draft-ietf-perc-dtls-tunnel-03.txt | draft-ietf-perc-dtls-tunnel-04.txt | |||
---|---|---|---|---|
Network Working Group P. Jones | Network Working Group P. Jones | |||
Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
Intended status: Standards Track P. Ellenbogen | Intended status: Standards Track P. Ellenbogen | |||
Expires: October 26, 2018 Princeton University | Expires: April 23, 2019 Princeton University | |||
N. Ohlmeier | N. Ohlmeier | |||
Mozilla | Mozilla | |||
April 24, 2018 | October 20, 2018 | |||
DTLS Tunnel between a Media Distributor and Key Distributor to | DTLS Tunnel between a Media Distributor and Key Distributor to | |||
Facilitate Key Exchange | Facilitate Key Exchange | |||
draft-ietf-perc-dtls-tunnel-03 | draft-ietf-perc-dtls-tunnel-04 | |||
Abstract | Abstract | |||
This document defines a DTLS tunneling protocol for use in multimedia | This document defines a DTLS tunneling protocol for use in multimedia | |||
conferences that enables a Media Distributor to facilitate key | conferences that enables a Media Distributor to facilitate key | |||
exchange between an endpoint in a conference and the Key Distributor. | exchange between an endpoint in a conference and the Key Distributor. | |||
The protocol is designed to ensure that the keying material used for | The protocol is designed to ensure that the keying material used for | |||
hop-by-hop encryption and authentication is accessible to the media | hop-by-hop encryption and authentication is accessible to the media | |||
distributor, while the keying material used for end-to-end encryption | distributor, while the keying material used for end-to-end encryption | |||
and authentication is inaccessible to the media distributor. | and authentication is inaccessible to the media distributor. | |||
skipping to change at page 1, line 40 ¶ | skipping to change at page 1, line 40 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on October 26, 2018. | This Internet-Draft will expire on April 23, 2019. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 26 ¶ | skipping to change at page 2, line 26 ¶ | |||
4. Example Message Flows . . . . . . . . . . . . . . . . . . . . 4 | 4. Example Message Flows . . . . . . . . . . . . . . . . . . . . 4 | |||
5. Tunneling Procedures . . . . . . . . . . . . . . . . . . . . 6 | 5. Tunneling Procedures . . . . . . . . . . . . . . . . . . . . 6 | |||
5.1. Endpoint Procedures . . . . . . . . . . . . . . . . . . . 6 | 5.1. Endpoint Procedures . . . . . . . . . . . . . . . . . . . 6 | |||
5.2. Tunnel Establishment Procedures . . . . . . . . . . . . . 6 | 5.2. Tunnel Establishment Procedures . . . . . . . . . . . . . 6 | |||
5.3. Media Distributor Tunneling Procedures . . . . . . . . . 7 | 5.3. Media Distributor Tunneling Procedures . . . . . . . . . 7 | |||
5.4. Key Distributor Tunneling Procedures . . . . . . . . . . 8 | 5.4. Key Distributor Tunneling Procedures . . . . . . . . . . 8 | |||
5.5. Versioning Considerations . . . . . . . . . . . . . . . . 9 | 5.5. Versioning Considerations . . . . . . . . . . . . . . . . 9 | |||
6. Tunneling Protocol . . . . . . . . . . . . . . . . . . . . . 10 | 6. Tunneling Protocol . . . . . . . . . . . . . . . . . . . . . 10 | |||
6.1. Tunnel Message Format . . . . . . . . . . . . . . . . . . 10 | 6.1. Tunnel Message Format . . . . . . . . . . . . . . . . . . 10 | |||
7. Example Binary Encoding . . . . . . . . . . . . . . . . . . . 13 | 7. Example Binary Encoding . . . . . . . . . . . . . . . . . . . 13 | |||
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 | 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 | |||
9. Security Considerations . . . . . . . . . . . . . . . . . . . 14 | 9. Security Considerations . . . . . . . . . . . . . . . . . . . 14 | |||
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 14 | 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
11.1. Normative References . . . . . . . . . . . . . . . . . . 15 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 15 | |||
11.2. Informative References . . . . . . . . . . . . . . . . . 16 | 11.2. Informative References . . . . . . . . . . . . . . . . . 16 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | |||
1. Introduction | 1. Introduction | |||
An objective of Privacy-Enhanced RTP Conferencing (PERC) is to ensure | An objective of Privacy-Enhanced RTP Conferencing (PERC) is to ensure | |||
that endpoints in a multimedia conference have access to the end-to- | that endpoints in a multimedia conference have access to the end-to- | |||
end (E2E) and hop-by-hop (HBH) keying material used to encrypt and | end (E2E) and hop-by-hop (HBH) keying material used to encrypt and | |||
authenticate Real-time Transport Protocol (RTP) [RFC3550] packets, | authenticate Real-time Transport Protocol (RTP) [RFC3550] packets, | |||
skipping to change at page 16, line 19 ¶ | skipping to change at page 16, line 24 ¶ | |||
<https://www.rfc-editor.org/info/rfc5764>. | <https://www.rfc-editor.org/info/rfc5764>. | |||
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer | [RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer | |||
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347, | Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347, | |||
January 2012, <https://www.rfc-editor.org/info/rfc6347>. | January 2012, <https://www.rfc-editor.org/info/rfc6347>. | |||
11.2. Informative References | 11.2. Informative References | |||
[I-D.ietf-perc-double] | [I-D.ietf-perc-double] | |||
Jennings, C., Jones, P., Barnes, R., and A. Roach, "SRTP | Jennings, C., Jones, P., Barnes, R., and A. Roach, "SRTP | |||
Double Encryption Procedures", draft-ietf-perc-double-08 | Double Encryption Procedures", draft-ietf-perc-double-10 | |||
(work in progress), March 2018. | (work in progress), October 2018. | |||
[RFC4566] Handley, M., Jacobson, V., and C. Perkins, "SDP: Session | [RFC4566] Handley, M., Jacobson, V., and C. Perkins, "SDP: Session | |||
Description Protocol", RFC 4566, DOI 10.17487/RFC4566, | Description Protocol", RFC 4566, DOI 10.17487/RFC4566, | |||
July 2006, <https://www.rfc-editor.org/info/rfc4566>. | July 2006, <https://www.rfc-editor.org/info/rfc4566>. | |||
Authors' Addresses | Authors' Addresses | |||
Paul E. Jones | Paul E. Jones | |||
Cisco Systems, Inc. | Cisco Systems, Inc. | |||
7025 Kit Creek Rd. | 7025 Kit Creek Rd. | |||
End of changes. 7 change blocks. | ||||
9 lines changed or deleted | 9 lines changed or added | |||
This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |