[Sipbrandy] Fwd: I-D Action: draft-ietf-sipbrandy-osrtp-06.txt

Andy Hutton <andyhutton.ietf@gmail.com> Wed, 28 November 2018 17:19 UTC

Return-Path: <andyhutton.ietf@gmail.com>
X-Original-To: sipbrandy@ietfa.amsl.com
Delivered-To: sipbrandy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1210130FD9 for <sipbrandy@ietfa.amsl.com>; Wed, 28 Nov 2018 09:19:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Aib7J3fNK_D for <sipbrandy@ietfa.amsl.com>; Wed, 28 Nov 2018 09:19:28 -0800 (PST)
Received: from mail-vs1-xe30.google.com (mail-vs1-xe30.google.com [IPv6:2607:f8b0:4864:20::e30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21984130FED for <sipbrandy@ietf.org>; Wed, 28 Nov 2018 09:19:28 -0800 (PST)
Received: by mail-vs1-xe30.google.com with SMTP id h18so16506152vsj.4 for <sipbrandy@ietf.org>; Wed, 28 Nov 2018 09:19:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=tvsVQ2c7HG/jzNRLl+wqZs0b2SOH1TeGTWb3hOYewHc=; b=shehX+PJXsj9vFcubzepLeCLzeCI3Zg2dZ9Xc7VXQY7CfynjLmc2lUNCzt26MLM3sN bTSJMK8hRBk2EqxZ1ZgrKYCdD0Hi0Al8IO0EDi7fXdwHm64c+UvdUoZ23x55EnyqznkL ut5Qf7OHM4D75jc1qkyO0hJMzjh2i6p/QGRi8pnKK/GX0HC7MPqR/u+WaqKaeUqlDHcH v0gX5jpvA1dAV0d5sL0flDFp51drPJtygAceFSni2RuyF9eCAlEG4c+0hRS4VUX7s7pl NFX5VteNpFKTRpXlq6CgcOTHMH/LRhNGdkJeM0EXe7JP+Bw54hQjI5df9Gdgh7D9LQS5 QoRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=tvsVQ2c7HG/jzNRLl+wqZs0b2SOH1TeGTWb3hOYewHc=; b=nPk67C3wP8F+lJALP4DlHau710rI1U6GHz560DpgwSdHZRSlXIjVS+fi4tg9VibmsU 9gaHwl70wWavNmvaO++A/o4pnSktYgAMRBnwjZA8/bLcT7AwZCVzp77EZqQkRpGjfnYv K99kGQYlSARXmLXmjPq5yxXBOiHhZRYmsnc0z6CXAdM2fCb/bJB0Wj9FFsfzZ4iCvWLg 6HZqKuttR6hbkm1u+g803PorHztTTPrXnYdm1WDKv74EC3zap79gWYWBBibZ1kqiclNF dLKnVroRSYFyCDM5s3nMtAT39rQVPwvxS5CLBv38PcI75S8G3qgGP9C2AuBNqBoyBqwo BsYw==
X-Gm-Message-State: AA+aEWZzSD5zVjD4QLYdpfrHLeYBcJuMD8JzfzP+hYod+7cwJ1sIINvG 60VH8t0NHE/j1oWwXRML/BSZzTARotRQWqB5IZHE9hHu
X-Google-Smtp-Source: AJdET5cer07Upu5AKkajcLNXxEQmzQPflt8Hhll374+SUvSRGpfKqOB/kPkBtgVyBF/hBZt7x1AiGOmLsnrflvlc0FY=
X-Received: by 2002:a67:6204:: with SMTP id w4mr16431610vsb.68.1543425566848; Wed, 28 Nov 2018 09:19:26 -0800 (PST)
MIME-Version: 1.0
References: <154342457037.13508.11269997914951845364@ietfa.amsl.com>
In-Reply-To: <154342457037.13508.11269997914951845364@ietfa.amsl.com>
From: Andy Hutton <andyhutton.ietf@gmail.com>
Date: Wed, 28 Nov 2018 17:19:17 +0000
Message-ID: <CAB7PXwRo6k8Kg3TQhDy=oZfDTUZ+fn73L5wnHsqakUL00mfUaQ@mail.gmail.com>
To: sipbrandy@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipbrandy/HNcNTpJsHEySAzXU_tNAzqUXjC0>
Subject: [Sipbrandy] Fwd: I-D Action: draft-ietf-sipbrandy-osrtp-06.txt
X-BeenThere: sipbrandy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIPBRANDY working group discussion list <sipbrandy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipbrandy/>
List-Post: <mailto:sipbrandy@ietf.org>
List-Help: <mailto:sipbrandy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Nov 2018 17:19:37 -0000

I have updated this draft due to the WGLC comment from Roman Shpount
regarding the use of OSRTP with the AVPF profile which is of course
allowed so this is now clarified.

What has been lost in abandoning
draft-ietf-mmusic-opportunistic-negotiation and moving this back to
SIPBrandy is that the MMUSIC draft did contain a section regarding the
opportunistic negotiation of the AVPF profile itself (see
https://tools.ietf.org/html/draft-ietf-mmusic-opportunistic-negotiation-01#section-5)
which is unfortunate but I don't think we can put this in to the
sipbrandy draft and it would fall outside the scope of SIPBrandy which
is restricted to secure RTP negotiation issues.

Andy



---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Wed, 28 Nov 2018 at 17:03
Subject: [Sipbrandy] I-D Action: draft-ietf-sipbrandy-osrtp-06.txt
To: <i-d-announce@ietf.org>
Cc: <sipbrandy@ietf.org>



A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the SIP Best-practice Recommendations
Against Network Dangers to privacY WG of the IETF.

        Title           : An Opportunistic Approach for Secure
Real-time Transport Protocol (OSRTP)
        Authors         : Alan Johnston
                          Bernard Aboba
                          Andrew Hutton
                          Roland Jesske
                          Thomas Stach
        Filename        : draft-ietf-sipbrandy-osrtp-06.txt
        Pages           : 9
        Date            : 2018-11-28

Abstract:
   Opportunistic Secure Real-time Transport Protocol (OSRTP) is an
   implementation of the Opportunistic Security mechanism, as defined in
   RFC 7435, applied to Real-time Transport Protocol (RTP).  OSRTP
   allows encrypted media to be used in environments where support for
   encryption is not known in advance, and not required.  OSRTP does not
   require SDP extensions or features and is fully backwards compatible
   with existing implementations using encrypted and authenticated media
   and implementations that do not encrypt or authenticate media
   packets.  OSRTP is not specific to any key management technique for
   SRTP.  OSRTP is a transitional approach useful for migrating existing
   deployments of real-time communications to a fully encrypted and
   authenticated state.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipbrandy-osrtp/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipbrandy-osrtp-06
https://datatracker.ietf.org/doc/html/draft-ietf-sipbrandy-osrtp-06

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipbrandy-osrtp-06


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
Sipbrandy mailing list
Sipbrandy@ietf.org
https://www.ietf.org/mailman/listinfo/sipbrandy