Extended Secure RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/SAVPF)
RFC 5124
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
12 | (System) | Notify list changed from jo@netlab.tkk.fi, csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com to magnus.westerlund@ericsson.com, jf.mule@cablelabs.com, dwing@cisco.com … Notify list changed from jo@netlab.tkk.fi, csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com to magnus.westerlund@ericsson.com, jf.mule@cablelabs.com, dwing@cisco.com, taylor@nortel.com, csp@csperkins.org |
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2008-03-31
|
12 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2008-03-31
|
12 | Amy Vezza | [Note]: 'RFC 5124' added by Amy Vezza |
2008-02-22
|
12 | (System) | RFC published |
2007-11-28
|
12 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-11-28
|
12 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-11-28
|
12 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-11-27
|
12 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-11-27
|
12 | (System) | IANA Action state changed to In Progress |
2007-11-27
|
12 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-11-26
|
12 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-11-26
|
12 | Amy Vezza | IESG has approved the document |
2007-11-26
|
12 | Amy Vezza | Closed "Approve" ballot |
2007-11-26
|
12 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2007-11-21
|
12 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2007-11-21
|
12 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2007-11-21
|
12 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2007-11-20
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-11-20
|
12 | (System) | New version available: draft-ietf-avt-profile-savpf-12.txt |
2007-10-19
|
12 | (System) | Removed from agenda for telechat - 2007-10-18 |
2007-10-18
|
12 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-10-18
|
12 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-10-18
|
12 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2007-10-18
|
12 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2007-10-18
|
12 | Sam Hartman | [Ballot comment] I think Jon's comment is getting at the same issue. Long term we want people to be able to offer best-effort security--offer both … [Ballot comment] I think Jon's comment is getting at the same issue. Long term we want people to be able to offer best-effort security--offer both secure and non-secure and select secure if it is available at both ends. The important thing will be to let the user know whether we have security rather than to fail if we do not. I think it is fine to ignore this issue for now provided that we plan on updating this spec wehn the appropriate mmusic work concludes. |
2007-10-18
|
12 | Sam Hartman | [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman |
2007-10-18
|
12 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-10-18
|
12 | Jon Peterson | [Ballot comment] Following on Magnus' DISCUSS, I also think it's premature to discuss SDP capability negotiation scenarios in this document. Perhaps it would be better … [Ballot comment] Following on Magnus' DISCUSS, I also think it's premature to discuss SDP capability negotiation scenarios in this document. Perhaps it would be better to say that you MUST not offer secure and insecure media simultaneously in the absence of some future protocol mechanism updating this specification. I just wanted to point out that more affected text lives in the second paragraph of 3.3.4, and of course in the paragraph above the one in 3.3.1 cited by Magnus. Furthermore, all of 3.3.1 seems hastily written and should be cleared of various grammar woes ("the answerer the answerer", etc). Also, at the end of the first paragraph of the Sec Cons: The SAVP profile does not add, nor take away, any security services compared to SAVP. Surely this should be "The SAVPF profile does not add..." etc |
2007-10-18
|
12 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-10-18
|
12 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2007-10-17
|
12 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-10-17
|
12 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2007-10-17
|
12 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-10-17
|
