[AVTCORE] I-D Action: draft-ietf-avtcore-srtp-ekt-01.txt

internet-drafts@ietf.org Mon, 21 October 2013 21:40 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E37FE11E8610; Mon, 21 Oct 2013 14:40:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.568
X-Spam-Level:
X-Spam-Status: No, score=-102.568 tagged_above=-999 required=5 tests=[AWL=0.032, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mKuW1m1fDqcN; Mon, 21 Oct 2013 14:40:30 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7198F11E8712; Mon, 21 Oct 2013 14:40:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.80.p3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20131021213939.32455.90581.idtracker@ietfa.amsl.com>
Date: Mon, 21 Oct 2013 14:39:39 -0700
Cc: avt@ietf.org
Subject: [AVTCORE] I-D Action: draft-ietf-avtcore-srtp-ekt-01.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2013 21:40:33 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Audio/Video Transport Core Maintenance Working Group of the IETF.

	Title           : Encrypted Key Transport for Secure RTP
	Author(s)       : David A. McGrew
                          Dan Wing
	Filename        : draft-ietf-avtcore-srtp-ekt-01.txt
	Pages           : 51
	Date            : 2013-10-21

Abstract:
   Encrypted Key Transport (EKT) is an extension to Secure Real-time
   Transport Protocol (SRTP) that provides for the secure transport of
   SRTP master keys, Rollover Counters, and other information, within
   SRTP or SRTCP.  This facility enables SRTP to work for decentralized
   conferences with minimal control.

   This note defines EKT, and also describes how to use it with SDP
   Security Descriptions, DTLS-SRTP, and MIKEY.  These other key
   management protocols provide an EKT key to everyone in a session, and
   EKT coordinates the keys within the session.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-avtcore-srtp-ekt

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-avtcore-srtp-ekt-01

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-avtcore-srtp-ekt-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/