<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.10 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-uberti-avtcore-cryptex-00" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.47.0 -->
  <front>
    <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
    <seriesInfo name="Internet-Draft" value="draft-uberti-avtcore-cryptex-00"/>
    <author initials="J." surname="Uberti" fullname="Justin Uberti">
      <organization>Google</organization>
      <address>
        <email>justin@uberti.name</email>
      </address>
    </author>
    <author initials="C." surname="Jennings" fullname="Cullen Jennings">
      <organization>Cisco</organization>
      <address>
        <email>fluffy@iii.ca</email>
      </address>
    </author>
    <date year="2020" month="November" day="02"/>
    <area>ART</area>
    <workgroup>AVTCORE</workgroup>
    <keyword>SRTP</keyword>
    <abstract>
      <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality
for the contents of a media packet, a significant amount of metadata is left
unprotected, including RTP header extensions and contributing sources (CSRCs).
However, this data can be moderately sensitive in many applications. While
there have been previous attempts to protect this data, they have had limited
deployment, due to complexity as well as technical limitations.</t>
      <t>This document proposes a new mechanism to completely encrypt header
extensions and CSRCs as well a simpler signaling mechanism intended to
facilitate deployment.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/juberti/cryptex"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <section anchor="problem-statement" numbered="true" toc="default">
        <name>Problem Statement</name>
        <t>The Secure Real-time Transport Protocol <xref target="RFC3711" format="default"/> mechanism provides message
authentication for the entire RTP packet, but only encrypts the RTP payload.
This has not historically been a problem, as much of the information carried
in the header has minimal sensitivity (e.g., RTP timestamp); in addition,
certain fields need to remain as cleartext because they are used for key
scheduling (e.g., RTP SSRC and sequence number).</t>
        <t>However, as noted in <xref target="RFC6904" format="default"/>, the security requirements can be different for
information carried in RTP header extensions, including the per-packet sound
levels defined in <xref target="RFC6464" format="default"/> and <xref target="RFC6465" format="default"/>, which are specifically noted as
being sensitive in the Security Considerations section of those RFCs.</t>
        <t>In addition to the contents of the header extensions, there are now enough
header extensions in active use that the header extension identifiers
themselves can provide meaningful information in terms of determining the
identity of endpoint and/or application. Accordingly, these identifiers
can be considered at least slightly sensitive.</t>
        <t>Finally, the CSRCs included in RTP packets can also be sensitive, potentially
allowing a network eavesdropper to determine who was speaking and when during
an otherwise secure conference call.</t>
      </section>
      <section anchor="previous-solutions" numbered="true" toc="default">
        <name>Previous Solutions</name>
        <t><xref target="RFC6904" format="default"/> was proposed in 2013 as a solution to the problem of unprotected
header extension values. However, it has not seen significant adoption, and
has a few technical shortcomings.</t>
        <t>First, the mechanism is complicated. Since it allows encryption to be
negotiated on a per-extension basis, a fair amount of signaling logic is
required. And in the SRTP layer, a somewhat complex transform is required
to allow only the selected header extension values to be encrypted. One of
the most popular SRTP implementations had a significant bug in this area
that was not detected for five years.</t>
        <t>Second, it only protects the header extension values, and not their ids or
lengths. It also does not protect the CSRCs. As noted above, this leaves
a fair amount of potentially sensitive information exposed.</t>
        <t>Third, it bloats the header extension space. Because each extension must
be offered in both unencrypted and encrypted forms, twice as many header
extensions must be offered, which will in many cases push implementations
past the 14-extension limit for the use of one-byte extension headers
defined in <xref target="RFC8285" format="default"/>. Accordingly, implementations will need to use
two-byte headers in many cases, which are not supported well by some
existing implementations.</t>
        <t>Finally, the header extension bloat combined with the need for backwards
compatibility results in additional wire overhead. Because two-byte
extension headers may not be handled well by existing implementations,
one-byte extension identifiers will need to be used for the unencrypted
(backwards compatible) forms, and two-byte for the encrypted forms.
Thus, deployment of <xref target="RFC6904" format="default"/> encryption for header extensions will
typically result in multiple extra bytes in each RTP packet, compared
to the present situation.</t>
      </section>
      <section anchor="goals" numbered="true" toc="default">
        <name>Goals</name>
        <t>From this analysis we can state the desired properties of a solution:
- Build on existing <xref target="RFC3711" format="default"/> SRTP framework (simple to understand)
- Build on existing <xref target="RFC8285" format="default"/> header extension framework (simple to implement)
- Protection of header extension ids, lengths, and values
- Protection of CSRCs when present
- Simple signaling
- Simple crypto transform and SRTP interactions
- Backward compatible with unencrypted endpoints, if desired
- Backward compatible with existing RTP tooling</t>
        <t>The last point deserves further discussion. While we considered possible
solutions that would have encrypted more of the RTP header (e.g., the number
of CSRCs), we felt the inability to parse the resultant packets with current
tools, as well as additional complexity incurred, outweighed the slight
improvement in confidentiality.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in <xref target="RFC2119" format="default"/>.</t>
    </section>
    <section anchor="design" numbered="true" toc="default">
      <name>Design</name>
      <t>This specification proposes a mechanism to negotiate encryption of all 
RTP header extensions (ids, lengths, and values) as well as CSRC values. It
reuses the existing SRTP framework, is accordingly simple to implement, and
is backward compatible with existing RTP packet parsing code, even when 
support for this mechanism has been negotiated.</t>
    </section>
    <section anchor="signaling" numbered="true" toc="default">
      <name>Signaling</name>
      <t>In order to determine whether this mechanism defined in this specification
is supported, this document defines a new "a=extmap-encrypted" 
Session Description Protocol (SDP) <xref target="RFC4566" format="default"/> attribute to indicate support.
This attribute takes no value, and
can be used at the session level or media level. Offering this attribute 
indicates that the endpoint is capable of receiving RTP packets encrypted
as defined below.</t>
      <t>The formal definition of this attribute is:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
  Name: extmap-encrypted

  Value: None

  Usage Level: session, media

  Charset Dependent: No

  Example:

     a=extmap-encrypted
]]></artwork>
      <t>When used with BUNDLE, this attribute is specified as the
   TRANSPORT category. (todo: REF)</t>
    </section>
    <section anchor="rtp-header-processing" numbered="true" toc="default">
      <name>RTP Header Processing</name>
      <t><xref target="RFC8285" format="default"/> defines two values for the "defined by profile" field for carrying
one-byte and two-byte header extensions. In order to allow a receiver to determine
if an incoming RTP packet is using the encryption scheme in this specification,
two new values are defined:</t>
      <ul spacing="normal">
        <li>0xC0DE for the encrypted version of the one-byte header extensions (instead of 0xBEDE).</li>
        <li>0xC2DE for the encrypted versions of the two-byte header extensions (instead of 0x100).</li>
      </ul>
      <t>In the case of using two-byte header extensions, the extension id with value 256 MUST NOT
be negotiated, as the value of this id is meant to be contained in the "appbits" of the
"defined by profile" field, which are not available when using the values above.</t>
      <t>If the "a=extmap-allow-mixed" attribute defined in <xref target="RFC8285" format="default"/> is negotiated, either one-byte
or two-byte header ids can be used (with the values above), as in <xref target="RFC8285" format="default"/>.</t>
      <section anchor="sending" numbered="true" toc="default">
        <name>Sending</name>
        <t>When sending an RTP packet that requires any header extensions to a
destination that has negotiated header encryption, the header extensions
MUST be formatted as <xref target="RFC8285" format="default"/> header extensions, as usual.</t>
        <t>If one-byte extension ids are in use, the 16-bit RTP header extension tag MUST
be set to 0xC0DE to indicate that the encryption defined in this specification
has been applied. If two-byte header extension codes are in use, the 16-bit RTP 
header extension tag MUST be set to 0xC2DE to indicate the same.</t>
        <t>The RTP packet MUST then be encrypted as described in Encryption Procedure.</t>
      </section>
      <section anchor="receiving" numbered="true" toc="default">
        <name>Receiving</name>
        <t>When receiving an RTP packet that contains header extensions, the
"defined by profile" field MUST be checked to ensure the payload is
formatted according to this specification. If the field does not match
one of the values defined above, the implementation MUST instead
handle it according to the specification that defines that value.
The implemntation MAY stop and report an error if it considers use of
this specification mandatory for the RTP stream.</t>
        <t>If the RTP packet passes this check, it is then decrypted according to
Decryption Procedure, and passed to the the next layer to process
the packet and its extensions.</t>
      </section>
    </section>
    <section anchor="encryption-and-decryption" numbered="true" toc="default">
      <name>Encryption and Decryption</name>
      <section anchor="packet-structure" numbered="true" toc="default">
        <name>Packet Structure</name>
        <t>When this mechanism is active, the SRTP packet is protected as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
      0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
   |V=2|P|X|  CC   |M|     PT      |       sequence number         | |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
   |                           timestamp                           | |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
   |           synchronization source (SSRC) identifier            | |
 +>+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ |
 | |            contributing source (CSRC) identifiers             | |
 | |                               ....                            | |
 +>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
 X |       0xC0    |    0xDE       |           length=3            | |
 +>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
 | |                  RFC 8285 header extensions                   | |
 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
 | |                          payload  ...                         | |
 | |                               +-------------------------------+ |
 | |                               | RTP padding   | RTP pad count | |
 +>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
 | ~                     SRTP MKI (OPTIONAL)                       ~ |
 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
 | :                 authentication tag (RECOMMENDED)              : |
 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
 |                                                                   |
 +- Encrypted Portions*                     Authenticated Portion ---+
]]></artwork>
        <ul spacing="normal">
          <li>Note that the 4 bytes at the start of the extension block are not encrypted, as
required by <xref target="RFC8285" format="default"/>.</li>
        </ul>
        <t>Specifically, the encrypted portion MUST include any CSRC identifiers, any
RTP header extension (except for the first 4 bytes), and the RTP payload.</t>
      </section>
      <section anchor="encryption-procedure" numbered="true" toc="default">
        <name>Encryption Procedure</name>
        <t>The encryption procedure is identical to that of <xref target="RFC3711" format="default"/> except for the 
region to encrypt, which is as shown in the section above.</t>
        <t>To minimize changes to surrounding code, the encryption mechanism can choose
to replace a "defined by profile" field from <xref target="RFC8285" format="default"/> with its counterpart
defined in RTP Header Processing above and encrypt at the same time.</t>
      </section>
      <section anchor="decryption-procedure" numbered="true" toc="default">
        <name>Decryption Procedure</name>
        <t>The decryption procedure is identical to that of <xref target="RFC3711" format="default"/> except
for the region to decrypt, which is as shown in the section above.</t>
        <t>To minimize changes to surrounding code, the decryption mechanism can choose
to replace the "defined by profile" field with its no-encryption counterpart
from <xref target="RFC8285" format="default"/> and decrypt at the same time.</t>
      </section>
    </section>
    <section anchor="backwards-compatibility" numbered="true" toc="default">
      <name>Backwards Compatibility</name>
      <t>This specification attempts to encrypt as much as possible without interfering
with backwards compatibility for systems that expect a certain structure from
an RTPv2 packet, including systems that perform demultiplexing based on packet
headers. Accordingly, the first two bytes of the RTP packet are not encrypted.</t>
      <t>This specification also attempts to reuse the key scheduling from SRTP, which
depends on the RTP packet sequence number and SSRC identifier. Accordingly
these values are also not encrypted.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This specification extends SRTP by expanding the portion of the packet that is
encrypted, as shown in Packet Structure. It does not change how SRTP authentication
works in any way. Given that more of the packet is being encrypted than before,
this is necessarily an improvement.</t>
      <t>The RTP fields that are left unencrypted (see rationale above) are as follows:
- RTP version
- padding bit
- extension bit
- # of CSRCs
- marker bit
- payload type
- sequence number
- timestamp
- SSRC identifier
- # of <xref target="RFC8285" format="default"/> header extensions</t>
      <t>These values contain a fixed set (i.e., one that won't be changed by 
extensions) of information that, at present, is observed to have low
sensitivity. In the event any of these values need to be encrypted, SRTP
is likely the wrong protocol to use and a fully-encapsulating protocol 
such as DTLS is preferred (with its attendant per-packet overhead).</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document defines two new 'defined by profile' attributes, as noted in RTP Header Processing.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Sergio Murillo, Jonathan Lennox, and Inaki Castillo for 
their review and text suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC3711" target="https://www.rfc-editor.org/info/rfc3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3711"/>
            <seriesInfo name="RFC" value="3711"/>
            <author initials="M." surname="Baugher" fullname="M. Baugher">
              <organization/>
            </author>
            <author initials="D." surname="McGrew" fullname="D. McGrew">
              <organization/>
            </author>
            <author initials="M." surname="Naslund" fullname="M. Naslund">
              <organization/>
            </author>
            <author initials="E." surname="Carrara" fullname="E. Carrara">
              <organization/>
            </author>
            <author initials="K." surname="Norrman" fullname="K. Norrman">
              <organization/>
            </author>
            <date year="2004" month="March"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP).   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC4566" target="https://www.rfc-editor.org/info/rfc4566">
          <front>
            <title>SDP: Session Description Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC4566"/>
            <seriesInfo name="RFC" value="4566"/>
            <author initials="M." surname="Handley" fullname="M. Handley">
              <organization/>
            </author>
            <author initials="V." surname="Jacobson" fullname="V. Jacobson">
              <organization/>
            </author>
            <author initials="C." surname="Perkins" fullname="C. Perkins">
              <organization/>
            </author>
            <date year="2006" month="July"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP).  SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8285" target="https://www.rfc-editor.org/info/rfc8285">
          <front>
            <title>A General Mechanism for RTP Header Extensions</title>
            <seriesInfo name="DOI" value="10.17487/RFC8285"/>
            <seriesInfo name="RFC" value="8285"/>
            <author initials="D." surname="Singer" fullname="D. Singer">
              <organization/>
            </author>
            <author initials="H." surname="Desineni" fullname="H. Desineni">
              <organization/>
            </author>
            <author initials="R." surname="Even" fullname="R. Even" role="editor">
              <organization/>
            </author>
            <date year="2017" month="October"/>
            <abstract>
              <t>This document provides a general mechanism to use the header extension feature of RTP (the Real-time Transport Protocol).  It provides the option to use a small number of small extensions in each RTP packet, where the universe of possible extensions is large and registration is decentralized.  The actual extensions in use in a session are signaled in the setup information for that session.  This document obsoletes RFC 5285.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6464" target="https://www.rfc-editor.org/info/rfc6464">
          <front>
            <title>A Real-time Transport Protocol (RTP) Header Extension for Client-to-Mixer Audio Level Indication</title>
            <seriesInfo name="DOI" value="10.17487/RFC6464"/>
            <seriesInfo name="RFC" value="6464"/>
            <author initials="J." surname="Lennox" fullname="J. Lennox" role="editor">
              <organization/>
            </author>
            <author initials="E." surname="Ivov" fullname="E. Ivov">
              <organization/>
            </author>
            <author initials="E." surname="Marocco" fullname="E. Marocco">
              <organization/>
            </author>
            <date year="2011" month="December"/>
            <abstract>
              <t>This document defines a mechanism by which packets of Real-time Transport Protocol (RTP) audio streams can indicate, in an RTP header extension, the audio level of the audio sample carried in the RTP packet.  In large conferences, this can reduce the load on an audio mixer or other middlebox that wants to forward only a few of the loudest audio streams, without requiring it to decode and measure every stream that is received.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6465" target="https://www.rfc-editor.org/info/rfc6465">
          <front>
            <title>A Real-time Transport Protocol (RTP) Header Extension for Mixer-to-Client Audio Level Indication</title>
            <seriesInfo name="DOI" value="10.17487/RFC6465"/>
            <seriesInfo name="RFC" value="6465"/>
            <author initials="E." surname="Ivov" fullname="E. Ivov" role="editor">
              <organization/>
            </author>
            <author initials="E." surname="Marocco" fullname="E. Marocco" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Lennox" fullname="J. Lennox">
              <organization/>
            </author>
            <date year="2011" month="December"/>
            <abstract>
              <t>This document describes a mechanism for RTP-level mixers in audio conferences to deliver information about the audio level of individual participants.  Such audio level indicators are transported in the same RTP packets as the audio data they pertain to. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6904" target="https://www.rfc-editor.org/info/rfc6904">
          <front>
            <title>Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC6904"/>
            <seriesInfo name="RFC" value="6904"/>
            <author initials="J." surname="Lennox" fullname="J. Lennox">
              <organization/>
            </author>
            <date year="2013" month="April"/>
            <abstract>
              <t>The Secure Real-time Transport Protocol (SRTP) provides authentication, but not encryption, of the headers of Real-time Transport Protocol (RTP) packets.  However, RTP header extensions may carry sensitive information for which participants in multimedia sessions want confidentiality.  This document provides a mechanism, extending the mechanisms of SRTP, to selectively encrypt RTP header extensions in SRTP.</t>
              <t>This document updates RFC 3711, the Secure Real-time Transport Protocol specification, to require that all future SRTP encryption transforms specify how RTP header extensions are to be encrypted.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