12 | Magnus Westerlund | [Ballot discuss] Section 3.1.1: "If an offer contains multiple alternative profiles the answerer the answerer SHOULD prefer a secure profile (if supported) over … [Ballot discuss] Section 3.1.1: "If an offer contains multiple alternative profiles the answerer the answerer SHOULD prefer a secure profile (if supported) over non- secure ones. Among the secure or insecure profiles, the answerer SHOULD select the first acceptable alternative to respect the preference of the offerer. " I think we have an issue here in relation to describing how one offers alternatives. The above text makes no references to how one accomplish the indication of alternatives. Which I think is the only reasonable solution given that we have no defined way of providing alternatives. SDPcapneg is under development and grouping of media lines (RFC 3388) does lack an attribute with the appropriate semantic. Due to this there is a serious issue with the Section 3.4, Example 4: This SDP indicates to the RTSP client that it should setup both media streams, one with SAVPF the other with AVPF. I would also like to point out that the SDP lacks a=control to indicate control URLs. Section 5: " Note that the rules for sharing master keys apply as described in [4] (e.g., Section 9.1). In particular, the same rules for avoiding the two-time pad (keystream reuse) apply: a master key MUST NOT be shared among different RTP sessions if the SSRCs used are unique across all the RTP streams of the RTP sessions that share the same master key." I think there is missing "unless guaranteed" in the above rule sentence. Only if the SSRCs over all the session using the same keys are unique can the same master key be used. |
2007-10-17
|
12 | Magnus Westerlund | [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund |
2007-10-17
|
12 | Magnus Westerlund | [Ballot comment] Section 3.3.2: " Note: To change any of the profiles in use, the client needs tear … [Ballot comment] Section 3.3.2: " Note: To change any of the profiles in use, the client needs tear down the RTSP session (using the TEARDOWN method) and re- establish it using SETUP. This may change as soon as media updating (similar to a SIP UPDATE or re-INVITE) becomes specified. " This is not totally correct, as it is possible to teardown an individual media stream without tearing down the whole RTSP session I therefore suggest the following formulation: Note: To change any of the profiles in use, the client needs tear down that media stream (and possibly the whole RTSP session) (using the TEARDOWN method) and re-establish it using SETUP. This may change as soon as media updating (similar to a SIP UPDATE or re-INVITE) becomes specified. |
2007-10-17
|
12 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2007-10-16
|
12 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Nicolas Williams. |
2007-10-16
|
12 | Tim Polk | [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for … [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for integrity protection for the a=key-mgmt attribute. Two small changes could address this issue. First, in section 3.4, Example 1 should note that an integrity protected channel was required to support the security negotiations. (Examples 3-5 share that requirement, but I would hope that careful wording in Example 1 could keep us from repeating ourselves.) More importantly, the security considerations section needs some text about integrity protection with an explicit pointer to the security considerations in RFC 4576. |
2007-10-16
|
12 | Tim Polk | [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for … [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for integrity protection for the a=key-mgmt attribute. Two small changes could address this issue. First, in section 3.4, Example 1 should note that an integrity protected channel was required to support the security negotiations. (Examples 3-5 share that requirement, but I would hope that careful wording in Example 1 could keep us from repeating ourselves.) More importantly, the security considerations section needs some text about integrity protection with an explicit pointer to the security considerations in RFC 4576. |
2007-10-16
|
12 | Tim Polk | [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for … [Ballot discuss] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for integrity protection for the a=key-mgmt attribute. Two small changes could address this issue. First, in section 3.4, Example 1 should note that an integrity protected channel was required to support the security negotiations. (Examples 3-5 share that requirement, but I would hope that careful wording in Example 1 could keep us from repeating ourselves.) More importantly, the security considerations section needs some text about integrity protection with an explicit pointer to the security considerations in RFC 4576. |
2007-10-16
|
12 | Tim Polk | [Ballot comment] |
2007-10-16
|
12 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2007-10-16
|
