<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc strict="yes"?>
<?rfc toc="yes"?>
<?rfc tocdepth="3"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>

<rfc ipr="trust200902" docName="draft-mattsson-dispatch-sdes-dont-dont-dont-00" category="std" obsoletes="4568" updates="7201">

  <front>
    <title abbrev="SDES don't don't don't">SDP Security Descriptions is NOT RECOMMENDED and Historic</title>

    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Westerlund" fullname="Magnus Westerlund">
      <organization>Ericsson</organization>
      <address>
        <email>magnus.westerlund@ericsson.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="12"/>

    <area></area>
    <workgroup></workgroup>
    <keyword></keyword>

    <abstract>


<t>Key exchange without forward secrecy enables pervasive monitoring.  Massive pervasive monitoring attacks relying on key exchange without forward secrecy have been reported, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to long-term keys enable passive attackers to compromise past and future sessions.  Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Session Description Protocol (SDP) Security Descriptions (RFC 4568) does not offer PFS and has a large number of additional significant security weaknesses. This document specifies that use of the SDP Security Descriptions is NOT RECOMMENDED. New deployments SHOULD forbid support of SDP Security Descriptions.</t>

<t>This document reclassifies RFC 4568 (SDP Security Descriptions) to Historic Status and also obsoletes RFC 4568.</t>

<t>This document updates RFC 7201 (Options for Securing RTP Sessions) to note that SDP Security Descriptions SHOULD NOT be used.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Key exchange without forward secrecy enables pervasive monitoring <xref target="RFC7258"/>.  Massive pervasive monitoring attacks relying on key exchange without forward secrecy have been reported <xref target="Heist"/> <xref target="I-D.ietf-emu-aka-pfs"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to long-term keys enables passive attackers to compromise past and future sessions.  Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order.</t>

<t>All TLS cipher suites without forward secrecy has been marked as NOT RECOMMENDED <xref target="RFC8447"/> in TLS 1.2 <xref target="RFC5246"/>, and static RSA and DH are forbidden in TLS 1.3 <xref target="RFC8446"/>.  A large number of TLS profiles forbid use of key exchange without Diffie-Hellman for TLS 1.2 <xref target="RFC7540"/>, <xref target="ANSSI"/>, <xref target="T3GPP.33.210"/>. SRTP deployments are severely lagging behind TLS deployments in this area as SDP Security Descriptions <xref target="RFC4568"/> is still used in many deployments. SDP Security Description is often referred to as SDES. In this document SDES refers to SDP Security Descriptions and not RTP source descriptions, which are also often referred to as SDES.</t>

<t>In addition to the very serious weaknesses of not providing protection against key leakage and enabling passive monitoring <xref target="RFC7258"/>, Security Descriptions <xref target="RFC4568"/> has a number of additional significant security problems.</t>

<t><list style="symbols">
  <t>As stated in <xref target="RFC7201"/>, Security Descriptions is vulnerable to SSRC collisions, which leads to so called “two-time pad” attacks. This vulnerability is worse than using a 32-bit MAC for data integrity, as a “two-time pad” may lead to loss of both confidentiality and integrity.</t>
  <t>In addition to happening by itself with a non-negligible probability, the SSRC collision attack can also be triggered by an attacker. As stated in <xref target="Replay-SDES"/> “The most serious attack is a replay attack on SDES, which causes SRTP to repeat the keystream used for media encryption, thus completely breaking transport-layer security.” The authors stress that the attack is practical in existing implementations: “We emphasize that our attack on SDES/SRTP is not a theoretical exercise.”. If SSRC are predictable, an attacker can also improve the probability by blocking SDP with non-colliding SSRCs.</t>
  <t>Security Descriptions <xref target="RFC4568"/> requires use of an encapsulating data-security protocol on each hop in the path giving at best hop-by-hop security. This assumes that all the intermediaries are trusted and uncompromised. This is a very insecure and outdated security model that fails completely as soon as a single node in the path is compromised.</t>
  <t>While Security Descriptions <xref target="RFC4568"/> requires use of an encapsulating data-security protocol, several deployed systems are known to use Security Descriptions without any encapsulating data-security protocol to protect the SDP messages. This means that any on-path attacker can decrypt the communication as well as modify and inject SRTP packets. A huge problem with SDP Security Descriptions is that the endpoints have no way of verifying if the path is protected or not.</t>
  <t>As explained in <xref target="Baiting-SDES"/> the model of slitting the security between two independent layers is flawed, SDP Security Description is vulnerable to the Baiting attack <xref target="I-D.kaplan-sip-baiting-attack"/>, and “This situation leads to security vulnerability and attacker could get master key by spoofing in unencrypted path.”</t>
  <t>As Security Descriptions <xref target="RFC4568"/> transports cryptographic keys without confidentiality in Session Description Protocol, the media keys are available to any entity that has visibility to the SDP <xref target="RFC5411"/>. The cryptographic keys are known to often end up in logs and data retention systems. These systems are often accessible by many more user accounts than Lawful Interception (LI) systems.</t>
  <t><xref target="Hacking-SDES"/> summarizes the security of SDP Security Descriptions as “the false sense of security might be more dangerous than simply leaving your voice calls unencrypted.”</t>
</list></t>

