Completely Encrypting RTP Header Extensions and Contributing Sources
draft-uberti-avtcore-cryptex-01

Document Type Replaced Internet-Draft (avtcore WG)
Authors Justin Uberti  , Cullen Jennings 
Last updated 2021-01-03 (latest revision 2020-11-02)
Replaced by draft-ietf-avtcore-cryptex
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Expired & archived
plain text html xml pdf htmlized bibtex
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-avtcore-cryptex
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-uberti-avtcore-cryptex-01.txt

Abstract

While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations. This document proposes a new mechanism to completely encrypt header extensions and CSRCs as well a simpler signaling mechanism intended to facilitate deployment.

Authors

Justin Uberti (justin@uberti.name)
Cullen Jennings (fluffy@iii.ca)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)