12 | Tim Polk | [Ballot comment] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for … [Ballot comment] This document does a nice job hightlighting confidentiality requirements when exchanging the a=crypto attribute, but does not adequately highlight the corresponding requirement for integrity protection for the a=key-mgmt attribute. Two small changes could address this issue. First, in section 3.4, Example 1 should note that an integrity protected channel was required to support the security negotiations. (Examples 3-5 share that requirement, but I would hope that careful wording in Example 1 could keep us from repeating ourselves.) More importantly, the security considerations section needs some text about integrity protection with an explicit pointer to the security considerations in RFC 4576. |
2007-10-15
|
12 | Russ Housley | [Ballot comment] Please consider the comments offered by Ben Campbell in his Gen-ART Review. The review was done on 27-Aug-2007, but the document … [Ballot comment] Please consider the comments offered by Ben Campbell in his Gen-ART Review. The review was done on 27-Aug-2007, but the document has not been revised since. The review is available at: http://www.alvestrand.no/ietf/gen/reviews/draft-ietf-avt -profile-savpf-11-campbell.txt |
2007-10-15
|
12 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2007-10-05
|
12 | Cullen Jennings | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Cullen Jennings |
2007-10-05
|
12 | Cullen Jennings | Placed on agenda for telechat - 2007-10-18 by Cullen Jennings |
2007-10-05
|
12 | Cullen Jennings | [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings |
2007-10-05
|
12 | Cullen Jennings | Ballot has been issued by Cullen Jennings |
2007-10-05
|
12 | Cullen Jennings | Created "Approve" ballot |
2007-09-10
|
12 | Cullen Jennings | Waiting to resolve GEN Art review comments |
2007-08-30
|
12 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-08-27
|
12 | Yoshiko Fong | IANA Last Call Comment: Upon approval of this document, the IANA will make the following assignments in the "Session Description Protocol (SDP) Parameters - per … IANA Last Call Comment: Upon approval of this document, the IANA will make the following assignments in the "Session Description Protocol (SDP) Parameters - per [RFC4566]" registry located at http://www.iana.org/assignments/sdp-parameters sub-registry "proto" Type SDP Name Reference ---- ------------------ --------- proto RTP/SAVPF [RFC-avt-profile-savpf-11] We understand the above to be the only IANA Action for this document. |
2007-08-27
|
12 | Yoshiko Fong | IANA Last Call Comment: Upon approval of this document, the IANA will make the following assignments in the "Session Description Protocol (SDP) Parameters - per … IANA Last Call Comment: Upon approval of this document, the IANA will make the following assignments in the "Session Description Protocol (SDP) Parameters - per [RFC4566]" registry located at http://www.iana.org/assignments/sdp-parameters sub-registry "proto" Type SDP Name Reference ---- ------------------ --------- proto RTP/SAVPF [RFC-avt-profile-savpf-11] We understand the above to be the only IANA Action for this document. |
2007-08-21
|
12 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Nicolas Williams |
2007-08-21
|
12 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Nicolas Williams |
2007-08-16
|
12 | Amy Vezza | Last call sent |
2007-08-16
|
12 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-08-16
|
12 | Cullen Jennings | Last Call was requested by Cullen Jennings |
2007-08-16
|
12 | Cullen Jennings | State Changes to Last Call Requested from AD Evaluation::AD Followup by Cullen Jennings |
2007-08-16
|
12 | (System) | Ballot writeup text was added |
2007-08-16
|
12 | (System) | Last call text was added |
2007-08-16
|
12 | (System) | Ballot approval text was added |
2007-07-25
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-07-25
|
11 | (System) | New version available: draft-ietf-avt-profile-savpf-11.txt |
2007-07-24
|
12 | Cullen Jennings | the 11 version fixes this |
2007-03-27
|
12 | Cullen Jennings | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings |
2007-03-27
|
12 | Cullen Jennings | Sent email ... Ok - I know you are going to hate to get this email from me but there still seems to be stuff … Sent email ... Ok - I know you are going to hate to get this email from me but there still seems to be stuff that is pointing at the 0 m line port stuff. I would suggest the following edits. In Section 1.1 Remove "Grouping of m= lines in SDP may cause several SDP session level descriptions to define (alternatives of) the same RTP session for the same media type." In section 3.3.1 where you have (i.e. per m= line in SDP). change this from "i.e." to "e.g" Later in this section change "(e.g., for best-effort SRTP [14])" to reference the draft-ietf-mmusic-sdp-capability-negotiation instead of the kaplan document Remove If an offer contains multiple alternative profiles the answerer MUST select exactly only one and reject the other(s), e.g., by setting the port number in the respect m= line to 0. In section 3.3.2 remove To offer two or more alternative RTP profiles for a particular media stream, the SDP description MUST contain exactly one m= line for this media stream for each profile and all the same transport address (IP address and port number). The profiles SHOULD be listed in the order of preference. This is similar to formulating an offer per section 3.3.1. In section 3.4, example 4, remove the word "grouping" from the sentence "Note that a future grouping mechanism will allow to explicitly" Remove reference 14 and add references to draft-ietf-mmusic-sdp- capability-negotiation |
