draft-ietf-mmusic-udptl-dtls-08.txt   draft-ietf-mmusic-udptl-dtls-09.txt 
MMUSIC Working Group C. Holmberg MMUSIC Working Group C. Holmberg
Internet-Draft I. Sedlacek Internet-Draft I. Sedlacek
Intended status: Standards Track Ericsson Intended status: Standards Track Ericsson
Expires: December 16, 2014 G. Salgueiro Expires: December 18, 2014 G. Salgueiro
Cisco Cisco
June 14, 2014 June 16, 2014
UDP Transport Layer (UDPTL) over Datagram Transport Layer Security UDP Transport Layer (UDPTL) over Datagram Transport Layer Security
(DTLS) (DTLS)
draft-ietf-mmusic-udptl-dtls-08 draft-ietf-mmusic-udptl-dtls-09
Abstract Abstract
This document specifies how the UDP Transport Layer (UDPTL) protocol, This document specifies how the UDP Transport Layer (UDPTL) protocol,
the predominant transport protocol for T.38 fax, can be transported the predominant transport protocol for T.38 fax, can be transported
over the Datagram Transport Layer Security (DTLS) protocol, how the over the Datagram Transport Layer Security (DTLS) protocol, how the
usage of UDPTL over DTLS is indicated in the Session Description usage of UDPTL over DTLS is indicated in the Session Description
Protocol (SDP), and how UDPTL over DTLS is negotiated in a session Protocol (SDP), and how UDPTL over DTLS is negotiated in a session
established using the Session Initiation Protocol (SIP). established using the Session Initiation Protocol (SIP).
skipping to change at page 1, line 38 skipping to change at page 1, line 38
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 16, 2014. This Internet-Draft will expire on December 18, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 27 skipping to change at page 2, line 27
4.3. Generating the Answer . . . . . . . . . . . . . . . . . . 6 4.3. Generating the Answer . . . . . . . . . . . . . . . . . . 6
4.4. Offerer Processing of the Answer . . . . . . . . . . . . 7 4.4. Offerer Processing of the Answer . . . . . . . . . . . . 7
4.5. Modifying the Session . . . . . . . . . . . . . . . . . . 7 4.5. Modifying the Session . . . . . . . . . . . . . . . . . . 7
5. Miscellaneous Considerations . . . . . . . . . . . . . . . . 7 5. Miscellaneous Considerations . . . . . . . . . . . . . . . . 7
5.1. Anonymous Calls . . . . . . . . . . . . . . . . . . . . . 7 5.1. Anonymous Calls . . . . . . . . . . . . . . . . . . . . . 7
5.2. NAT Traversal . . . . . . . . . . . . . . . . . . . . . . 7 5.2. NAT Traversal . . . . . . . . . . . . . . . . . . . . . . 7
5.2.1. ICE Usage . . . . . . . . . . . . . . . . . . . . . . 7 5.2.1. ICE Usage . . . . . . . . . . . . . . . . . . . . . . 7
5.2.2. STUN Interaction . . . . . . . . . . . . . . . . . . 8 5.2.2. STUN Interaction . . . . . . . . . . . . . . . . . . 8
5.3. Rekeying . . . . . . . . . . . . . . . . . . . . . . . . 8 5.3. Rekeying . . . . . . . . . . . . . . . . . . . . . . . . 8
5.4. Compatibility With UDPTL over UDP . . . . . . . . . . . . 8 5.4. Compatibility With UDPTL over UDP . . . . . . . . . . . . 8
6. Security Considerations . . . . . . . . . . . . . . . . . . . 8 6. Security Considerations . . . . . . . . . . . . . . . . . . . 9
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10
9. Change Log . . . . . . . . . . . . . . . . . . . . . . . . . 10 9. Change Log . . . . . . . . . . . . . . . . . . . . . . . . . 10
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 13
10.1. Normative References . . . . . . . . . . . . . . . . . . 12 10.1. Normative References . . . . . . . . . . . . . . . . . . 13
10.2. Informative References . . . . . . . . . . . . . . . . . 14 10.2. Informative References . . . . . . . . . . . . . . . . . 14
Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . 14 Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . 14
A.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 14 A.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 14
A.2. Basic Message Flow . . . . . . . . . . . . . . . . . . . 14 A.2. Basic Message Flow . . . . . . . . . . . . . . . . . . . 14
A.3. Message Flow Of T.38 Fax Replacing Audio Media Stream in A.3. Message Flow Of T.38 Fax Replacing Audio Media Stream in
An Existing Audio-Only Session . . . . . . . . . . . . . 20 An Existing Audio-Only Session . . . . . . . . . . . . . 20
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24
1. Introduction 1. Introduction
skipping to change at page 8, line 18 skipping to change at page 8, line 18
5.2.2. STUN Interaction 5.2.2. STUN Interaction
The UA MUST send the STUN packets [RFC5389] directly over UDP, not The UA MUST send the STUN packets [RFC5389] directly over UDP, not
over DTLS. over DTLS.
