Correction: RFC 8844 on Unknown Key-Share Attacks on Uses of TLS with the Session Description Protocol (SDP) Tue, 19 January 2021 01:39 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 615AB3A100C; Mon, 18 Jan 2021 17:39:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id VBPSEsbDdBZh; Mon, 18 Jan 2021 17:39:24 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 9543E3A0FEB; Mon, 18 Jan 2021 17:39:21 -0800 (PST)
Received: by (Postfix, from userid 30) id 2D93AF40805; Mon, 18 Jan 2021 17:39:06 -0800 (PST)
Subject: Correction: RFC 8844 on Unknown Key-Share Attacks on Uses of TLS with the Session Description Protocol (SDP)
X-PHP-Originating-Script: 1005:ams_util_lib.php
Content-type: text/plain; charset="UTF-8"
Message-Id: <>
Date: Mon, 18 Jan 2021 17:39:06 -0800
Archived-At: <>
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 19 Jan 2021 01:39:32 -0000

[Year corrected to "2021" below.]

A new Request for Comments is now available in online RFC libraries.

       RFC 8844

       Title:      Unknown Key-Share Attacks on Uses of TLS 
                   with the Session Description Protocol (SDP) 
       Author:     M. Thomson,
                   E. Rescorla
       Status:     Standards Track
       Stream:     IETF
       Date:       January 2021
       Pages:      17
       Updates:    RFC 8122

       I-D Tag:    draft-ietf-mmusic-sdp-uks-07.txt


       DOI:        10.17487/RFC8844

This document describes unknown key-share attacks on the use of
Datagram Transport Layer Security for the Secure Real-Time Transport
Protocol (DTLS-SRTP). Similar attacks are described on the use of
DTLS-SRTP with the identity bindings used in Web Real-Time
Communications (WebRTC) and SIP identity.  These attacks are
difficult to mount, but they cause a victim to be misled about the
identity of a communicating peer.  This document defines mitigation
techniques that implementations of RFC 8122 are encouraged to deploy.

This document is a product of the Multiparty Multimedia Session Control Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards ( for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see

For searching the RFC series, see
For downloading RFCs, see

Requests for special distribution should be addressed to either the
author of the RFC in question, or to  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

The RFC Editor Team
Association Management Solutions, LLC