Skip to main content

Completely Encrypting RTP Header Extensions and Contributing Sources
RFC 9335

Revision differences

Document history

Date Rev. By Action
2023-01-25
08 (System)
Received changes through RFC Editor sync (created alias RFC 9335, changed abstract to 'While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the …
Received changes through RFC Editor sync (created alias RFC 9335, changed abstract to 'While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.

This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.', changed pages to 21, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2023-01-25, changed IESG state to RFC Published, created updates relation between draft-ietf-avtcore-cryptex and RFC 3711)
2023-01-25
08 (System) RFC published
2023-01-23
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-11-08
08 (System) RFC Editor state changed to AUTH48
2022-10-28
08 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-09-30
08 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2022-09-30
08 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2022-09-30
08 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-09-30
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-09-29
08 Bernard Aboba Removed from session: interim-2022-avtcore-03
2022-09-28
08 (System) RFC Editor state changed to EDIT
2022-09-28
08 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-09-28
08 (System) Announcement was received by RFC Editor
2022-09-28
08 (System) IANA Action state changed to In Progress
2022-09-28
08 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-09-28
08 Cindy Morgan IESG has approved the document
2022-09-28
08 Cindy Morgan Closed "Approve" ballot
2022-09-28
08 Cindy Morgan Ballot approval text was generated
2022-09-28
08 Murray Kucherawy IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-09-20
08 Bernard Aboba Added to session: interim-2022-avtcore-03
2022-08-29
08 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss
2022-08-19
08 Paul Wouters
[Ballot comment]
Thanks for addressing my DISCUSS in -08. I have changed my ballot to No Objection.

Old DISCUSS:


Thanks for this document. It is …
[Ballot comment]
Thanks for addressing my DISCUSS in -08. I have changed my ballot to No Objection.

Old DISCUSS:


Thanks for this document. It is clear, and I appreciate reading the rationale of the proposed solution. Just one discuss item:

  Peers MAY negotiate both Cryptex and the header extension mechanism
  defined in [RFC6904] via signaling, and if both mechanisms are
  supported, either one can be used for any given packet.  However, if
  a packet is encrypted with Cryptex, it MUST NOT also use [RFC6904]
  header extension encryption, and vice versa.

Why this complexity? Based on the Section 1, Cryptex is much more preferred.
Why allow "either one can be used for any given packet" instead of saying
if both are negotiated, Cryptex SHOULD be used? Or why not stronger, if
both peers support Cryptex, RFC6904 SHOULD NOT (MUST NOT?) be used?

COMMENTS:



The Shepherds write-up with respect to IPR shows two authors confirming they
have filed "all required disclosures" but does not list whether this
means "there are non", "there are some, compatible with IETF" or that
there is "disclosed, incompatible with IETF". The Shepherds write up
does state no disclosures are filed. I find the two authors' response a
bit odd.

Section 1.2 describes a problem of "using a few more bytes", but how is that
a real problem? Does it really matter? The other reasons stated seem
real issues to me but the "few more bytes" seems fairly harmless?

        we felt

Who or what is "we"? Probably rewrite to "It was considered" or something?

  Alternatively, if the implementation considers the use of this
  specification mandatory and the "defined by profile" field does not
  match one of the values defined above, it SHOULD stop the processing
  of the RTP packet and report an error for the RTP stream.

Why is this not a MUST stop ? If it is mandatory, what is an example
where it can continue processing an RTP packet without the mandatory requirement?

It seems Section 3 could be just a last paragraph of the Introduction?

Nits:

Section 1.1 first line misses "(SRTP)" acronym

CSRC not expanded before first use.

Section 1.2  "RFC6904" is not properly linked

Section 4's title could be improved, eg "Signaling of Cryptex Support"

Section 4's opening line could be simplified eg:

  Cryptex support is indicated via the new "a=cryptex" Session
  Description Protocol (SDP) attribute.

SDP not expanded on first use

BUNDLE is not expanded (or linked to a reference) on first use.

[RFC8285] in Section 5 is not a proper link

I personally dislike "+-+-+-+-+-+-+-+-+-+-+-+-+-+-+" and prefer the
less christmas tree "+------+----------+" style diagram :)
2022-08-19
08 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to No Objection from Discuss
2022-08-09
08 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2022-08-09
08 Amanda Baber IANA Experts State changed to Expert Reviews OK from Issues identified
2022-08-09
08 Amanda Baber Expert questions have been answered (reference has been updated, media- and session-level selected).
2022-08-04
08 (System) Removed all action holders (IESG state changed)
2022-08-04
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-08-04
08 Sergio Garcia Murillo New version available: draft-ietf-avtcore-cryptex-08.txt
2022-08-04
08 (System) New version approved
2022-08-04
08 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2022-08-04
08 Sergio Garcia Murillo Uploaded new revision
2022-08-03
07 Murray Kucherawy Changed action holders to Cullen Jennings, Justin Uberti, Sergio Garcia Murillo
2022-07-28
07 (System) Changed action holders to Cullen Jennings, Murray Kucherawy, Justin Uberti, Sergio Garcia Murillo (IESG state changed)
2022-07-28
07 Murray Kucherawy IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup
2022-07-25
07 Roman Danyliw [Ballot comment]
Thank you to Rifaat Shekh-Yusef for the SECDIR review.