2007-03-15
|
12 | Cullen Jennings | Status date has been changed to 2007-03-24 from |
2007-03-05
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-03-05
|
10 | (System) | New version available: draft-ietf-avt-profile-savpf-10.txt |
2007-02-18
|
12 | Cullen Jennings | The 10 version of this should be good to go - was emailed Jan 25 but something weird happened and did not get in drafts … The 10 version of this should be good to go - was emailed Jan 25 but something weird happened and did not get in drafts directory. |
2007-02-18
|
12 | Cullen Jennings | Status date has been changed to 2007-02-25 from |
2006-12-15
|
12 | Cullen Jennings | State Change Notice email list have been change to jo@netlab.tkk.fi, csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com from … State Change Notice email list have been change to jo@netlab.tkk.fi, csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com from csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com |
2006-11-14
|
12 | Cullen Jennings | State Change Notice email list have been change to csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com from csp@csperkins.org, … State Change Notice email list have been change to csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com, dwing@cisco.com from csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com |
2006-11-14
|
12 | Cullen Jennings | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings |
2006-11-14
|
12 | Cullen Jennings | It seems to me that the best path forward is to follow roughly what is in AVPF and basically remove the text on offer/answer and … It seems to me that the best path forward is to follow roughly what is in AVPF and basically remove the text on offer/answer and others things that seem largely MMUSIC topics. Thoughts? Right now the text seems to normatively conflict with some of the way we might choose to solve profile negotiation. |
2006-11-14
|
12 | Cullen Jennings | [Note]: 'PROTO shepherd is Colin' added by Cullen Jennings |
2006-10-27
|
12 | Cullen Jennings | This draft still has substantial text on alternatives and how they are negotiated. Given this is a topic with at least two drafts being discussed … This draft still has substantial text on alternatives and how they are negotiated. Given this is a topic with at least two drafts being discussed in the next mmuisc meeting, I'm very uncomfortable with an AVT document making normative statements about it. I would like to talk about this at the next IETF and see what happens in MMUSIC. |
2006-10-27
|
12 | Cullen Jennings | State Change Notice email list have been change to csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com from csp@csperkins.org, magnus.westerlund@ericsson.com, … State Change Notice email list have been change to csp@csperkins.org, carrara@kth.se, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com from csp@csperkins.org, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com |
2006-10-27
|
12 | Cullen Jennings | State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com, roni.even@polycom.co.il, taylor@nortel.com, jf.mule@cablelabs.com from csp@csperkins.org, magnus.westerlund@ericsson.com |
2006-10-27
|
12 | Cullen Jennings | State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com from csp@csperkins.org, magnus.westerlund@ericsson.com, cullen@iii.ca |
2006-10-25
|
09 | (System) | New version available: draft-ietf-avt-profile-savpf-09.txt |
2006-10-20
|
08 | (System) | New version available: draft-ietf-avt-profile-savpf-08.txt |
2006-10-06
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-10-06
|
07 | (System) | New version available: draft-ietf-avt-profile-savpf-07.txt |
2006-08-09
|
12 | Cullen Jennings | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings |
2006-06-29
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-06-29
|
06 | (System) | New version available: draft-ietf-avt-profile-savpf-06.txt |
2006-05-08
|
12 | Cullen Jennings | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Cullen Jennings |
2006-04-07
|
12 | Cullen Jennings | Test - please ignore |
2006-04-07
|