<t>New systems and recommendations like WebRTC <xref target="RFC8827"/>, PERC <xref target="RFC8871"/>, and <xref target="RFC8862"/> do mandate support of DTLS-SRTP <xref target="RFC5764"/>. WebRTC also forbids support of SDP Security Descriptions.</t>

<t><list style="symbols">
  <t>WebRTC <xref target="RFC8827"/> states (for good reasons) that “WebRTC implementations MUST NOT offer SDP security descriptions <xref target="RFC4568"></xref> or select it if offered.”</t>
</list></t>

<t>Many implementations, devices, and libraries support DTLS-SRTP. One deployment that supports DTLS-SRTP but still use SDP Security Descriptions is IMS Media Security <xref target="T3GPP.33.328"/> where Security Descriptions is one option used for access protection. IMS Media Security with SDP Security Descriptions is typically used for VoWi-Fi (Voice over EPC-integrated Wi-Fi) calls which is commonly used by 4G and 5G phones as a backup to VoLTE (Voice over LTE) and VoNR (Voice over NR). However, IMS Media Security <xref target="T3GPP.33.328"/> has already specified and mandated support of DTLS-SRTP for interworking with WebRTC. Allowing use of DTLS-SRTP also for other use cases than WebRTC interworking would therefore be a relatively small change.</t>

<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="status-change" title="Status Change">

<t>This document reclassifies RFC 4568 (SDP Security Descriptions) to Historic Status and also obsoletes RFC 4568.</t>

<t>This document updates RFC 7201 (Options for Securing RTP Sessions) to note that SDP Security Descriptions SHOULD NOT be used.</t>

<t>This document specifies that use of the SDP Security Descriptions <xref target="RFC4568"/> is NOT RECOMMENDED. Existing deployments SHOULD mandate support of DTLS-SRTP <xref target="RFC5764"/> and long-term phase out use of SDP Security Descriptions. If it is known by out-of-band means that the other party supports DTLS-SRTP, then SDP Security Descriptions MUST NOT be offered or accepted. If it is not known if the other party supports DTLS-SRTP, both DTLS-SRTP and SDP Security Descriptions and SHOULD be offered during a transition period. New deployments SHOULD forbid support of Security Descriptions <xref target="RFC4568"/>. This document reclassifies RFC 4568, SDP Security Descriptions to Historic Status and obsoletes RFC 4568.</t>

<t>As required by <xref target="RFC7258"/>, work on IETF protocols needs to consider the effects of pervasive monitoring and mitigate them when possible.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4568" target='https://www.rfc-editor.org/info/rfc4568'>
<front>
<title>Session Description Protocol (SDP) Security Descriptions for Media Streams</title>
<author initials='F.' surname='Andreasen' fullname='F. Andreasen'><organization /></author>
<author initials='M.' surname='Baugher' fullname='M. Baugher'><organization /></author>
<author initials='D.' surname='Wing' fullname='D. Wing'><organization /></author>
<date year='2006' month='July' />
<abstract><t>This document defines a Session Description Protocol (SDP) cryptographic attribute for unicast media streams.  The attribute describes a cryptographic key and other parameters that serve to configure security for a unicast media stream in either a single message or a roundtrip exchange.  The attribute can be used with a variety of SDP media transports, and this document defines how to use it for the Secure Real-time Transport Protocol (SRTP) unicast media streams.  The SDP crypto attribute requires the services of a data security protocol to secure the SDP message.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4568'/>
<seriesInfo name='DOI' value='10.17487/RFC4568'/>
</reference>