Thank you for addressing my COMMENTS and DISCUSS feedback.
2022-07-25
07 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2022-07-24
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2022-07-24
07 Sergio Garcia Murillo New version available: draft-ietf-avtcore-cryptex-07.txt
2022-07-24
07 (System) New version approved
2022-07-24
07 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2022-07-24
07 Sergio Garcia Murillo Uploaded new revision
2022-06-30
06 Bernard Aboba Added to session: IETF-114: avtcore  Thu-1330
2022-06-16
06 Cindy Morgan IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation
2022-06-16
06 Francesca Palombini [Ballot comment]
Thank you for the work on this document.

Many thanks to Henry Thompson for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/xWXqmu5iN2hSwZMs4ZKHpvUg-QE/.

Francesca
2022-06-16
06 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2022-06-16
06 Lars Eggert
[Ballot discuss]
# GEN AD review of draft-ietf-avtcore-cryptex-06

CC @larseggert

Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/OSDyO_tiu5StDZyyJjwRP-Nvj-M). …
[Ballot discuss]
# GEN AD review of draft-ietf-avtcore-cryptex-06

CC @larseggert

Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/OSDyO_tiu5StDZyyJjwRP-Nvj-M).

## Discuss

### IANA

This document seems to have unresolved IANA issues. Holding a DISCUSS
until we can confirm on the telechat that a resolution is in progress.
2022-06-16
06 Lars Eggert
[Ballot comment]
## Comments

