… to no-signaling-passive- media. As another example, SDP Security Descriptions [RFC4568], when protected by TLS (as it is commonly implemented and deployed), belong in the passive-signaling-passive-media category since the adversary needs to learn the SDP Security Descriptions ke…
…e Multimedia Internet KEYing (MIKEY) [ RFC3830 ] modes, Security Descriptions [ RFC4568 ], and Encrypted Key Transport (EKT) [ EKT ]. Thus, in such shared keying distributions, receipt of an authenticated SRTP packet is not sufficient to verify consent. The mechanism proposed in …
…e Multimedia Internet KEYing (MIKEY) [ RFC3830 ] modes, Security Descriptions [ RFC4568 ], and Encrypted Key Transport (EKT) [ EKT ]. Thus, in such shared keying distributions, receipt of an authenticated SRTP packet is not sufficient to verify consent. The mechanism proposed in …
…fied in [ I-D.ietf-rtcweb-security-arch ] The SDES SRTP keying mechanism from [ RFC4568 ] MUST NOT be used, as discussed in [ I-D.ietf-rtcweb-security-arch ]. 5.1.2 . Profile Names and Interoperability For media m= sections, JSEP implementations MUST support the "UDP/TLS/RTP/SAVP…
…some Multimedia Internet KEYing (MIKEY) [RFC3830] modes, Security Descriptions [RFC4568], and Encrypted Key Transport (EKT) [EKT]. Thus, in such shared keying distributions, receipt of an authenticated SRTP packet is not sufficient to verify consent. The mechanism proposed in the…
… If the calling service has access to the traffic keying material (as in SDES [ RFC4568 ]), then retrospective attack is trivial. This form Rescorla Expires January 6, 2020 [Page 16] Internet-Draft WebRTC Security July 2019 of attack is particularly serious in the Web context bec…
…edia channel. WebRTC implementations MUST NOT offer SDP Security Descriptions [ RFC4568 ] or select it if offered. A SRTP MKI MUST NOT be used. All data channels MUST be secured via DTLS. Rescorla Expires January 22, 2020 [Page 18] Internet-Draft WebRTC Sec. Arch. July 2019 All I…
…e Multimedia Internet KEYing (MIKEY) [ RFC3830 ] modes, Security Descriptions [ RFC4568 ], and Encrypted Key Transport (EKT) [ EKT ]. Thus, in such shared keying distributions, receipt of an authenticated SRTP packet is not sufficient to verify consent. The mechanism proposed in …
…e Multimedia Internet KEYing (MIKEY) [ RFC3830 ] modes, Security Descriptions [ RFC4568 ], and Encrypted Key Transport (EKT) [ EKT ]. Thus, in such shared keying distributions, receipt of an authenticated SRTP packet is not sufficient to verify consent. The mechanism proposed in …
…ed in parallel, an SRTP secret carried in an a=keymgt [ RFC4567 ] or a=crypto [ RFC4568 ] attribute can be used as a shared secret for the srtps computation defined in Section 8.2 . The ZRTP attribute is also used to signal to an intermediary ZRTP device not to act as a ZRTP endp…