<reference  anchor="RFC5764" target='https://www.rfc-editor.org/info/rfc5764'>
<front>
<title>Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)</title>
<author initials='D.' surname='McGrew' fullname='D. McGrew'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2010' month='May' />
<abstract><t>This document describes a Datagram Transport Layer Security (DTLS) extension to establish keys for Secure RTP (SRTP) and Secure RTP Control Protocol (SRTCP) flows.  DTLS keying happens on the media path, independent of any out-of-band signalling channel present. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5764'/>
<seriesInfo name='DOI' value='10.17487/RFC5764'/>
</reference>



<reference  anchor="RFC7201" target='https://www.rfc-editor.org/info/rfc7201'>
<front>
<title>Options for Securing RTP Sessions</title>
<author initials='M.' surname='Westerlund' fullname='M. Westerlund'><organization /></author>
<author initials='C.' surname='Perkins' fullname='C. Perkins'><organization /></author>
<date year='2014' month='April' />
<abstract><t>The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments.  This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments.  The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism.  This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism.</t></abstract>
</front>
<seriesInfo name='RFC' value='7201'/>
<seriesInfo name='DOI' value='10.17487/RFC7201'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference  anchor="RFC8447" target='https://www.rfc-editor.org/info/rfc8447'>
<front>
<title>IANA Registry Updates for TLS and DTLS</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t><t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t></abstract>
</front>
<seriesInfo name='RFC' value='8447'/>
<seriesInfo name='DOI' value='10.17487/RFC8447'/>
</reference>



<reference  anchor="RFC8862" target='https://www.rfc-editor.org/info/rfc8862'>
<front>
<title>Best Practices for Securing RTP Media Signaled with SIP</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2021' month='January' />
<abstract><t>Although the Session Initiation Protocol (SIP) includes a suite of security services that has been expanded by numerous specifications over the years, there is no single place that explains how to use SIP to establish confidential media sessions. Additionally, existing mechanisms have some feature gaps that need to be identified and resolved in order for them to address the pervasive monitoring threat model. This specification describes best practices for negotiating confidential media with SIP, including a comprehensive protection solution that binds the media layer to SIP layer identities.</t></abstract>
</front>
<seriesInfo name='BCP' value='228'/>
<seriesInfo name='RFC' value='8862'/>
<seriesInfo name='DOI' value='10.17487/RFC8862'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC5411" target='https://www.rfc-editor.org/info/rfc5411'>
<front>
<title>A Hitchhiker's Guide to the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<date year='2009' month='February' />
<abstract><t>The Session Initiation Protocol (SIP) is the subject of numerous specifications that have been produced by the IETF.  It can be difficult to locate the right document, or even to determine the set of Request for Comments (RFC) about SIP.  This specification serves as a guide to the SIP RFC series.  It lists a current snapshot of the specifications under the SIP umbrella, briefly summarizes each, and groups them into categories.  This memo provides information for the  Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5411'/>
<seriesInfo name='DOI' value='10.17487/RFC5411'/>
</reference>



<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC7258" target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference  anchor="RFC7540" target='https://www.rfc-editor.org/info/rfc7540'>
<front>
<title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
<author initials='M.' surname='Belshe' fullname='M. Belshe'><organization /></author>
<author initials='R.' surname='Peon' fullname='R. Peon'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2015' month='May' />
<abstract><t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t><t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t></abstract>
</front>
<seriesInfo name='RFC' value='7540'/>
<seriesInfo name='DOI' value='10.17487/RFC7540'/>
</reference>



<reference  anchor="RFC8827" target='https://www.rfc-editor.org/info/rfc8827'>
<front>
<title>WebRTC Security Architecture</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2021' month='January' />
<abstract><t>This document defines the security architecture for WebRTC, a protocol suite intended for use with real-time applications that can be deployed in browsers -- &quot;real-time communication on the Web&quot;.</t></abstract>
</front>
<seriesInfo name='RFC' value='8827'/>
<seriesInfo name='DOI' value='10.17487/RFC8827'/>
</reference>



<reference  anchor="RFC8871" target='https://www.rfc-editor.org/info/rfc8871'>
<front>
<title>A Solution Framework for Private Media in Privacy-Enhanced RTP Conferencing (PERC)</title>
<author initials='P.' surname='Jones' fullname='P. Jones'><organization /></author>
<author initials='D.' surname='Benham' fullname='D. Benham'><organization /></author>
<author initials='C.' surname='Groves' fullname='C. Groves'><organization /></author>
<date year='2021' month='January' />
<abstract><t>This document describes a solution framework for ensuring that media confidentiality and integrity are maintained end to end within the context of a switched conferencing environment where Media Distributors are not trusted with the end-to-end media encryption keys.  The solution builds upon existing security mechanisms defined for the Real-time Transport Protocol (RTP).</t></abstract>
</front>
<seriesInfo name='RFC' value='8871'/>
<seriesInfo name='DOI' value='10.17487/RFC8871'/>
</reference>


