Skip to main content

Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)
RFC 5764

Revision differences

Document history

Date Rev. By Action
2020-01-21
07 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2015-10-14
07 (System) Notify list changed from avt-chairs@ietf.org, draft-ietf-avt-dtls-srtp@ietf.org to (None)
2012-08-22
07 (System) post-migration administrative database adjustment to the Yes position for Cullen Jennings
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Magnus Westerlund
2010-05-12
07 Cindy Morgan State Changes to RFC Published from RFC Ed Queue by Cindy Morgan
2010-05-12
07 Cindy Morgan [Note]: 'RFC 5764' added by Cindy Morgan
2010-05-11
07 (System) RFC published
2010-02-03
07 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2010-02-02
07 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2010-02-02
07 (System) IANA Action state changed to In Progress from Waiting on Authors
2010-01-25
07 (System) IANA Action state changed to Waiting on Authors from In Progress
2010-01-25
07 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-10-22
07 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-10-22
07 (System) IANA Action state changed to In Progress from On Hold
2009-05-27
(System)
2009-05-18
(System)
2009-05-11
07 (System) IANA Action state changed to On Hold from Waiting on Authors
2009-03-18
07 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-03-10
07 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-03-10
07 (System) IANA Action state changed to In Progress
2009-03-10
07 Amy Vezza IESG state changed to Approved-announcement sent
2009-03-10
07 Amy Vezza IESG has approved the document
2009-03-10
07 Amy Vezza Closed "Approve" ballot
2009-03-10
07 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2009-02-28
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-02-28
07 (System) New version available: draft-ietf-avt-dtls-srtp-07.txt
2009-02-27
07 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2009-02-08
07 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Yes from Discuss by Cullen Jennings
2008-11-07
07 (System) Removed from agenda for telechat - 2008-11-06
2008-11-06
07 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2008-11-06
07 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2008-11-06
07 Cullen Jennings [Ballot discuss]
Holding DISCUSS until questions from IANA are finalized.
2008-11-06
07 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Yes by Cullen Jennings
2008-11-06
07 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-11-06
07 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2008-11-06
07 Tim Polk
[Ballot comment]
Section 4.2, immediately before Figure 1:

A brief statement that the master key and master salt are provided to the SRTCP key
derivation …
[Ballot comment]
Section 4.2, immediately before Figure 1:

A brief statement that the master key and master salt are provided to the SRTCP key
derivation function seems to be missing here.  These invocations are implied by Figure
1, but are conspicuously absent from the text.
2008-11-06
07 Magnus Westerlund
[Ballot comment]
Section 3:

"This improves the cryptographic
  performance of DTLS, but may cause problems when RTCP and RTP are
  subject to different …
[Ballot comment]
Section 3:

"This improves the cryptographic
  performance of DTLS, but may cause problems when RTCP and RTP are
  subject to different network treatment (e.g., for bandwidth
  reservation or scheduling reasons.)"
 
The above sentence seems so backwards. If you multiplex them together then they can't be subject to different treatment. And the reasons seems to be wrong ones for arguing against multiplexing. The three main reasons why RTP and RTCP isn't multiplex as stated in the MUX draft are: Simplicity, effiency and 3rd party monitoring. Especially the last is hard to combine with encryption services, especially such that perform setup point to point.
2008-11-06
07 Magnus Westerlund
[Ballot discuss]
Section 4:

I am annoyed that I didn't catch this in my earlier review of this document. I might also be missing some …
[Ballot discuss]
Section 4:

I am annoyed that I didn't catch this in my earlier review of this document. I might also be missing some vital piece. However, there seems to be a significant mismatch between this document and the SRTP one. SRTP has crypto contexts that are identied by the triplet: SSRC, destination address and destination port (see section 3.2.1 of RFC 3711). Within each context there might be one or more master keys identified with the MKI if used.