### Section 1.2, paragraph 1
```
    [RFC6904] was proposed in 2013 as a solution to the problem …
[Ballot comment]
## Comments

### Section 1.2, paragraph 1
```
    [RFC6904] was proposed in 2013 as a solution to the problem of
    unprotected header extension values.  However, it has not seen
    significant adoption, and has a few technical shortcomings.
```
Would it be time to deprecate 6904? (Also see Paul's DISCUSS and Alavaro's
comment.)

### Inclusive language

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term `master`; alternatives might be `active`, `central`, `initiator`,
  `leader`, `main`, `orchestrator`, `parent`, `primary`, `server`

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Section 5.1, paragraph 1
```
    When the mechanism defined by this specification has been negotiated,
    sending a RTP packet that has any CSRCs or contains any {RFC8285}}
    header extensions follows the steps below.  This mechanism MUST NOT
    be used with header extensions other than the [RFC8285] variety.
```
Likely Markdown nit: {RFC8285}}

### Outdated references

Reference `[RFC4566]` to `RFC4566`, which was obsoleted by `RFC8866` (this may
be on purpose).

### Grammar/style

#### Section 5, paragraph 0
```
fication has been negotiated, sending a RTP packet that has any CSRCs or cont
                                      ^
```
Use "an" instead of "a" if the following word starts with a vowel sound, e.g.
"an article", "an hour".

#### Section 5.1, paragraph 4
```
ecryption Procedure, and passed to the the next layer to process the packet a
                                  ^^^^^^^
```
Possible typo: you repeated a word.

#### Section 6.2, paragraph 9
```
ence number and SSRC identifier. Accordingly these values are also not encryp
                                ^^^^^^^^^^^
```
A comma may be missing after the conjunctive/linking adverb "Accordingly".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2022-06-16
06 Lars Eggert Ballot comment and discuss text updated for Lars Eggert
2022-06-16
06 Lars Eggert
[Ballot discuss]
This document seems to have unresolved IANA issues. Holding a DISCUSS
until we can confirm on the telechat that a resolution is in …
[Ballot discuss]
This document seems to have unresolved IANA issues. Holding a DISCUSS
until we can confirm on the telechat that a resolution is in progress.
2022-06-16
06 Lars Eggert
[Ballot comment]
Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/OSDyO_tiu5StDZyyJjwRP-Nvj-M).

-------------------------------------------------------------------------------
COMMENT
-------------------------------------------------------------------------------

Section 1.2, paragraph 1
>  …
[Ballot comment]
Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/OSDyO_tiu5StDZyyJjwRP-Nvj-M).

-------------------------------------------------------------------------------
COMMENT
-------------------------------------------------------------------------------

Section 1.2, paragraph 1
>    [RFC6904] was proposed in 2013 as a solution to the problem of
>    unprotected header extension values.  However, it has not seen
>    significant adoption, and has a few technical shortcomings.


Would it be time to deprecate 6904? (Also see Paul's DISCUSS and Alavaro's
comment.)

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term "master"; alternatives might be "active", "central", "initiator",
  "leader", "main", "orchestrator", "parent", "primary", "server"

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 5.1, paragraph 1
>    When the mechanism defined by this specification has been negotiated,
>    sending a RTP packet that has any CSRCs or contains any {RFC8285}}
>    header extensions follows the steps below.  This mechanism MUST NOT
>    be used with header extensions other than the [RFC8285] variety.


Likely Markdown nit: {RFC8285}}

Reference [RFC4566] to RFC4566, which was obsoleted by RFC8866 (this may be on
purpose).

Section 5, paragraph 0
> fication has been negotiated, sending a RTP packet that has any CSRCs or cont
>                                      ^
Use "an" instead of "a" if the following word starts with a vowel sound, e.g.
"an article", "an hour".

Section 5.1, paragraph 4
> ecryption Procedure, and passed to the the next layer to process the packet a
>                                    ^^^^^^^
Possible typo: you repeated a word.

Section 6.2, paragraph 9
> ence number and SSRC identifier. Accordingly these values are also not encryp
>                                  ^^^^^^^^^^^
A comma may be missing after the conjunctive/linking adverb "Accordingly".
2022-06-16
06 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert
2022-06-16
06 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2022-06-15
06 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2022-06-15
06 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this important specification. I just wish if we could provide more stronger specification and don't allow the mix of …
[Ballot comment]
Thanks for working on this important specification. I just wish if we could provide more stronger specification and don't allow the mix of cryptex with other not so secure exiting solutions.

I have some comments/suggestions/questions -

- the shepherd's write-up says there is not IPR declarations but https://datatracker.ietf.org/ipr/search/?submit=draft&id=draft-ietf-avtcore-cryptex return two hits on IPR declarations. The write up should be updated, was the WG not aware of these IPRs?

- section 1.1 : it says -
               
        "Accordingly, these identifiers can be considered a fingerprinting issue."

    is there any analysis of this claim that can be referred to?"

- section 1.3 : it says -

        "While we considered possible solutions that would have encrypted more of the RTP header (e.g., the number of CSRCs), we felt the inability to parse the resultant packets with current tools, as well as additional complexity incurred, outweighed the slight improvement in confidentiality"

    if I have understood it correctly, I would suggest to rewrite this to something like -

        While considering the possible solutions that would have encrypted more of the RTP header (e.g., the number of CSRCs), lack of support on current tools was inevitable and the additional complexity outweighed the slight improvement in confidentiality by fixing previous solutions. Hence, new approach was needed to solve the described problem in section 1.1.
2022-06-15
06 Zaheduzzaman Sarker Ballot comment text updated for Zaheduzzaman Sarker
2022-06-15
06 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this important specification. I just wish if we could provide more stronger specification and don't allow the mix of …
[Ballot comment]
Thanks for working on this important specification. I just wish if we could provide more stronger specification and don't allow the mix of cryptex with other not so secure exiting solutions.

I have some comments/suggestions -

