-CCM Authenticated Encryption
with Associated Data algorithms can be used to provide confidentiality
and data authentication in the SRTP protocol.

I feel that this document is well written and ready. I just have one
minor suggestion.

Section 13.2., second sentence, just to be consistent with the rest of
the document, replace ‘Block Chaining Message' with 'Block
Chaining-Message'
2014-10-27
14 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2014-10-27
14 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2014-10-26
14 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2014-10-23
14 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Matt Lepinski.
2014-10-20
14 Alissa Cooper Placed on agenda for telechat - 2014-10-30
2014-10-20
14 Alissa Cooper IESG state changed to IESG Evaluation from Waiting for Writeup
2014-10-20
14 Alissa Cooper Ballot has been issued
2014-10-20
14 Alissa Cooper [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper
2014-10-20
14 Alissa Cooper Created "Approve" ballot
2014-10-20
14 Alissa Cooper Ballot writeup was changed
2014-09-12
14 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Kiran Chittimaneni.
2014-09-11
14 (System) IESG state changed to Waiting for Writeup from In Last Call
2014-09-04
14 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matt Lepinski
2014-09-04
14 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matt Lepinski
2014-09-03
14 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2014-09-03
14 Pearl Liang
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-avtcore-srtp-aes-gcm-14.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-avtcore-srtp-aes-gcm-14.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon as possible.

IANA has questions about some of the IANA actions requested in the IANA Considerations
section of this document.

We received the following comments/questions from the IANA's reviewer:

IANA understands that, upon approval of this document, there are five actions that IANA must complete. IANA notes that the fifth action requires Expert Review as defined in RFC 5226.

First, in the SRTP Crypto Suite Registrations subregistry of the Session Description Protocol (SDP) Security Descriptions registry located at:

http://www.iana.org/assignments/sdp-security-descriptions/

The following Crypto Suite Names will be added to the registry; all with a reference of [ RFC-to-be ]:

AEAD_AES_128_GCM
AEAD_AES_256_GCM
AEAD_AES_128_GCM_12
AEAD_AES_256_GCM_12
AEAD_AES_128_CCM
AEAD_AES_256_CCM
AEAD_AES_128_CCM_8
AEAD_AES_256_CCM_8
AEAD_AES_128_CCM_12
AEAD_AES_256_CCM_12

Second, in the DTLS-SRTP Protection Profiles subregistry of the Datagram Transport Layer Security (DTLS) Extension to Establish Keys for Secure Real-time Transport Protocol (SRTP) registry located at:

http://www.iana.org/assignments/srtp-protection/

The following new profiled will be added:

Value: [ TBD-at-registration ]
Profile: AEAD_AES_128_GCM
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_256_GCM
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_128_GCM_12
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_256_GCM_12
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_128_CCM
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_256_CCM
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_128_CCM_8
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_256_CCM_8
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_128_CCM_12
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
Profile: AEAD_AES_256_CCM_12
Reference: [ RFC-to-be ]

Third, in the Encryption algorithm (Value 0) subregistry of the Multimedia Internet KEYing (Mikey) Payload Name Spaces located at:

http://www.iana.org/assignments/mikey-payloads/

two new algorithms are to be registered as follows:

Value: [ TBD-at-registration ]
SRTP encr alg: AES-CCM
Reference: [ RFC-to-be ]

Value: [ TBD-at-registration ]
SRTP encr alg: AES-GCM
Reference: [ RFC-to-be ]

Fourth, in the MIKEY Security Protocol Parameters subregistry also located in the Multimedia Internet KEYing (Mikey) Payload Name Spaces located at:

http://www.iana.org/assignments/mikey-payloads/

one new parameter is to be registered as follows:

SRTP Type: [ TBD-at-registration ]
Meaning: AEAD authentication tag length
Reference: [ RFC-to-be ]

QUESTION: It appears that the authors suggest these values 8, 12, or 16 (in octets).
However those values have been registered.  Do you have any issues to take
the next available value in the registry?

Fifth, in the Authenticated Encryption with Associated Data (AEAD) Parameters registry located at:

http://www.iana.org/assignments/aead-parameters/

two new AEAD algorithm will be registered as follows:

Numeric ID: [ TBD-at-registration ]
Name: AEAD_AES_128_CCM_12
Reference: [ RFC-to-be ]

Numeric ID: [ TBD-at-registration ]
Name: AEAD_AES_256_CCM_12
Reference: [ RFC-to-be ]

As this document requests registrations in Specification Required (see RFC 5226) registries, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC.

IANA understands that these five actions are the only ones required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. 

Please note that IANA cannot reserve specific values. However, early allocation is available for some types of registrations. For more information, please see RFC 7120.
2014-09-01
14 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Kiran Chittimaneni
2014-09-01
14 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Kiran Chittimaneni
2014-08-28
14 Jean Mahoney Request for Last Call review by GENART is assigned to Ben Campbell
2014-08-28
14 Jean Mahoney Request for Last Call review by GENART is assigned to Ben Campbell
2014-08-28
14 Amy Vezza IANA Review state changed to IANA - Review Needed
2014-08-28
14 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (AES-GCM and AES-CCM Authenticated Encryption …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (AES-GCM and AES-CCM Authenticated Encryption in Secure RTP (SRTP)) to Proposed Standard


The IESG has received a request from the Audio/Video Transport Core
Maintenance WG (avtcore) to consider the following document:
- 'AES-GCM and AES-CCM Authenticated Encryption in Secure RTP (SRTP)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-09-11. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document defines how AES-GCM and AES-CCM Authenticated
  Encryption with Associated Data algorithms can be used to provide
  confidentiality and data authentication in the SRTP protocol.





