Security Preconditions for Session Description Protocol (SDP) Media Streams
RFC 5027
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
04 | (System) | Notify list changed from mmusic-chairs@ietf.org to (None) |
2012-08-22
|
04 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2007-10-17
|
04 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2007-10-17
|
04 | Amy Vezza | [Note]: 'RFC 5027' added by Amy Vezza |
2007-10-16
|
04 | (System) | RFC published |
2007-09-07
|
04 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-09-07
|
04 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-09-07
|
04 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-09-07
|
04 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-09-07
|
04 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-08-23
|
04 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-08-22
|
04 | (System) | IANA Action state changed to In Progress |
2007-08-21
|
04 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-08-21
|
04 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-08-21
|
04 | Amy Vezza | IESG has approved the document |
2007-08-21
|
04 | Amy Vezza | Closed "Approve" ballot |
2007-08-21
|
04 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2007-08-15
|
04 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2007-07-10
|
04 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-07-10
|
04 | (System) | New version available: draft-ietf-mmusic-securityprecondition-04.txt |
2007-04-25
|
04 | Jon Peterson | State Change Notice email list have been change to mmusic-chairs@tools.ietf.org from jo@acm.org, csp@csperkins.org |
2007-03-02
|
04 | Jon Peterson | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Jon Peterson |
2006-12-15
|
04 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2006-12-15
|
04 | (System) | Removed from agenda for telechat - 2006-12-14 |
2006-12-14
|
04 | Russ Housley | [Ballot discuss] The means to deal with refusals is identified in the security considerations as a work in progress (SDPCN). This seems like an … [Ballot discuss] The means to deal with refusals is identified in the security considerations as a work in progress (SDPCN). This seems like an important feature. How can this be reviewed or deployed without SDPCN? |
2006-12-14
|
04 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2006-12-14
|
04 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2006-12-14
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2006-12-13
|
04 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner |
2006-12-13
|
04 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded by David Kessens |
2006-12-13
|
04 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2006-12-13
|
04 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2006-12-13
|
04 | Magnus Westerlund | [Ballot comment] Section 2: "Real-Time Transfer protocol" RTP stands for "real-time transport protocol" Section 3: At that moment, we furthermore require that ser agents MUST … [Ballot comment] Section 2: "Real-Time Transfer protocol" RTP stands for "real-time transport protocol" Section 3: At that moment, we furthermore require that ser agents MUST start using the new session parameters for media packets being sent. Spelling: ser/user |
2006-12-13
|
04 | Magnus Westerlund | [Ballot comment] Section 2: "Real-Time Transfer protocol" RTP stands for "real-time transport protocol" |
2006-12-13
|
04 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2006-12-12
|
04 | Sam Hartman | [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman |
2006-12-12
|
04 | Brian Carpenter | [Ballot comment] From Gen-ART review by David Black: In the new security considerations section, I didn't see any mention of downgrade attacks (man-in-the-middle removes … [Ballot comment] From Gen-ART review by David Black: In the new security considerations section, I didn't see any mention of downgrade attacks (man-in-the-middle removes secure alternative from negotiation, causing use of non-secure streams when secure streams would have been used in his absence) - this mention is ok to omit, as the important point that the offerer's security policy allows non-secure streams in this situation has been added. Similarly, the security considerations section doesn't say how to avoid the "malicious malicious media stream packets until the answer (indicating the chosen secure alternative) is received" vulnerability, but it's reasonably clear from context that the only obvious way to avoid it is to not offer the non-secure alternative. I saw this typo in the new text in Section 3: At that moment, we furthermore require that ser agents MUST start ^^^ |
2006-12-12
|
04 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter |
2006-12-11
|
04 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2006-12-11
|
04 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie |
2006-12-11
|
04 | Russ Housley | [Ballot discuss] Security for media streams typically uses SRTP. The whole purpose of this document is to stall media transmission until the necessary keys … [Ballot discuss] Security for media streams typically uses SRTP. The whole purpose of this document is to stall media transmission until the necessary keys for RTP security are in place, which avoids media clipping. The security precondition ensures that the receiver is "ready" to receive "secure" data. This is not needed with some of the in-band key management techniques that are being discussed. Should we wait to advance this document? If we wait and the RTPsec solution does not need this mechanism, we will have reduced complexity. The means to deal with refusals is identified in the security considerations as a work in progress (SDPCN). This seems like an important feature. How can this be reviewed or deployed without SDPCN? |
