[payload] Protocol Action: 'RTP Payload Format for G.711.0' to Proposed Standard (draft-ietf-payload-g7110-06.txt)

The IESG <iesg-secretary@ietf.org> Thu, 30 July 2015 16:01 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: payload@ietfa.amsl.com
Delivered-To: payload@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D19EC1B2E4C; Thu, 30 Jul 2015 09:01:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CpmsjCXx9rn1; Thu, 30 Jul 2015 09:01:14 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ACB521B2E50; Thu, 30 Jul 2015 09:01:12 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.2.0.p3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150730160112.9808.43014.idtracker@ietfa.amsl.com>
Date: Thu, 30 Jul 2015 09:01:12 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/payload/IT0hZxd5kiSYXWzBYGBCBBWPp-k>
Cc: payload chair <payload-chairs@tools.ietf.org>, payload mailing list <payload@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [payload] Protocol Action: 'RTP Payload Format for G.711.0' to Proposed Standard (draft-ietf-payload-g7110-06.txt)
X-BeenThere: payload@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Audio/Video Transport Payloads working group discussion list <payload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/payload>, <mailto:payload-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/payload/>
List-Post: <mailto:payload@ietf.org>
List-Help: <mailto:payload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/payload>, <mailto:payload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2015 16:01:16 -0000

The IESG has approved the following document:
- 'RTP Payload Format for G.711.0'
  (draft-ietf-payload-g7110-06.txt) as Proposed Standard

This document is the product of the Audio/Video Transport Payloads
Working Group.

The IESG contact persons are Barry Leiba, Ben Campbell and Alissa Cooper.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-payload-g7110/




Technical Summary

The document specifies the Real-Time Transport Protocol (RTP) payload format for ITU-T Recommendation G.711.0.  ITU-T Rec. G.711.0 defines a lossless and stateless compression for G.711 packet payloads typically used in IP networks.  This document also defines a storage mode format for G.711.0 and a media type registration for the  G.711.0 RTP payload format.

Working Group Summary

The initial individual draft had a section about G.711.0 "in the middle" this was removed before the document became a WG document. There were no other concerns or objections to the document.

Document Quality

There is an existing implementation. The request for a media type review was posted on March 4th, 2014.

Personnel

Document Shepherd is Roni Even and the responsible AD is Richard Barnes.

RFC Editor Note

  Please change the first two paragraphs in section 10 to match the boilerplate in draft-ietf-payload-rtp-howto-14:

OLD:

   RTP packets using the payload format defined in this specification
   are subject to the security considerations discussed in the RTP
   specification [RFC3550], and in any appropriate RTP profile (for
   example RFC 3551 [RFC3551] or [RFC4585]).  This implies that
   confidentiality of the media streams is achieved by encryption; for
   example, through the application of SRTP [RFC3711].  Because the data
   compression used with this payload format is applied end-to-end, any
   encryption needs to be performed after compression.

   Note that the appropriate mechanism to ensure confidentiality and
   integrity of RTP packets and their payloads is very dependent on the
   application and on the transport and signaling protocols employed.
   Thus, although SRTP is given as an example above, other possible
   choices exist.

NEW:

   RTP packets using the payload format defined in this specification
   are subject to the security considerations discussed in the RTP
   specification [RFC3550] , and in any applicable RTP profile such as
   RTP/AVP [RFC3551], RTP/AVPF [RFC4585], RTP/SAVP [RFC3711] or RTP/
   SAVPF [RFC5124].  However, as "Securing the RTP Protocol Framework:
   Why RTP Does Not Mandate a Single Media Security Solution" [RFC7202]
   discusses, it is not an RTP payload format's responsibility to
   discuss or mandate what solutions are used to meet the basic security
   goals like confidentiality, integrity and source authenticity for RTP
   in general.  This responsibility lays on anyone using RTP in an
   application.  They can find guidance on available security mechanisms
   and important considerations in Options for Securing RTP Sessions
   [RFC7201].  Applications SHOULD use one or more appropriate strong
   security mechanisms.  The rest of this security consideration section
   discusses the security impacting properties of the payload format
   itself.

   Because the data compression used with this payload format is applied end-to-end, any
   encryption needs to be performed after compression.