Skip to main content

Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams
draft-ietf-mmusic-sdp-bfcp-03

Revision differences

Document history

Date Rev. By Action
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Bill Fenner
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2005-12-23
03 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-12-20
03 Amy Vezza IESG state changed to Approved-announcement sent
2005-12-20
03 Amy Vezza IESG has approved the document
2005-12-20
03 Amy Vezza Closed "Approve" ballot
2005-12-16
03 Allison Mankin State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Allison Mankin
2005-12-16
03 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2005-12-12
03 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-12-07
03 Bill Fenner [Ballot Position Update] Position for Bill Fenner has been changed to No Objection from Discuss by Bill Fenner
2005-12-01
03 (System) New version available: draft-ietf-mmusic-sdp-bfcp-03.txt
2005-09-10
03 Allison Mankin State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Allison Mankin
2005-09-10
03 Allison Mankin [Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org
' added by Allison Mankin
2005-09-10
03 Allison Mankin State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Allison Mankin
2005-09-02
03 (System) Removed from agenda for telechat - 2005-09-01
2005-09-01
03 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2005-09-01
03 Michelle Cotton
IANA Last Call Comments:
Upon approval of this document the IANA will register 2 values for the SDP parameters for the 'proto' field, 5 SDP …
IANA Last Call Comments:
Upon approval of this document the IANA will register 2 values for the SDP parameters for the 'proto' field, 5 SDP Attritribute types (media level).  These registrations will go in the following registry:
http://www.iana.org/assignments/sdp-parameters

In section 11.7 there is a request for a crypto-suite registration.  In which registry should this go?
We have the following crypto-suites registry:
http://www.iana.org/assignments/crypto-suites

Does it go there or somewhere else?  Need clarification.
Also need clarification for Bill's port number question.
2005-09-01
03 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2005-09-01
03 Bill Fenner
[Ballot discuss]
Port 20000 belongs to a protocol named 'DNP'; should this example be from the dynamic port range (49152-65535) or should bfcp have an …
[Ballot discuss]
Port 20000 belongs to a protocol named 'DNP'; should this example be from the dynamic port range (49152-65535) or should bfcp have an IANA-assigned port number?
2005-09-01
03 Bill Fenner [Ballot Position Update] New position, Discuss, has been recorded for Bill Fenner by Bill Fenner
2005-09-01
03 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-09-01
03 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-09-01
03 Russ Housley
[Ballot discuss]
The value "c2hhcmVkLXNlY3JldA==" is used throughout the document
  as the shared secret example value.  While the ASCII string that was
  encoded …
[Ballot discuss]
The value "c2hhcmVkLXNlY3JldA==" is used throughout the document
  as the shared secret example value.  While the ASCII string that was
  encoded to make this value is cute, the string is not long enough.
  RFC 2104 recommends that the key for HMAC-SHA-1 be 20 octets.

  I find the structure of section 8 very confusing.  The authentication
  of the SIP session that is used to perform an offer/answer exchange
  is not clearly separated from the authentication of the BFCP protocol
  entities.  Further, if the 'fingerprint' attribute is not present,
  what checks must be performed to ensure that the non-self-signed
  certificate used for offer/answer exchange authentication belongs to
  to the same party as the non-self-signed certificate used with
  BFCP/TLS/TCP.  This (and perhaps other related topics) belong in a
  subsection that does not currently exist.

  Section 8 says:
  >
  > Note that when mutual authentication is performed using TLS, it is
  > not necessary to use this digest mechanism.
  >
  This does not agree with draft-ietf-xcon-bfcp-05, which says that the
  digest mechanism must be used for the first message, even when TLS is
  employed.

  Section 8.1 says:
  >
  > ... the certificate provided at the TLS-level must be signed by a
  > certificate authority known to other party.
  >
  This is not quite correct, and the terminology does not align with
  RFC 3280.  I suggest:
  >
  > ... the certificate provided at the TLS-level MUST either be
  > directly signed by one of the other party's trust anchors or be
  > validated using a certification path that terminates at one of
  > the other party's trust anchors.
  >
  Also, a normative reference to RFC 3280 in this section is desirable.

  Section 8.2.1 says:
  >
  > The key-params field SHOULD use the 'inline' key method followed by
  > a base64-encoded [6] unguessable secret [1].
  >
  Please state the size of the shared secret value.  I suspect that the
  size depends on the selected integrity check function.
2005-09-01
03 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-09-01
03 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Undefined by Bert Wijnen
2005-09-01
03 Bert Wijnen
[Ballot comment]
This document has a normative reference:
  [9]  Levin, O. and G. Camarillo, "The SDP (Session Description
        Protocol) Label …
[Ballot comment]
This document has a normative reference:
  [9]  Levin, O. and G. Camarillo, "The SDP (Session Description
        Protocol) Label Attribute",
        draft-levin-mmmusic-sdp-media-label-00 (work in progress),
        July 2004.

and that document is an individual Internet-Draft, that also has expired.
So what impact does this have?
2005-09-01
03 Bert Wijnen [Ballot Position Update] New position, Undefined, has been recorded for Bert Wijnen by Bert Wijnen
2005-09-01
03 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-09-01
03 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2005-08-31
03 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2005-08-31
03 Sam Hartman
[Ballot comment]
I'm not sure I see a way that a server can offer both a TLS and
non-TLS stream using this media type.  If …
[Ballot comment]
I'm not sure I see a way that a server can offer both a TLS and
non-TLS stream using this media type.  If clients end up being
required to support TLS tihs probably doesn't matter.  However it may
be an issue if clients are not required to support TLS.  Perhaps I'm
missing some information about how offer/answer works.  It definitely
seems that two m lines would be wrong because then a client could
accept both of them.
2005-08-31
03 Sam Hartman
[Ballot discuss]
1) Please replace the RFc 1750 reference with  RFC 4086.