- the shepherd's write-up says there is not IPR declarations but https://datatracker.ietf.org/ipr/search/?submit=draft&id=draft-ietf-avtcore-cryptex return two hits on IPR declarations. The write up should be updated, was the WG not aware of these IPRs?

- section 1.1 : it says -
               
        "Accordingly, these identifiers can be considered a fingerprinting issue."

    is there any analysis of this claim that can be referred to?"

- section 1.3 : it says -

        "While we considered possible solutions that would have encrypted more of the RTP header (e.g., the number of CSRCs), we felt the inability to parse the resultant packets with current tools, as well as additional complexity incurred, outweighed the slight improvement in confidentiality"

    if I have understood it correctly, I would suggest to rewrite this to something like -

        While considering the possible solutions that would have encrypted more of the RTP header (e.g., the number of CSRCs), lack of support on current tools was inevitable and the additional complexity outweighed the slight improvement in confidentiality by fixing previous solutions. Hence, new approach was needed to solve the described problem in section 1.1.
2022-06-15
06 Zaheduzzaman Sarker [Ballot Position Update] New position, Yes, has been recorded for Zaheduzzaman Sarker
2022-06-15
06 Amanda Baber IANA Review state changed to IANA - Not OK from Version Changed - Review Needed
2022-06-15
06 Amanda Baber
Questions from the attribute-name expert:

Section 4, 2nd paragraph
- Why are they referencing the obsolete RFC 4566 here instead of RFC 8866 ?

Section …
Questions from the attribute-name expert:

Section 4, 2nd paragraph
- Why are they referencing the obsolete RFC 4566 here instead of RFC 8866 ?

Section 4, 2nd paragraph
- It says the the attribute "can be used at the session level or media level", however the IANA registration in Section 9.1 says it can only be used at the media-level. Which way is it ?

Once these are resolved, the registration is good to proceed.
2022-06-15
06 Amanda Baber IANA Experts State changed to Issues identified from Reviews assigned
2022-06-15
06 Alvaro Retana
[Ballot comment]
I support Paul's DISCUSS.

I believe that this document should formally Update rfc3711.  The mechanism described here is a replacement for what …
[Ballot comment]
I support Paul's DISCUSS.

I believe that this document should formally Update rfc3711.  The mechanism described here is a replacement for what rfc6904 defined.  That original mechanism was tagged as formally Updating rfc3711 -- this work should also be tagged that way.
2022-06-15
06 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-06-15
06 Paul Wouters
[Ballot discuss]
Thanks for this document. It is clear, and I appreciate reading the rationale of the proposed solution. Just one discuss item:

  Peers …
[Ballot discuss]
Thanks for this document. It is clear, and I appreciate reading the rationale of the proposed solution. Just one discuss item:

  Peers MAY negotiate both Cryptex and the header extension mechanism
  defined in [RFC6904] via signaling, and if both mechanisms are
  supported, either one can be used for any given packet.  However, if
  a packet is encrypted with Cryptex, it MUST NOT also use [RFC6904]
  header extension encryption, and vice versa.

Why this complexity? Based on the Section 1, Cryptex is much more preferred.
Why allow "either one can be used for any given packet" instead of saying
if both are negotiated, Cryptex SHOULD be used? Or why not stronger, if
both peers support Cryptex, RFC6904 SHOULD NOT (MUST NOT?) be used?
2022-06-15
06 Paul Wouters
[Ballot comment]
The Shepherds write-up with respect to IPR shows two authors confirming they
have filed "all required disclosures" but does not list whether this …
[Ballot comment]
The Shepherds write-up with respect to IPR shows two authors confirming they
have filed "all required disclosures" but does not list whether this
means "there are non", "there are some, compatible with IETF" or that
there is "disclosed, incompatible with IETF". The Shepherds write up
does state no disclosures are filed. I find the two authors' response a
bit odd.

Section 1.2 describes a problem of "using a few more bytes", but how is that
a real problem? Does it really matter? The other reasons stated seem
real issues to me but the "few more bytes" seems fairly harmless?

        we felt

Who or what is "we"? Probably rewrite to "It was considered" or something?

  Alternatively, if the implementation considers the use of this
  specification mandatory and the "defined by profile" field does not
  match one of the values defined above, it SHOULD stop the processing
  of the RTP packet and report an error for the RTP stream.

Why is this not a MUST stop ? If it is mandatory, what is an example
where it can continue processing an RTP packet without the mandatory requirement?

It seems Section 3 could be just a last paragraph of the Introduction?

Nits:

Section 1.1 first line misses "(SRTP)" acronym

CSRC not expanded before first use.

Section 1.2  "RFC6904" is not properly linked

Section 4's title could be improved, eg "Signaling of Cryptex Support"

Section 4's opening line could be simplified eg:

  Cryptex support is indicated via the new "a=cryptex" Session
  Description Protocol (SDP) attribute.

SDP not expanded on first use

BUNDLE is not expanded (or linked to a reference) on first use.

[RFC8285] in Section 5 is not a proper link

I personally dislike "+-+-+-+-+-+-+-+-+-+-+-+-+-+-+" and prefer the
less christmas tree "+------+----------+" style diagram :)
2022-06-15
06 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2022-06-14
06 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2022-06-14
06 Roman Danyliw
[Ballot discuss]
I’m having trouble understanding the relationship between this work and SRTP without making assumptions.  Section 1.3 notes that there is a design goal …
[Ballot discuss]
I’m having trouble understanding the relationship between this work and SRTP without making assumptions.  Section 1.3 notes that there is a design goal to build on top of SRTP and to have simple SRTP interactions.  Section 3 also says the design goal is to “reuse the existing SRTP framework.”  Finally, Section 6.2 and 6.3 says ”[t]he encryption (or decryption) procedure is identical to that of [RFC3711] except for the Encrypted Portion of the SRTP packet.”

I believe the correct read is that “do everything from SRTP unless noted as different here”.  However, saying “encryption and description procedures" per Sections 6.2/6.3 doesn’t capture that for me.  This leaves open questions about key management, establish and maintaining state for cryptographic contexts, MTI algorithms, etc.

The text would benefit from being explicit on what behavior “a=cryptex” behavior reuses from SRTP.  I don’t believe that changes any of the expected core mechanics.
2022-06-14
06 Roman Danyliw
[Ballot comment]
Thank you to Rifaat Shekh-Yusef for the SECDIR review.

** Section 6.2.  What does the notation “_4*CC_ bytes of the ciphertext …” mean? …
[Ballot comment]
Thank you to Rifaat Shekh-Yusef for the SECDIR review.