The UA MUST support the following mechanism for demultiplexing The UA MUST support the following mechanism for demultiplexing
packets arriving on the IP address and port associated with the DTLS packets arriving on the IP address and port associated with the DTLS
association: association:
o If the value of the first byte of the packet is 0 or 1, then the o If the value of the first byte of the packet is between 0 and 19
packet is STUN. (inclusive), then the packet is STUN.
o If the value of the first byte of the packet is between 20 and 63 o If the value of the first byte of the packet is between 20 and 63
(inclusive), the packet is DTLS. (inclusive), then the packet is DTLS.
o If the value of the first byte of the packet is between 64 and 127
(inclusive), then the packet is TURN channel.
5.3. Rekeying 5.3. Rekeying
During rekeying, packets protected by the previous set of keys can During rekeying, packets protected by the previous set of keys can
arrive after the DTLS handshake caused by rekeying has completed, arrive after the DTLS handshake caused by rekeying has completed,
because packets can be reordered on the wire. To compensate for this because packets can be reordered on the wire. To compensate for this
fact, receivers MUST maintain both sets of keys for some time in fact, receivers MUST maintain both sets of keys for some time in
order to be able to decrypt and verify older packets. The duration order to be able to decrypt and verify older packets. The duration
of maintaining the previous set of keys after the finish of the DTLS of maintaining the previous set of keys after the finish of the DTLS
handshake is out of scope for this document. handshake is out of scope for this document.
skipping to change at page 10, line 21 skipping to change at page 10, line 21
Table 1: SDP "proto" field values Table 1: SDP "proto" field values
[RFC EDITOR NOTE: Please replace RFC-XXXX with the RFC number of this [RFC EDITOR NOTE: Please replace RFC-XXXX with the RFC number of this
document.] document.]
8. Acknowledgments 8. Acknowledgments
Special thanks to Peter Dawes, who provided comments on the initial Special thanks to Peter Dawes, who provided comments on the initial
version of the draft, and to Paul E. Jones, James Rafferty, Albrecht version of the draft, and to Paul E. Jones, James Rafferty, Albrecht
Schwarz, Oscar Ohlsson, David Hanes, Adam Gensler, Ari Keranen, Schwarz, Oscar Ohlsson, David Hanes, Adam Gensler, Ari Keranen,
Flemming Andreasen and John Mattsson who provided valuable feedback Flemming Andreasen, John Mattsson and Marc Petit-Huguenin who
and input. Barry Leiba, Spencer Dawkins, Pete Resnick, Kathleen provided valuable feedback and input. Barry Leiba, Spencer Dawkins,
Moriarty and Stephen Farrell provided valuable feedback during the Pete Resnick, Kathleen Moriarty and Stephen Farrell provided valuable
IESG review. Thanks to Scott Brim for performing the Gen-ART review. feedback during the IESG review. Thanks to Scott Brim for performing
Thanks to Alissa Cooper for her help as sponsoring Area Director. the Gen-ART review. Thanks to Alissa Cooper for her help as
sponsoring Area Director.
9. Change Log 9. Change Log
[RFC EDITOR NOTE: Please remove this section when publishing] [RFC EDITOR NOTE: Please remove this section when publishing]
Changes from draft-ietf-mmusic-udptl-dtls-08
o Changes based on comments by Marc Petit-Huguenin:
o - Corrected text on how to distinguish STUN, TURN and DTLS
packets.
Changes from draft-ietf-mmusic-udptl-dtls-07 Changes from draft-ietf-mmusic-udptl-dtls-07
o Changes based on IESG comments by Barry Leiba: o Changes based on IESG comments by Barry Leiba:
o - SHALL replaced with MUST. o - SHALL replaced with MUST.
o - Text modifications in sections 4.2, 4.4, 5.2.2, 5.3 and 6. o - Text modifications in sections 4.2, 4.4, 5.2.2, 5.3 and 6.
o Changes based on IESG comments by Pete Resnick and Kathleen o Changes based on IESG comments by Pete Resnick and Kathleen
Moriarty: Moriarty:
o - Additional text on existing mechanisms for securing fax in o - Additional text on existing mechanisms for securing fax in
section 1. section 1.
o Changes based on IESG comments by Stephen Farrell: o Changes based on IESG comments by Stephen Farrell:
 End of changes. 10 change blocks. 
15 lines changed or deleted 24 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/