The DTLS-SRTP document seems to fail to take into account that the MKI and creation of crypto context (including the SRTP master keys) needs to be scoped by SSRC. The DTLS-SRTP document correctly discusses the forking issue when multiple DTLS handshake may happen and result in different DTLS contexts all delivering SRTP packets and DTLS messages to the same port. However, within each pairing there are only the DTLS client and the server, but there might be multiple SSRCs for each client and server. This doesn't seem to be covered. This might be a result in the failure to clearly connect the terminology between DTSL and SRTP.

From a crypto context perspective as described in RFC 3711 one should probably discuss this case properly. A modified figure 2 would look like this:

This is the client has two SSRCs X and Y, while the server has two SSRCs Z and W.

    Client          Server                Kontext
    <-------DTLS------>
    ----SRTP SSRC=X--->  src/dst=a/b, uses RTP_client_write_key_X
    ----SRTP SSRC=Y--->  src/dst=a/b, uses RTP_client_write_key_Y
    <---SRTP SSRC=Z----  src/dst=b/a, uses RTP_server_write_key_Z
    <---SRTP SSRC=W----  src/dst=b/a, uses RTP_server_write_key_W

    <-------DTLS------>
    ----SRTCP SSRC=X--->  src/dst=c/d, uses RTCP_client_write_key_X
    ----SRTCP SSRC=Y--->  src/dst=c/d, uses RTCP_client_write_key_Y
    <---SRTCP SSRC=Z----  src/dst=d/c, uses RTCP_server_write_key_Z
    <---SRTCP SSRC=W----  src/dst=d/c, uses RTCP_server_write_key_W
 
So in the above case one has a number of different crypto contexts depending on the SSRC and the destination. However, SRTP seems not to clear that what one does for the existing ciphers is to do the following operation:

Context RTP_client_write_key_X = RTP_client_write_key_Y

Instead one uses the IV for AES-CM to get unique keys for different SSRCs. However, as this is a construct that depends on the cipher I don't think the DTLS specification can assume this to be always true. Thus it should be able to derive different master keys for the different kontexts.

I think we need to clear this up. I know quite a lot of the blame for this can be put on SRTP that doesn't clearly express this relation. I think it is time we do reviese RFC 3711 to make these things clearer.
2008-11-06
07 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund
2008-11-06
07 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2008-11-06
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2008-11-05
07 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2008-11-05
07 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2008-11-05
07 Chris Newman
[Ballot discuss]
Cullen: Who is proposed as the designated expert for the new registry?

RFC 5226 "Specification Required" means a designated expert needs to
be …
[Ballot discuss]
Cullen: Who is proposed as the designated expert for the new registry?

RFC 5226 "Specification Required" means a designated expert needs to
be chosen.
2008-11-05
07 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to Discuss from No Objection by Chris Newman
2008-11-05
07 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2008-11-05
07 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2008-11-05
07 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2008-11-05
07 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2008-11-05
07 Pasi Eronen [Ballot Position Update] New position, Yes, has been recorded by Pasi Eronen
2008-11-04
07 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2008-11-01
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Paul Hoffman
2008-11-01
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Paul Hoffman
2008-10-30
(System)
Posted related IPR disclosure: Certicom's Statement about IPR related to RFC 4346, RFC 5246, RFC 5289, RFC 4492, RFC 2409, …
Posted related IPR disclosure: Certicom's Statement about IPR related to RFC 4346, RFC 5246, RFC 5289, RFC 4492, RFC 2409, RFC 4306, RFC 4754, RFC 4753, RFC 4869, RFC 4253, RFC 2633, RFC 3278, RFC 4347, RFC 4366, RFC 4109, RFC 4252, RFC 3850, RFC 3851, RFC 5008, draft-ietf-tls-rfc43...
2008-10-29
07 Cullen Jennings State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Cullen Jennings
2008-10-29
07 Cullen Jennings Placed on agenda for telechat - 2008-11-06 by Cullen Jennings
2008-10-29
07 Cullen Jennings [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings
2008-10-29
07 Cullen Jennings Ballot has been issued by Cullen Jennings
2008-10-29
07 Cullen Jennings Created "Approve" ballot
2008-10-29
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-10-29
06 (System) New version available: draft-ietf-avt-dtls-srtp-06.txt
2008-10-29
07 Cullen Jennings State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Cullen Jennings
2008-10-03
07 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Paul Hoffman.
2008-10-03
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2008-10-03
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2008-10-03
07 Samuel Weiler Assignment of request for Last Call review by SECDIR to Steve Hanna was rejected
2008-10-02
07 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-09-30
07 Amanda Baber
IANA Last Call comments:

[NOTE: This document is dependent on the IANA Actions in the
not-yet-reviewed ietf-tls-extractor document. IANA cannot
complete the actions in this …
IANA Last Call comments:

[NOTE: This document is dependent on the IANA Actions in the
not-yet-reviewed ietf-tls-extractor document. IANA cannot
complete the actions in this document until ietf-tls-extractor
is acted upon.]

IANA Has Questions:

- The SRTP Protection Profiles table in section 4.1.2 don't match
the list of profiles half a page later. E.g., the table contains
SRTP_AES128_CM_SHA1_80 but the list has SRTP_AES128_CM_HMAC_SHA1_80.
Should these names be reconciled?

Action 1:

Upon approval of this document, the IANA will make the following assignment
in the "ExtensionType Values" registry at
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml

Value Extension Name Reference
----- ---------------- ------------
[TBD] use_srtp [RFC-avt-dtls-srtp-05]


Action 2:

IANA has questions about this action (see above).

Upon approval of this document, the IANA will create the following
registry at
http://www.iana.org/assignments/TBD

Registry Name: SRTP Protection Profiles
Registration Procedures: Specification Required
Initial contents of this registry will be:

Number Profile Reference
------ ------- -----------
{0x00, 0x01} SRTP_AES128_CM_SHA1_80 [RFC-avt-dtls-srtp-05]
{0x00, 0x02} SRTP_AES128_CM_SHA1_32 [RFC-avt-dtls-srtp-05]
{0x00, 0x05} SRTP_NULL_SHA1_80 [RFC-avt-dtls-srtp-05]
{0x00, 0x06} SRTP_NULL_SHA1_32 [RFC-avt-dtls-srtp-05]


Action 3:

Upon approval of this document, the IANA will make the following assignments
in the sub-registry "proto" at
http://www.iana.org/assignments/sdp-parameters


Type SDP Name Reference
-------------- --------------------------- ---------
proto
UDP/TLS/RTP/SAVP [RFC-avt-dtls-srtp-05]
DCCP/TLS/RTP/SAVP [RFC-avt-dtls-srtp-05]

UDP/TLS/RTP/SAVPF [RFC-avt-dtls-srtp-05]
DCCP/TLS/RTP/SAVPF [RFC-avt-dtls-srtp-05]


Action 4:

[NOTE: This registry does not yet exist; it is due to be created
by normative reference I-D.ietf-tls-extractor]

Upon approval of this document, the IANA will make the following assignment
in the "TLS Extractor Label" registry located at
http://www.iana.org/assignments/TBD

Value Reference
----- ------------
EXTRACTOR-dtls_srtp [RFC-avt-dtls-srtp-05]


We understand the above to be the only IANA Actions for this document.
2008-09-18
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Steve Hanna
2008-09-18
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Steve Hanna
2008-09-18
07 Amy Vezza Last call sent
2008-09-18
07 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-09-17
07 Cullen Jennings [Note]: 'The document shepherd is Roni Even.' added by Cullen Jennings
2008-09-17
07 Cullen Jennings Last Call was requested by Cullen Jennings
2008-09-17
07 (System) Ballot writeup text was added
2008-09-17
07 (System) Last call text was added
2008-09-17
07 (System) Ballot approval text was added
2008-09-17
07 Cullen Jennings State Changes to Last Call Requested from AD Evaluation by Cullen Jennings
2008-09-16
07 Cullen Jennings State Changes to AD Evaluation from Publication Requested by Cullen Jennings
2008-09-11
07 Cindy Morgan
(1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
  …
(1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

The document shepherd is Roni Even. I have reviewed the document, and
believe it is ready for publication.