** Section 6.2.  What does the notation “_4*CC_ bytes of the ciphertext …” mean?

** Section 6.2.

Implementations can rearrange a packet so that the AAD and plaintext
  are contiguous by swapping the order of the extension header and the
  CSRC identifiers, resulting in an intermediate representation of the
  form shown in Figure 2.

Where would this intermediate representation be used?  To double check, this would not be put on the wire?

** Section 8.  On MTI/optional/default transforms, does this document want to change anything from what was said in RFC3711

-- Should something be said about AES-GCM per RFC7714, especially since it was listed as an example.

-- Assuming this document inherits the MTI transforms for SRTP, please explicitly call out the dangers using NULL transform.

** Section 8.  Does any subset of the Security Considerations of RFC3711 apply here?

** A.1.  Cite AES-CTR per RFC3711.

** A.2.  Cite AES-GCM per RFC7714

Nits
** Section 5.1.  Typo.  There is a markdown typo of “{RFC8285}}” (i.e., single open brace) which is preventing the rendering this reference correctly in the first sentence.

** Section 5.2. Typo. s/the the/the/
2022-06-14
06 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2022-06-13
06 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2022-06-13
06 Warren Kumari
[Ballot comment]
Thank you for writing this document; like Rob I'm far from an RTP expert, but I also found it readable and useful.



I …
[Ballot comment]
Thank you for writing this document; like Rob I'm far from an RTP expert, but I also found it readable and useful.



I do have a question, as well as some nits to try and make if even better.

Question:
"[RFC8285] defines two values for the "defined by profile" field for carrying one-byte and two-byte header extensions." - RFC8285 defines 0XBEDE, and has a cute justification. This document defines 0xCODE and 0XC2DE... but it was quite hard to figure out what the *other* value that RFC8285 defined -- and that's my issue. Should this document create an IANA registry to track these? Is there already a registry? E.g: If I magically become an RTP expert and write draft-ietf-avtcode-even-more-awesome-protocol how do I know not to use any of these existing numbers?



1: "If BUNDLE is in use and the a=cryptex attribute" - in all of the other instances where you have 'a=cryptex', you have it enclosed in double-quotes. I suggest doing so here too for consistency.

2: Section 5.1: "When the mechanism defined by this specification has been negotiated, sending a RTP packet that has any CSRCs or contains any {RFC8285}} header extensions follows the steps below." - something went kablooie in your formatting / markdown / kramdown / whatever and you have an extra '}' breaking the reference...

3: I got confused when reading "Note that the 4 bytes at the start of the extension block are not encrypted, as required by [RFC8285]." - it seemed ambiguous to me. I'd suggest "Note that, as required by [RFC8285], the 4 bytes at the start of the extension block are not encrypted."

I did already mention that these are nits -- this comes from 'nitpick', which dictionary.com says is "to be excessively concerned with or critical of inconsequential details." -- feel free to ignore them :-)
2022-06-13
06 Warren Kumari Ballot comment text updated for Warren Kumari
2022-06-13
06 Warren Kumari
[Ballot comment]
Thank you for writing this document; like Rob I'm far from an RTP expert, but I also found it readable and useful.



I …
[Ballot comment]
Thank you for writing this document; like Rob I'm far from an RTP expert, but I also found it readable and useful.



I do have a question, as well as some nits to try and make if even better.

Question:
"[RFC8285] defines two values for the "defined by profile" field for carrying one-byte and two-byte header extensions." - RFC8285 defines 0XBEDE, and has a cute justification. This document defines 0xCODE and 0XC2DE... but it was quite hard to figure out what the *other* value that RFC8285 defined -- and that's my issue. Should this document create an IANA registry to track these? Is there already a registry? E.g: If I magically become an RTP expert and write draft-ietf-avtcode-even-more-awesome-protocol how do I know not to use any of these existing numbers?



1: "If BUNDLE is in use and the a=cryptex attribute" - in all of the other instances where you have 'a=cryptex', you have it enclosed in double-quotes. I suggest doing so here too for consistency.

2: Section 5.1: "When the mechanism defined by this specification has been negotiated, sending a RTP packet that has any CSRCs or contains any {RFC8285}} header extensions follows the steps below." - something went kablooie in your formatting / markdown / kramdown / whatever and you have an extra '}' breaking the reference...

3: I got confused when reading "Note that the 4 bytes at the start of the extension block are not encrypted, as required by [RFC8285]." - it seemed ambiguous to me. I'd suggest "Note that, as required by [RFC8285], the 4 bytes at the start of the extension block are not encrypted."

I did already mention that these are nits -- this comes from 'nitpick', which dictionary.com says is "to be excessively concerned with or critical of inconsequential details." -- feel free to ignore them at will :-)
2022-06-13
06 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2022-06-13
06 Robert Wilton
[Ballot comment]
Hi,

I don't know RTP at all, but found that document very clear and easy to read, so thank you for that.

Only …
[Ballot comment]
Hi,

I don't know RTP at all, but found that document very clear and easy to read, so thank you for that.

Only one trivial comment:

  If the packet contains solely one-byte extension ids, the 16-bit RTP
  header extension tag MUST be set to 0xC0DE to indicate that the
  encryption has been applied, and the one-byte framing is being used.
  If the packet contains only two-byte extension ids, the header
  extension tag MUST be set to 0xC2DE to indicate encryption has been
  applied, and the two-byte framing is being used.

This text doesn't say what to do if the packet contained a mix of 1 and 2 byte extension-ids.  My presumption is that this isn't allowed.  I will leave it to the authors to decide whether to clarify this, but acknowledge that it may be obvious to everyone familiar with RTP ...

Regards,
Rob
2022-06-13
06 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2022-06-09
06 Amanda Baber IANA Experts State changed to Reviews assigned
2022-06-06
06 Murray Kucherawy [Ballot comment]
I have requested an SDP Directorate review, and will make sure that feedback gets addressed.
2022-06-06
06 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2022-06-06
06 Cindy Morgan Placed on agenda for telechat - 2022-06-16
2022-06-06
06 Murray Kucherawy Ballot has been issued
2022-06-06
06 Murray Kucherawy [Ballot Position Update] New position, Yes, has been recorded for Murray Kucherawy
2022-06-06
06 Murray Kucherawy Created "Approve" ballot
2022-06-06
06 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2022-06-06
06 Murray Kucherawy IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2022-06-06