12 | Cullen Jennings | State Change Notice email list have been change to csp@csperkins.org, magnus.westerlund@ericsson.com, cullen@iii.ca from csp@csperkins.org, magnus.westerlund@ericsson.com |
2006-04-07
|
12 | Cullen Jennings | State Changes to AD Evaluation::AD Followup from AD Evaluation by Cullen Jennings |
2006-04-07
|
12 | Cullen Jennings | I had no concerns with the parts about combining SAVP and AVPF to form SAVPF. I do have concerns about how the multiple profiles may … I had no concerns with the parts about combining SAVP and AVPF to form SAVPF. I do have concerns about how the multiple profiles may be offered in SDP under offer/answer. I'd like to talk about this and understand it better. It seemed like in some cases this was changing the semantics of how something that did not understand this specification would tread these. It also seemed to be a big problem that it requires a group mechanism, normatively references fid, then points out fid done not have the right semantics. I am also concerned that this draft is trying to define a way to offer both encrypted and unencrypted media streams but has not addressed many of the requirements that were raised around that issue. It was not clear that a draft dealing with allowing a AVPF feedback in a SRTP session needed to also resolve the issue of offering both SAVP and AVP. In the security section dealing with two times pads, I think that changing the master key MAY be reused if SSRC are unique runs the risk that because it is MAY implementer may think they can ignore it. Might be better to rephrase as something like master keys "MUST NOT" be reused if the SSRC are not known to be unique. I was surprised to see the how many packets could use a given key was defined in this draft - I would have hoped that was SRTP but I did not go check to see. |
2006-03-24
|
12 | Cullen Jennings | Shepherding AD has been changed to Cullen Jennings from Allison Mankin |
2006-02-17
|
12 | Allison Mankin | State Changes to AD Evaluation from Publication Requested by Allison Mankin |
2006-02-08
|
12 | Dinara Suleymanova | PROTO Write-up 1.a) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to … PROTO Write-up 1.a) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to the IESG for publication? Yes. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? It has received adequate review, by key WG members in AVT and MMUSIC. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? No. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it, etc. If your issues have been discussed in the WG and the WG has indicated it wishes to advance the document anyway, note if you continue to have concerns. No issues. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong consensus from interested parties. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise what are they upset about. No. 1.g) Have the chairs verified that the document adheres to _all_ of the ID nits? (see http://www.ietf.org/ID-Checklist.html). Yes. 1.h) Does the document a) split references into normative/ informative, and b) are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (Note: the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) References have been split. There are reference to drafts, however these are either in the RFC-editor queue or already with the IESG for approval. 1.i) For Standards Track and BCP documents, the IESG approval announcement includes a writeup section with the following sections: * Technical Summary This memo specifies an RTP profile that combines the features of SRTP (SAVP) and the Extended Profile for RTCP-based Feedback (AVPF). Thus allowing SRTP's security functions, encryption and integrity protection to be used in session which requires more timely RTCP feedback than what AVP provides. Rules for how multiple profiles may be offered in SDP under offer/answer are also defined. * Working Group Summary There is consensus in the WG to publish this document. * Protocol Quality The combination of the two profiles are basically orthogonal. Thus no new algorithms or other advanced features was needed to be define for this profile. The main new functionality is the signalling solution which has been reviewed both in AVT and MMUSIC. |
2006-02-08
|
12 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2005-12-30
|
05 | (System) | New version available: draft-ietf-avt-profile-savpf-05.txt |
2005-11-30
|
04 | (System) | New version available: draft-ietf-avt-profile-savpf-04.txt |
2005-10-18
|
03 | (System) | New version available: draft-ietf-avt-profile-savpf-03.txt |
2005-07-20
|
02 | (System) | New version available: draft-ietf-avt-profile-savpf-02.txt |
2004-07-21
|
01 | (System) | New version available: draft-ietf-avt-profile-savpf-01.txt |
2003-10-21
|
00 | (System) | New version available: draft-ietf-avt-profile-savpf-00.txt |