(1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

The document went through  two WGLC since there were comments during
The first one. The comments were addressed and there were no further
comments in the second WGLC. The document shepherd has no concerns
about the review process.


(1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization or XML?

No concerns.


(1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the  document,
          or has concerns whether there really is a need for it.  In
          any event, if the WG has discussed those issues and has
          indicated that it still wishes to advance the document,
          detail those concerns here.  Has an IPR disclosure related to
          this document been filed?  If so, please include a reference
          to the disclosure and summarize the WG discussion and
          conclusion on this issue.

No concerns. There is no disclosed IPR on this document.


(1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

The document has good consensus from the WG.


(1.f)  Has anyone threatened an appeal or otherwise indicated 
          extreme discontent?  If so, please summarize the areas of
          conflict in separate email messages to the Responsible Area
          Director.  (It  should be in a separate email because this
          questionnaire is entered into the ID Tracker.)

No.


(1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the 
          document  met all formal review criteria it needs to, such as
          the MIB Doctor, media type and URI type reviews?

The idnits tool reports some warning but they were checked and there
are no issues there.


(1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents
          that  are not ready for advancement or are otherwise in an
          unclear state?  If such normative references exist, what is
          the strategy for their completion?  Are there normative
          references that are downward references, as described in
          [RFC3967]?  If so, list these downward references to support
          the Area Director in the Last Call procedure for them
          [RFC3967].

References have been split. There are normative references to
internet-drafts which are in progress, There is normative down-
references to draft-ietf-tls-extractor-01 but this is an error in the
tls-extractor and will be fixed in the next revision.


(1.i)  Has the Document Shepherd verified that the document IANA
          consideration section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process has Shepherd
          conferred with the Responsible Area Director so that the IESG
          can appoint the needed Expert during the IESG Evaluation?

The IANA considerations section exists, and appears consistent with
this document. The new registry defines the initial values and
procedure to add values.


(1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

OK


(1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up?  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary

              Relevant content can frequently be found in the abstract
              and/or introduction of the document.  If not, this may be
              an indication that there are deficiencies in the abstract
              or introduction.

"This document describes a Datagram Transport Layer Security (DTLS)
extension to establish keys for secure RTP (SRTP) and secure RTP
Control Protocol (SRTCP) flows.  DTLS keying happens on the media
path, independent of any out-of-band signalling channel present."

          Working Group Summary

              Was there anything in WG process that is worth noting? 
              For  example, was there controversy about particular
              points or were there decisions where the consensus was
              particularly rough?

There was a discussion about which in band keying mechanism should be
used; it is captured in draft-ietf-sip-media-security-requirements.
There was rough consensus for this solution.

          Document Quality
              Are there existing implementations of the protocol? 
              Have a significant number of vendors indicated their plan
              To implement the specification?  Are there any reviewers
              that merit special mention as having done a thorough
              review, e.g., one that resulted in important changes or a
              conclusion that the document had no substantive 
              issues?  If there was a MIB Doctor, Media Type or other
              expert review, what was its course (briefly)?  In the
              case of a Media Type review, on what date was the request
              posted?

There were indications by vendors that they will implement this
solution.

Pasi Eronen did a good review during the WGLC that helped with
improving of the document. He is mentioned in section 10 of the
document (Acknowledgments)

          Personnel
              Who is the Document Shepherd for this document?  Who is 
              the Responsible Area Director?

Roni Even is the document shepherd.

The responsible area director is Cullen Jennings.
2008-09-11
07 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2008-09-11
05 (System) New version available: draft-ietf-avt-dtls-srtp-05.txt
2008-08-26
04 (System) New version available: draft-ietf-avt-dtls-srtp-04.txt
2008-07-14
03 (System) New version available: draft-ietf-avt-dtls-srtp-03.txt
2008-02-25
02 (System) New version available: draft-ietf-avt-dtls-srtp-02.txt
2007-11-18
01 (System) New version available: draft-ietf-avt-dtls-srtp-01.txt
2007-07-03
00 (System) New version available: draft-ietf-avt-dtls-srtp-00.txt