06 Murray Kucherawy Ballot writeup was changed
2022-06-06
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-06-06
06 Sergio Garcia Murillo New version available: draft-ietf-avtcore-cryptex-06.txt
2022-06-06
06 (System) New version approved
2022-06-06
06 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2022-06-06
06 Sergio Garcia Murillo Uploaded new revision
2022-05-02
05 Bernard Aboba Added to session: interim-2022-avtcore-02
2022-04-07
Tina Dang Posted related IPR disclosure Qualcomm Incorporated's Statement about IPR related to draft-ietf-avtcore-cryptex
2022-04-07
Tina Dang Posted related IPR disclosure Qualcomm Incorporated's Statement about IPR related to draft-ietf-avtcore-cryptex
2022-04-06
05 Murray Kucherawy Changed action holders to Bernard Aboba, Jonathan Lennox, Cullen Jennings, Justin Uberti, Sergio Garcia Murillo
2022-04-06
05 Murray Kucherawy Feedback from GENART, ARTART, and SECDIR needs to be reviewed.
2022-04-06
05 Murray Kucherawy IESG state changed to Waiting for AD Go-Ahead::AD Followup from Waiting for Writeup
2022-04-05
05 Linda Dunbar Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Linda Dunbar. Sent review to list.
2022-04-05
05 Henry Thompson Request for Last Call review by ARTART Completed: Almost Ready. Reviewer: Henry Thompson. Sent review to list.
2022-04-05
05 (System) IESG state changed to Waiting for Writeup from In Last Call
2022-04-01
05 Rifaat Shekh-Yusef Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Rifaat Shekh-Yusef. Sent review to list.
2022-03-22
05 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2022-03-22
05 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-avtcore-cryptex-05. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-avtcore-cryptex-05. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete.

In the media registry on the Session Description Protocol (SDP) Parameters registry page located at:

https://www.iana.org/assignments/sdp-parameters/

a new registration will be made as follows:

Type: media
SDP Name: cryptex
Reference: [ RFC-to-be ]

The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Lead IANA Services Specialist
2022-03-20
05 Bernard Aboba Added to session: IETF-113: avtcore  Fri-1000
2022-03-18
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2022-03-18
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2022-03-17
05 Jean Mahoney Request for Last Call review by GENART is assigned to Linda Dunbar
2022-03-17
05 Jean Mahoney Request for Last Call review by GENART is assigned to Linda Dunbar
2022-03-16
05 Barry Leiba Request for Last Call review by ARTART is assigned to Henry Thompson
2022-03-16
05 Barry Leiba Request for Last Call review by ARTART is assigned to Henry Thompson
2022-03-15
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tianran Zhou
2022-03-15
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tianran Zhou
2022-03-15
05 Cindy Morgan IANA Review state changed to IANA - Review Needed
2022-03-15
05 Cindy Morgan
The following Last Call announcement was sent out (ends 2022-04-05):

From: The IESG
To: IETF-Announce
CC: avt@ietf.org, avtcore-chairs@ietf.org, bernard.aboba@gmail.com, draft-ietf-avtcore-cryptex@ietf.org, superuser@gmail.com …
The following Last Call announcement was sent out (ends 2022-04-05):

From: The IESG
To: IETF-Announce
CC: avt@ietf.org, avtcore-chairs@ietf.org, bernard.aboba@gmail.com, draft-ietf-avtcore-cryptex@ietf.org, superuser@gmail.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Completely Encrypting RTP Header Extensions and Contributing Sources) to Proposed Standard


The IESG has received a request from the Audio/Video Transport Core
Maintenance WG (avtcore) to consider the following document: - 'Completely
Encrypting RTP Header Extensions and Contributing Sources'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2022-04-05. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  While the Secure Real-time Transport Protocol (SRTP) provides
  confidentiality for the contents of a media packet, a significant
  amount of metadata is left unprotected, including RTP header
  extensions and contributing sources (CSRCs).  However, this data can
  be moderately sensitive in many applications.  While there have been
  previous attempts to protect this data, they have had limited
  deployment, due to complexity as well as technical limitations.

  This document defines Cryptex as a new mechanism that completely
  encrypts header extensions and CSRCs and uses simpler signaling with
  the goal of facilitating deployment.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-avtcore-cryptex/



No IPR declarations have been submitted directly on this I-D.




2022-03-15
05 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2022-03-15
05 Cindy Morgan Last call announcement was changed
2022-03-15
05 Cindy Morgan Last call announcement was generated
2022-03-14
05 Murray Kucherawy Last call was requested
2022-03-14
05 Murray Kucherawy Ballot approval text was generated
2022-03-14
05 Murray Kucherawy Ballot writeup was generated
2022-03-14
05 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2022-03-14
05 Murray Kucherawy IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2022-03-14
05 Murray Kucherawy Last call announcement was generated
2022-03-07
05 Sergio Garcia Murillo New version available: draft-ietf-avtcore-cryptex-05.txt
2022-03-07
05 (System) New version approved
2022-03-07
05 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2022-03-07
05 Sergio Garcia Murillo Uploaded new revision
2022-03-07
04 (System) Removed all action holders (IESG state changed)
2022-03-07
04 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-03-07
04 Sergio Garcia Murillo New version available: draft-ietf-avtcore-cryptex-04.txt
2022-03-07
04 (System) New version approved
2022-03-07
04 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2022-03-07
04 Sergio Garcia Murillo Uploaded new revision
2022-02-14
03 Bernard Aboba Added to session: interim-2022-avtcore-01
2021-12-15
03 Murray Kucherawy IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2021-12-03
03 Bernard Aboba AD review: https://mailarchive.ietf.org/arch/msg/avt/ToXISX_CQ7B7--IdkE-TPb6VhFo/
2021-12-03
03 Bernard Aboba Tag Revised I-D Needed - Issue raised by AD set. Tag Revised I-D Needed cleared.
2021-11-29
03 Murray Kucherawy Changed action holders to Cullen Jennings, Justin Uberti, Sergio Garcia Murillo
2021-11-18
03 (System) Changed action holders to Cullen Jennings, Murray Kucherawy, Justin Uberti, Sergio Garcia Murillo (IESG state changed)
2021-11-18
03 Murray Kucherawy IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2021-11-12
03 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2021-11-12
03 Murray Kucherawy IESG state changed to AD Evaluation from Publication Requested
2021-11-05
03 Bernard Aboba
Request for Publication
November 5, 2021

Document:  Completely Encrypting RTP Header Extensions and Contributing Sources
Link: https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-cryptex
Intended Status: Proposed Standard
Document Shepard: Bernard Aboba …
Request for Publication