The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-avtcore-srtp-aes-gcm/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-avtcore-srtp-aes-gcm/ballot/


No IPR declarations have been submitted directly on this I-D.


2014-08-28
14 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2014-08-28
14 Alissa Cooper Last call was requested
2014-08-28
14 Alissa Cooper Ballot approval text was generated
2014-08-28
14 Alissa Cooper Ballot writeup was generated
2014-08-28
14 Alissa Cooper IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2014-08-28
14 Alissa Cooper Last call announcement was generated
2014-08-27
14 Roni Even Document shepherd changed to Roni Even
2014-08-27
14 Roni Even Document shepherd changed to Roni Even
2014-07-28
14 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-14.txt
2014-06-24
13 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-13.txt
2014-05-21
12 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-12.txt
2014-04-01
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-04-01
11 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-11.txt
2014-03-05
10 Amy Vezza Shepherding AD changed to Alissa Cooper
2013-11-04
10 Richard Barnes State changed to AD Evaluation::Revised I-D Needed from Publication Requested
2013-09-24
10 Magnus Westerlund IETF WG state changed to Submitted to IESG for Publication
2013-09-24
10 Magnus Westerlund IESG state changed to Publication Requested
2013-09-24
10 Magnus Westerlund State Change Notice email list changed to avtcore-chairs@tools.ietf.org, draft-ietf-avtcore-srtp-aes-gcm@tools.ietf.org
2013-09-24
10 Magnus Westerlund Responsible AD changed to Richard Barnes
2013-09-24
10 Magnus Westerlund Working group state set to Submitted to IESG for Publication
2013-09-24
10 Magnus Westerlund IESG state set to Publication Requested
2013-09-24
10 Magnus Westerlund IESG process started in state Publication Requested
2013-09-24
10 Magnus Westerlund Intended Status changed to Proposed Standard from None
2013-09-24
10 Magnus Westerlund Writeup updated to reflect latest versions. Shepherd believes the document is now ready for Request of Publication.
2013-09-24
10 Magnus Westerlund IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Consensus: Waiting for Write-Up
2013-09-24
10 Magnus Westerlund Annotation tag Other - see Comment Log cleared.
2013-09-24
10 Magnus Westerlund Changed document writeup
2013-09-23
10 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-10.txt
2013-09-17
09 Magnus Westerlund Changed document writeup
2013-09-02
09 Magnus Westerlund Shepherd is happy with the draft. Due to the changes a 1 week call on the changes will now be started.
2013-08-30
09 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-09.txt
2013-08-26
08 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-08.txt
2013-08-14
07 Magnus Westerlund To make it clear, also David McGrew has responded to the IPR question and that has been entered into the write-up.
2013-08-14
07 Magnus Westerlund
Some small issues and some confirmation are needed before progressing this to a short 1 week WG last call on the changes. A revised ID …
Some small issues and some confirmation are needed before progressing this to a short 1 week WG last call on the changes. A revised ID may be needed.
2013-08-14
07 Magnus Westerlund Annotation tag Other - see Comment Log set. Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-07-03
07 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-07.txt
2013-05-29
06 Magnus Westerlund Changed document writeup
2013-05-28
06 Magnus Westerlund Changed document writeup
2013-05-20
06 Magnus Westerlund Still outstanding issues in comment from shepherd.
David McGrew has not replied to IPR question.
Writeup has been uploaded reflecting the -06 version.
2013-05-20
06 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-06.txt
2013-04-23
05 Magnus Westerlund Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2013-04-23
05 Magnus Westerlund IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2013-04-23
05 Magnus Westerlund Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-02-22
05 Magnus Westerlund Write-up found issues that requires a revised ID before being able to complete write up and request publication.
2013-02-22
05 Magnus Westerlund Last call has concluded and consensus was achieved.
2013-02-22
05 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-05.txt
2013-02-04
04 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-04.txt
2013-01-21
03 Magnus Westerlund Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2012-11-27
03 Magnus Westerlund IETF state changed to In WG Last Call from Adopted by a WG
2012-09-18
03 Magnus Westerlund A number of WG last call comments was sent to the WG list. Authors needs to address and respond to these.
2012-09-18
03 Magnus Westerlund Working group last call started and runs until the end of the 12th of December.
2012-09-18
03 Kevin Igoe New version available: draft-ietf-avtcore-srtp-aes-gcm-03.txt
2012-08-16
02 Stephanie McCammon New version available: draft-ietf-avtcore-srtp-aes-gcm-02.txt
2012-06-26
01 Anabel Martinez New version available: draft-ietf-avtcore-srtp-aes-gcm-01.txt
2012-05-15
00 Magnus Westerlund Changed shepherd to Magnus Westerlund
2012-05-15
00 Magnus Westerlund IETF state changed to Adopted by a WG from Call For Adoption By WG Issued
2012-05-15
00 Magnus Westerlund Already a WG document from AVT.
2012-05-15
00 Magnus Westerlund This is a previous WG document pre-split. Just getting it into the AVTCORE WG.
2012-05-15
00 Magnus Westerlund IETF state changed to Call For Adoption By WG Issued from None
2012-05-15
00 Magnus Westerlund Changed group to Audio/Video Transport Core Maintenance (AVTCORE)
2012-05-03
00 Anabel Martinez New version available: draft-ietf-avtcore-srtp-aes-gcm-00.txt