…often needed for those streams. The Secure Real-time Transport Protocol (SRTP) [RFC3711] provides security services for RTP media and is signaled by use of secure RTP transport (e.g., "RTP/SAVP" or "RTP/SAVPF") in an SDP media (m=) line. However, there are no means within SDP its…
… Immediate Feedback modes make this possible. This document updates [RFC3550], [RFC3711], and [RFC4585]. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be inte…
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…mediate Feedback modes make this possible. This document updates [ RFC3550 ], [ RFC3711 ], and [ RFC4585 ]. 2 . Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be …
…based feedback (RTP/AVPF) [ RFC4585 ] , and the secure RTP profile (RTP/SAVP) [ RFC3711 ] . ¶ The RTCP-based feedback extensions [ RFC4585 ] are needed for the improved RTCP timer model. This allows more flexible transmission of RTCP packets in response to events, rather than str…
… secret, which is then used to generate keys and salt for a Secure RTP (SRTP) [ RFC3711 ] session. ZRTP borrows ideas from [ PGPfone ]. A reference implementation of ZRTP is available in [ Zfone ]. The ZRTP protocol has some nice cryptographic features lacking in many other appro…
…based feedback (RTP/AVPF) [ RFC4585 ] , and the secure RTP profile (RTP/SAVP) [ RFC3711 ] . ¶ The RTCP-based feedback extensions [ RFC4585 ] are needed for the improved RTCP timer model. This allows more flexible transmission of RTCP packets in response to events, rather than str…
…ersonation, because an attacker can neglect the stipulation. Secure RTP (SRTP) [RFC3711] keeps unauthorized entities out of an RTP session, but it does not aim to prevent impersonation attacks from unauthorized entities. This document uses a hash function to ensure the uniqueness…
…vidual session. Such negotiation MUST NOT cause a two-time pad (Section 9.1 of [RFC3711]). R-PSTN: The media security key management protocol MUST support termination of media security in a PSTN gateway. This requirement is from Section 4.4. 5.2. Security Requirements This sectio…
…s is performed via DTLS [ RFC6347 ] and DTLS-SRTP [ RFC5763 ] keying for SRTP [ RFC3711 ] for the media channel and SCTP over DTLS [ RFC8261 ] for data channels. Specifically, Alice and Bob perform a DTLS handshake on every component which has been established by ICE. The total n…
… Minimal Control [ RFC3551 ] o The Secure Real-time Transport Protocol (SRTP) [ RFC3711 ] o SDP: Session Description Protocol [ RFC4566 ] o Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols [ RFC5245…
…am, like what is specified in "The Secure Real-time Transport Protocol (SRTP)" [RFC3711], producing a Secured RTP Stream (Section 2.1.14). Either an RTP stream (Section 2.1.10) or a redundancy RTP stream (Section 2.1.12) can be used as input to this transformation. In SRTP and th…
…nts in RFC 4145 based on the value in the offer. If an agent is utilizing SRTP [RFC3711], it MAY include a mix of UDP and TCP candidates. If ICE selects a TCP candidate pair, it is RECOMMENDED that the agent still utilizes SRTP but runs it over the connection established by ICE. …
…el Indication December 2011 In the Secure Real-time Transport Protocol (SRTP) [ RFC3711 ], RTP header extensions are authenticated but not encrypted. When this header extension is used, audio levels are therefore visible on a packet-by-packet basis to an attacker passively observ…