November 5, 2021

Document:  Completely Encrypting RTP Header Extensions and Contributing Sources
Link: https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-cryptex
Intended Status: Proposed Standard
Document Shepard: Bernard Aboba
WG: AVTCORE

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)?
Why is this the proper type of RFC? Is this type of RFC indicated in the title page header?

Publication as a Proposed Standard is requested.

(2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections:

Technical Summary:

  While the Secure Real-time Transport Protocol (SRTP) provides
  confidentiality for the contents of a media packet, a significant
  amount of metadata is left unprotected, including RTP header
  extensions and contributing sources (CSRCs). While there have been
  previous attempts to protect this data, they have had limited
  deployment, due to complexity as well as technical limitations.

  This document defines Cryptex as a new mechanism that completely
  encrypts header extensions and CSRCs and uses simpler signaling with
  the goal of facilitating deployment.

Working Group Summary:

RTP header extensions contain information that can be considered
sensitive from a privacy perspective, such as audio levels
and video content types.

RFC 6904, the initial attempt at protecting RTP header extensions,
has not been (correctly) implemented in a widespread way. RFC 6904
requires implementations to offer extensions in both encrypted/unencrypted
forms, with negotiation of encryption for each extension and resulting
SDP bloat (since every extmap requires 2 lines). The complexity has
hindered adoption of RFC 6904, with bugs in implementations such as
libsrtp going undetected for 5+ years.

Since RFC 6904 only encrypts the body of RTP header extensions, but
not the ID or length fields, even when successfully negotiated it
reveals significant information about the application. In addition
RFC 6904 does not protect RTP header fields such as contributing
sources (CSRCs).

As a result, WG consensus was that a new approach was needed.
Cryptex simplifies the deployment model by encrypting RTP
header extensions as a block as well as increasing the scope of
protection to include CSRCs.

Recent discussion with the AVTCORE WG have centered on
clarifying and reducing the complexity of Session
Description Protocol (SDP) negotiation.

Document Quality:

There are two known implementations: one in Jitsi, as well as a PR for
libsrtp which has not yet been merged. The implementations have been
checked against test vectors. A proposal for adding support within the
WebRTC API is under development.

Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

Bernard Aboba is the Document Shepard. Responsible AD is Murray Kutcheraway.

(3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG.

The Document Shepard has reviewed the document as part of WGLC, and made comments that were subsequently addressed by the authors.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?

Recent WG discussion has centered on the SDP section, so this may deserve further scrutiny.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

Additional review by the SDP Directorate may be helpful.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

No concerns.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes.

Cullen Jennings: https://mailarchive.ietf.org/arch/msg/avt/zgLFBTqUca4b8ARwFJnXJOF-1Cw/
Sergio Garcia Murillo: https://mailarchive.ietf.org/arch/msg/avt/E9unITw6snUlQwtvHZYReGKk5Gg/
Justin Uberti: https://mailarchive.ietf.org/arch/msg/avt/IO_3J21OrD2wCVXFxv5zrXwg8ik/

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

No disclosures.

(9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The WG has multiple participants who have been involved in the development of cryptex, as well as implementation of RFC 6904.

The consensus in favor of the document appears solid.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.)

There have been no heated discussions or indication of extreme (or even mild) discontent. No threats of an appeal.

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

  Checking boilerplate required by RFC 5378 and the IETF Trust (see
  https://trustee.ietf.org/license-info):
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt:
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to https://www.ietf.org/id-info/checklist :
  ----------------------------------------------------------------------------

    No issues found here.

  Miscellaneous warnings:
  ----------------------------------------------------------------------------

  -- The document date (25 October 2021) is 10 days in the past.  Is this
    intentional?


  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

    (See RFCs 3967 and 4897 for information about using normative references
    to lower-maturity documents in RFCs)

  ** Obsolete normative reference: RFC 4566 (Obsoleted by RFC 8866)


    Summary: 1 error (**), 0 flaws (~~), 0 warnings (==), 1 comment (--).

--------------------------------------------------------------------------------


(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

The document does not appear to require any formal reviews (e.g. no MIB or YANG modules, or media type/URI type definitions). 

(13) Have all references within this document been identified as either normative or informative?

References are separated into normative and informative categories.

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No changes to the status of existing RFCs.  This document does not obsolete RFC 6904.

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

I have reviewed the IANA Considerations, Section 9.

(18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

No IANA registries are created.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

No formal languages.

(20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No YANG modules.
2021-11-05
03 Bernard Aboba Responsible AD changed to Murray Kucherawy
2021-11-05
03 Bernard Aboba IETF WG state changed to Submitted to IESG for Publication from WG Document
2021-11-05
03 Bernard Aboba IESG state changed to Publication Requested from I-D Exists
2021-11-05
03 Bernard Aboba IESG process started in state Publication Requested
2021-11-05
03 Bernard Aboba
Request for Publication
November 5, 2021

Document:  Completely Encrypting RTP Header Extensions and Contributing Sources
Link: https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-cryptex
Intended Status: Proposed Standard
Document Shepard: Bernard Aboba …
Request for Publication
November 5, 2021

Document:  Completely Encrypting RTP Header Extensions and Contributing Sources
Link: https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-cryptex
Intended Status: Proposed Standard
Document Shepard: Bernard Aboba
WG: AVTCORE

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)?
Why is this the proper type of RFC? Is this type of RFC indicated in the title page header?

Publication as a Proposed Standard is requested.

(2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections:

