Adobe's RTMFP Profile for Flash Communication
RFC 7425
Document | Type |
RFC - Informational
(December 2014; No errata)
Was draft-thornburgh-rtmfp-flash (individual)
|
|
---|---|---|---|
Author | Michael Thornburgh | ||
Last updated | 2014-12-23 | ||
Stream | ISE | ||
Formats | plain text html pdf htmlized bibtex | ||
IETF conflict review | conflict-review-thornburgh-rtmfp-flash | ||
Stream | ISE state | Published RFC | |
Consensus Boilerplate | Unknown | ||
Document shepherd | Adrian Farrel | ||
Shepherd write-up | Show (last changed 2014-09-22) | ||
IESG | IESG state | RFC 7425 (Informational) | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) | ||
IANA | IANA review state | IANA OK - Actions Needed | |
IANA action state | RFC-Ed-Ack |
Independent Submission M. Thornburgh Request for Comments: 7425 Adobe Category: Informational December 2014 ISSN: 2070-1721 Adobe's RTMFP Profile for Flash Communication Abstract This memo describes how to use Adobe's Secure Real-Time Media Flow Protocol (RTMFP) to transport the video, audio, and data messages of Adobe Flash platform communications. Aspects of this application profile include cryptographic methods and data formats, flow metadata formats, and protocol details for client-server and peer-to-peer communication. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7425. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. This document may not be modified, and derivative works of it may not be created, except to format it for publication as an RFC or to translate it into languages other than English. Thornburgh Informational [Page 1] RFC 7425 Adobe RTMFP for Flash Communication December 2014 Table of Contents 1. Introduction ....................................................3 2. Terminology .....................................................4 3. Common Syntax Elements ..........................................4 4. Cryptography Profile ............................................5 4.1. Default Session Key ........................................5 4.2. Diffie-Hellman Groups ......................................6 4.3. Certificates ...............................................6 4.3.1. Format ..............................................6 4.3.2. Fingerprint .........................................7 4.3.3. Options .............................................7 4.3.3.1. Hostname ...................................8 4.3.3.2. Accepts Ancillary Data .....................8 4.3.3.3. Extra Randomness ...........................8 4.3.3.4. Supported Ephemeral Diffie-Hellman Group ...9 4.3.3.5. Static Diffie-Hellman Public Key ...........9 4.3.4. Authenticity .......................................10 4.3.5. Signing and Verifying Messages .....................10 4.3.5.1. Options ...................................11 4.3.5.1.1. Simple Password ................11 4.3.6. Glare Resolution ...................................13 4.3.7. Session Override ...................................13 4.4. Endpoint Discriminators ...................................13 4.4.1. Format .............................................14 4.4.2. Options ............................................14 4.4.2.1. Required Hostname .........................15 4.4.2.2. Ancillary Data ............................15 4.4.2.3. Fingerprint ...............................16 4.4.3. Certificate Selection ..............................16 4.4.4. Canonical Endpoint Discriminator ...................17 4.5. Session Keying Components .................................18 4.5.1. Format .............................................19 4.5.2. Options ............................................19 4.5.2.1. Ephemeral Diffie-Hellman Public Key .......20 4.5.2.2. Extra Randomness ..........................20 4.5.2.3. Diffie-Hellman Group Select ...............21 4.5.2.4. HMAC Negotiation ..........................21 4.5.2.5. Session Sequence Number Negotiation .......22 4.6. Session Key Computation ...................................23 4.6.1. Public Key Selection ...............................23Show full document text