2) RFC 3548 is an informational RFC but is referenced as a …
[Ballot discuss]
1) Please replace the RFc 1750 reference with  RFC 4086.

2) RFC 3548 is an informational RFC but is referenced as a normative
reference; RFC 3967 requires that this fact be mentioned in the last
call.  It was not. This document needs to be last called again or
that reference changed.  [Yes, I think this requirement is wrong; I
also understand the argument that we should follow our rules
consistently]
3) I'm uncomfortable with this document being approved before
draft-ietf-mmusic-media-tls.  Based on how this protocol works, I
suspect I have comments on that draft and depending on how those
comments are resolved, I think this draft may change.  In
particular, I'm concerned about cases where the active open side of
the connection is the TLS server, the handling of the fingerprint
attribute and some concerns about asymmetry in this protocol.


4) This document is not aligned with the main BFCP document.  First,
if the server can do active opens then section 6 and 14 of the BFCP
document need to discuss that.  If the authors of this document
confirm that this document's behavior is correct, then I can amend
my BFCP discuss.


5) The authentication handling in this document is not aligned with
BFCP.  Section 8.1 of this document implies that digest is not used
if TLS is used; as discussed by section 9.2 of the BFCP document,
BFCP seems to support modes where both TLS and digest are used. 
Similarly, section 8.2.1 only allows the digest shared secret to be
negotiated for tcp/bfcp not tcp/tls/bfcp.  Again, I'm happy if these
document are aligned in either direction.

6)  IT seems like the attributes discussed in section 8.1 need to be
integrity protected.  However the security considerations does not
discuss this issue.
2005-08-31
03 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2005-08-31
03 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2005-08-29
03 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2005-08-25
03 Allison Mankin Placed on agenda for telechat - 2005-09-01 by Allison Mankin
2005-08-25
03 Allison Mankin
[Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org
IETF Last Call for this document ends 9/1.  If there IETF wide issues arise, it is possible to remove …
[Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org
IETF Last Call for this document ends 9/1.  If there IETF wide issues arise, it is possible to remove
the document from the closely following IESG consideration.  IETF Last Call review is encouraged!' added by Allison Mankin
2005-08-25
03 Allison Mankin [Ballot Position Update] New position, Yes, has been recorded for Allison Mankin
2005-08-25
03 Allison Mankin Ballot has been issued by Allison Mankin
2005-08-25
03 Allison Mankin Created "Approve" ballot
2005-08-25
03 Allison Mankin
[Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org
IETF Last Call for this document ends 9/1.  If there IETF wide issues arise, it is possible to remove …
[Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org
IETF Last Call for this document ends 9/1.  If there IETF wide issues arise, it is possible to remove
the document from the closely following IESG consideration.  IETF Last Call review is encouraged!' added by Allison Mankin
2005-08-18
03 Amy Vezza Last call sent
2005-08-18
03 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-08-18
03 Allison Mankin State Changes to Last Call Requested from AD Evaluation by Allison Mankin
2005-08-18
03 Allison Mankin Last Call was requested by Allison Mankin
2005-08-18
03 (System) Ballot writeup text was added
2005-08-18
03 (System) Last call text was added
2005-08-18
03 (System) Ballot approval text was added
2005-08-17
03 Allison Mankin Correction to other log comment: Colin did a shortened *second* WGLC after the comments on
the first WGLC.
2005-08-17
03 Allison Mankin State Changes to AD Evaluation from AD is watching by Allison Mankin
2005-08-17
03 Allison Mankin I am Responsible ADing so it can advance with BFCP...Colin did a shortened WGLC after
MMUSIC comments.

Publication Requested by Colin 15 August 2005
2005-08-17
03 Allison Mankin State Change Notice email list have been change to jo@acm.org, csp@csperkins.org, gonzalo.camarillo@ericsson.com, jon.peterson@neustar.biz from jo@acm.org, csp@csperkins.org, gonzalo.camarillo@ericsson.com
2005-08-17
03 Allison Mankin [Note]: 'PROTO shepherd Colin Perkins csp@csperkins.org' added by Allison Mankin
2005-08-01
03 Allison Mankin Draft Added by Allison Mankin in state AD is watching
2005-07-20
02 (System) New version available: draft-ietf-mmusic-sdp-bfcp-02.txt
2005-05-04
01 (System) New version available: draft-ietf-mmusic-sdp-bfcp-01.txt
2005-01-13
00 (System) New version available: draft-ietf-mmusic-sdp-bfcp-00.txt