2006-12-11
|
04 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2006-12-11
|
04 | Lars Eggert | [Ballot comment] Idnits finds boilerplate issues. Section 3, paragraph 1: > If the security precondition is used with a non-secure > media stream, … [Ballot comment] Idnits finds boilerplate issues. Section 3, paragraph 1: > If the security precondition is used with a non-secure > media stream, the security precondition is by definition satisfied. That sentence just reads oddly. How about "A security precondition used with a non-secure media stream has no effect." Section 3, paragraph 4: > Security preconditions do not guarantee that an established media > stream will be secure. They merely guarantee that the recipient of > the media stream packets will be able to perform any relevant > decryption and integrity checking on those media stream packets. The term "security precondition" is really misleading. How about something like "stream setup synchronization precondition" or "security parameter exchange precondition?" Section 5, paragraph 4: > integrity protection of signaling, e.g., IPSec or TLS. In all other Nit: s/IPSec/IPsec/ Section 9, paragraph 4: > [RFC2327] M. Handley and V. Jacobson, "SDP: Session Description > Protocol", RFC 2327, April 1998. Nit: cited as [SDP] in the text |
2006-12-11
|
04 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2006-12-08
|
04 | Jon Peterson | [Ballot Position Update] New position, Yes, has been recorded for Jon Peterson |
2006-12-08
|
04 | Jon Peterson | Ballot has been issued by Jon Peterson |
2006-12-08
|
04 | Jon Peterson | Created "Approve" ballot |
2006-12-08
|
04 | Jon Peterson | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Jon Peterson |
2006-12-08
|
04 | Jon Peterson | Placed on agenda for telechat - 2006-12-14 by Jon Peterson |
2006-11-08
|
04 | (System) | Request for Early review by SECDIR Completed. Reviewer: Patrick Cain. |
2006-10-20
|
04 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-10-20
|
03 | (System) | New version available: draft-ietf-mmusic-securityprecondition-03.txt |
2006-08-09
|
04 | Jon Peterson | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for Writeup by Jon Peterson |
2006-08-09
|
04 | Jon Peterson | Proto Writeup: 1.a) Have the chairs personally reviewed this version of the ID and do they believe this ID … Proto Writeup: 1.a) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to the IESG for publication? Yes. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? The document has had adequate review; I have no concerns. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? No. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it, etc. If your issues have been discussed in the WG and the WG has indicated it wishes to advance the document anyway, note if you continue to have concerns. I have no concerns. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise what are they upset about. No. 1.g) Have the chairs verified that the document adheres to _all_ of the ID nits? (see http://www.ietf.org/ID-Checklist.html). There are minor nits in the boilerplate text that make idnits-1.82 complain, but nothing significant. 1.h) Does the document a) split references into normative/ informative, and b) are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (Note: the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) References have been split. There are no normative references to I-Ds. * Technical Summary This document defines a new security precondition for the Session Description Protocol precondition framework described in RFCs 3312 and 4032. A security precondition can be used to delay session establishment or modification until media stream security has been negotiated successfully. * Working Group Summary This is a typical application of the SIP/SDP preconditions framework. There was no controversy surrounding the work, and it is needed by a range of SIP users. * Protocol Quality The draft appears to be of good quality. |
2006-08-02
|
04 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2006-07-19
|
04 | Amy Vezza | Last call sent |
2006-07-19
|
04 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2006-07-19
|
04 | Jon Peterson | Last Call was requested by Jon Peterson |
2006-07-19
|
04 | Jon Peterson | State Changes to Last Call Requested from AD Evaluation::AD Followup by Jon Peterson |
2006-07-19
|
04 | (System) | Ballot writeup text was added |
2006-07-19
|
04 | (System) | Last call text was added |
2006-07-19
|
04 | (System) | Ballot approval text was added |
2006-06-28
|
04 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-06-28
|
02 | (System) | New version available: draft-ietf-mmusic-securityprecondition-02.txt |
2006-02-06
|
04 | Jon Peterson | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Jon Peterson |
2006-01-26
|
04 | Jon Peterson | State Changes to AD Evaluation from Publication Requested by Jon Peterson |
2005-12-07
|
04 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2005-10-21
|
01 | (System) | New version available: draft-ietf-mmusic-securityprecondition-01.txt |
2005-02-16
|
00 | (System) | New version available: draft-ietf-mmusic-securityprecondition-00.txt |