Technical Summary:

  While the Secure Real-time Transport Protocol (SRTP) provides
  confidentiality for the contents of a media packet, a significant
  amount of metadata is left unprotected, including RTP header
  extensions and contributing sources (CSRCs). While there have been
  previous attempts to protect this data, they have had limited
  deployment, due to complexity as well as technical limitations.

  This document defines Cryptex as a new mechanism that completely
  encrypts header extensions and CSRCs and uses simpler signaling with
  the goal of facilitating deployment.

Working Group Summary:

RTP header extensions contain information that can be considered
sensitive from a privacy perspective, such as audio levels
and video content types.

RFC 6904, the initial attempt at protecting RTP header extensions,
has not been (correctly) implemented in a widespread way. RFC 6904
requires implementations to offer extensions in both encrypted/unencrypted
forms, with negotiation of encryption for each extension and resulting
SDP bloat (since every extmap requires 2 lines). The complexity has
hindered adoption of RFC 6904, with bugs in implementations such as
libsrtp going undetected for 5+ years.

Since RFC 6904 only encrypts the body of RTP header extensions, but
not the ID or length fields, even when successfully negotiated it
reveals significant information about the application. In addition
RFC 6904 does not protect RTP header fields such as contributing
sources (CSRCs).

As a result, WG consensus was that a new approach was needed.
Cryptex simplifies the deployment model by encrypting RTP
header extensions as a block as well as increasing the scope of
protection to include CSRCs.

Recent discussion with the AVTCORE WG have centered on
clarifying and reducing the complexity of Session
Description Protocol (SDP) negotiation.

Document Quality:

There are two known implementations: one in Jitsi, as well as a PR for
libsrtp which has not yet been merged. The implementations have been
checked against test vectors. A proposal for adding support within the
WebRTC API is under development.

Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

Bernard Aboba is the Document Shepard. Responsible AD is Murray Kutcheraway.

(3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG.

The Document Shepard has reviewed the document as part of WGLC, and made comments that were subsequently addressed by the authors.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?

Recent WG discussion has centered on the SDP section, so this may deserve further scrutiny.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

Additional review by the SDP Directorate may be helpful.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

No concerns.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes.

Cullen Jennings: https://mailarchive.ietf.org/arch/msg/avt/zgLFBTqUca4b8ARwFJnXJOF-1Cw/
Sergio Garcia Murillo: https://mailarchive.ietf.org/arch/msg/avt/E9unITw6snUlQwtvHZYReGKk5Gg/
Justin Uberti: https://mailarchive.ietf.org/arch/msg/avt/IO_3J21OrD2wCVXFxv5zrXwg8ik/

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

No disclosures.

(9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The WG has multiple participants who have been involved in the development of cryptex, as well as implementation of RFC 6904.

The consensus in favor of the document appears solid.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.)

There have been no heated discussions or indication of extreme (or even mild) discontent. No threats of an appeal.

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

  Checking boilerplate required by RFC 5378 and the IETF Trust (see
  https://trustee.ietf.org/license-info):
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt:
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to https://www.ietf.org/id-info/checklist :
  ----------------------------------------------------------------------------

    No issues found here.

  Miscellaneous warnings:
  ----------------------------------------------------------------------------

  -- The document date (25 October 2021) is 10 days in the past.  Is this
    intentional?


  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

    (See RFCs 3967 and 4897 for information about using normative references
    to lower-maturity documents in RFCs)

  ** Obsolete normative reference: RFC 4566 (Obsoleted by RFC 8866)


    Summary: 1 error (**), 0 flaws (~~), 0 warnings (==), 1 comment (--).

--------------------------------------------------------------------------------


(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

The document does not appear to require any formal reviews (e.g. no MIB or YANG modules, or media type/URI type definitions). 

(13) Have all references within this document been identified as either normative or informative?

References are separated into normative and informative categories.

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No changes to the status of existing RFCs.  This document does not obsolete RFC 6904.

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

I have reviewed the IANA Considerations, Section 9.

(18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

No IANA registries are created.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

No formal languages.

(20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No YANG modules.
2021-10-25
03 Justin Uberti New version available: draft-ietf-avtcore-cryptex-03.txt
2021-10-25
03 (System) New version approved
2021-10-25
03 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2021-10-25
03 Justin Uberti Uploaded new revision
2021-07-10
02 Justin Uberti New version available: draft-ietf-avtcore-cryptex-02.txt
2021-07-10
02 (System) New version approved
2021-07-10
02 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2021-07-10
02 Justin Uberti Uploaded new revision
2021-03-10
01 Justin Uberti New version available: draft-ietf-avtcore-cryptex-01.txt
2021-03-10
01 (System) New version approved
2021-03-10
01 (System) Request for posting confirmation emailed to previous authors: Cullen Jennings , Justin Uberti , Sergio Murillo
2021-03-10
01 Justin Uberti Uploaded new revision
2021-03-06
00 Bernard Aboba Added to session: IETF-110: avtcore  Thu-1300
2021-02-08
00 Bernard Aboba Notification list changed to bernard.aboba@gmail.com because the document shepherd was set
2021-02-08
00 Bernard Aboba Document shepherd changed to Dr. Bernard D. Aboba
2021-02-08
00 Bernard Aboba Changed consensus to Yes from Unknown
2021-02-08
00 Bernard Aboba Intended Status changed to Proposed Standard from None
2021-01-28
00 Jonathan Lennox This document now replaces draft-uberti-avtcore-cryptex instead of None
2021-01-28
00 Justin Uberti New version available: draft-ietf-avtcore-cryptex-00.txt
2021-01-28
00 (System) WG -00 approved
2021-01-28
00 Justin Uberti Set submitter to "Justin Uberti ", replaces to draft-uberti-avtcore-cryptex and sent approval email to group chairs: avtcore-chairs@ietf.org
2021-01-28
00 Justin Uberti Uploaded new revision