<reference anchor="I-D.kaplan-sip-baiting-attack">
   <front>
      <title>The SIP Identity Baiting Attack</title>
      <author fullname="Hadriel Kaplan">
	 </author>
      <author fullname="Dan Wing">
	 </author>
      <author fullname="Intellectual Property">
	 </author>
      <date month="February" day="22" year="2008" />
      <abstract>
	 <t>This document identifies a potential SPIT and Phishing attack, which 
subverts the RFC 4474 SIP Identity and RFC 4916 Connected Identity 
mechanisms in a particular way.  The attack is termed &quot;Baiting&quot;, as 
it uses a RFC4474-signed call as the bait for malicious use.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-kaplan-sip-baiting-attack-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-kaplan-sip-baiting-attack-02.txt" />
</reference>


<reference anchor="I-D.ietf-emu-aka-pfs">
   <front>
      <title>Perfect-Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA&#39; PFS)</title>
      <author fullname="Jari Arkko">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Karl Norrman">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Vesa Torvinen">
	 <organization>Ericsson</organization>
      </author>
      <date month="October" day="30" year="2020" />
      <abstract>
	 <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising smart cards, such as attacking SIM card
   manufacturers and operators in an effort to compromise shared secrets
   stored on these cards.  Since the publication of those reports,
   manufacturing and provisioning processes have gained much scrutiny
   and have improved.  However, the danger of resourceful attackers for
   these systems is still a concern.

   This specification is an optional extension to the EAP-AKA&#39;
   authentication method which was defined in [I-D.ietf-emu-rfc5448bis].
   The extension, when negotiated, provides Perfect Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA&#39;.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-05" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-05.txt" />
</reference>


<reference anchor="ANSSI" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
  <front>
    <title>Security Recommendations for TLS</title>
    <author initials="." surname="Agence nationale de la sécurité des systèmes d'information">
      <organization></organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>
<reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
  <front>
    <title>How Spies Stole the Keys to the Encryption Castle</title>
    <author initials="." surname="The Intercept">
      <organization></organization>
    </author>
    <date year="2015" month="February"/>
  </front>
</reference>
<reference anchor="T3GPP.33.210" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
  <front>
    <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
    <author initials="." surname="3GPP">
      <organization></organization>
    </author>
    <date year="2020" month="July"/>
  </front>
</reference>
<reference anchor="T3GPP.33.328" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2295">
  <front>
    <title>TS 33.328 IP Multimedia Subsystem (IMS) media plane security</title>
    <author initials="." surname="3GPP">
      <organization></organization>
    </author>
    <date year="2021" month="April"/>
  </front>
</reference>
<reference anchor="Hacking-SDES" target="https://www.acritelli.com/blog/hacking-voip-decrypting-sdes-protected-srtp-phone-calls/">
  <front>
    <title>Hacking VoIP: Decrypting SDES Protected SRTP Phone Calls</title>
    <author initials="." surname="Anthony Critelli">
      <organization></organization>
    </author>
    <date year="2014" month="June"/>
  </front>
</reference>
<reference anchor="Baiting-SDES" target="http://phbo.janlo.nl/kpngips2/module-09/security-analysis.pdf">
  <front>
    <title>A Study on the Tightening the Security of the Key Management Protocol (RFC4568) for VoIP</title>
    <author initials="." surname="Seokung Yoon">
      <organization></organization>
    </author>
    <author initials="." surname="Jongil Jeong">
      <organization></organization>
    </author>
    <author initials="." surname="Hyuncheol Jeong">
      <organization></organization>
    </author>
    <date year="2010" month="June"/>
  </front>
</reference>
<reference anchor="Replay-SDES" target="http://phbo.janlo.nl/kpngips2/module-09/security-analysis.pdf">
  <front>
    <title>Security Analysis of Voice-over-IP Protocols</title>
    <author initials="." surname="Prateek Gupta">
      <organization></organization>
    </author>
    <author initials="." surname="Vitaly Shmatikov">
      <organization></organization>
    </author>
    <date year="2007" month="June"/>
  </front>
</reference>


    </references>


<section numbered="false" anchor="acknowledgements" title="Acknowledgements">

<t>The authors want to thank Bo Burman and Christer Holmberg for their valuable comments and feedback.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

