<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-avtcore-cryptex-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-avtcore-cryptex-05"/>
    <author initials="J." surname="Uberti" fullname="Justin Uberti">
      <organization>Clubhouse</organization>
      <address>
        <email>justin@uberti.name</email>
      </address>
    </author>
    <author initials="C." surname="Jennings" fullname="Cullen Jennings">
      <organization>Cisco</organization>
      <address>
        <email>fluffy@iii.ca</email>
      </address>
    </author>
    <author initials="S." surname="Garcia Murillo" fullname="Sergio Garcia Murillo">
      <organization>CoSMo</organization>
      <address>
        <email>sergio.garcia.murillo@cosmosoftware.io</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>ART</area>
    <workgroup>AVTCORE</workgroup>
    <keyword>SRTP</keyword>
    <abstract>
      <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality
for the contents of a media packet, a significant amount of metadata is left
unprotected, including RTP header extensions and contributing sources (CSRCs).
However, this data can be moderately sensitive in many applications. While
there have been previous attempts to protect this data, they have had limited
deployment, due to complexity as well as technical limitations.</t>
      <t>This document defines Cryptex as a new mechanism that completely encrypts
header extensions and CSRCs and uses simpler signaling with the goal of
facilitating deployment.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>The Secure Real-time Transport Protocol <xref target="RFC3711"/> mechanism provides message
authentication for the entire RTP packet, but only encrypts the RTP payload.
This has not historically been a problem, as much of the information carried
in the header has minimal sensitivity (e.g., RTP timestamp); in addition,
certain fields need to remain as cleartext because they are used for key
scheduling (e.g., RTP SSRC and sequence number).</t>
        <t>However, as noted in <xref target="RFC6904"/>, the security requirements can be different for
information carried in RTP header extensions, including the per-packet sound
levels defined in <xref target="RFC6464"/> and <xref target="RFC6465"/>, which are specifically noted as
being sensitive in the Security Considerations section of those RFCs.</t>
        <t>In addition to the contents of the header extensions, there are now enough
header extensions in active use that the header extension identifiers
themselves can provide meaningful information in terms of determining the
identity of the endpoint and/or application. Accordingly, these identifiers
can be considered a fingerprinting issue.</t>
        <t>Finally, the CSRCs included in RTP packets can also be sensitive, potentially
allowing a network eavesdropper to determine who was speaking and when during
an otherwise secure conference call.</t>
      </section>
      <section anchor="previous-solutions">
        <name>Previous Solutions</name>
        <t><xref target="RFC6904"/> was proposed in 2013 as a solution to the problem of unprotected
header extension values. However, it has not seen significant adoption, and
has a few technical shortcomings.</t>
        <t>First, the mechanism is complicated. Since it allows encryption to be
negotiated on a per-extension basis, a fair amount of signaling logic is
required. And in the SRTP layer, a somewhat complex transform is required
to allow only the selected header extension values to be encrypted. One of
the most popular SRTP implementations had a significant bug in this area
that was not detected for five years.</t>
        <t>Second, it only protects the header extension values, and not their ids or
lengths. It also does not protect the CSRCs. As noted above, this leaves
a fair amount of potentially sensitive information exposed.</t>
        <t>Third, it bloats the header extension space. Because each extension must
be offered in both unencrypted and encrypted forms, twice as many header
extensions must be offered, which will in many cases push implementations
past the 14-extension limit for the use of one-byte extension headers
defined in <xref target="RFC8285"/>. Accordingly, implementations will need to use
two-byte headers in many cases, which are not supported well by some
existing implementations.</t>
        <t>Finally, the header extension bloat combined with the need for backwards
compatibility results in additional wire overhead. Because two-byte
extension headers may not be handled well by existing implementations,
one-byte extension identifiers will need to be used for the unencrypted
(backwards compatible) forms, and two-byte for the encrypted forms.
Thus, deployment of <xref target="RFC6904"/> encryption for header extensions will
typically result in multiple extra bytes in each RTP packet, compared
to the present situation.</t>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>From this analysis we can state the desired properties of a solution:</t>
        <ul spacing="normal">
          <li>Build on existing <xref target="RFC3711"/> SRTP framework (simple to understand)</li>
          <li>Build on existing <xref target="RFC8285"/> header extension framework (simple to implement)</li>
          <li>Protection of header extension ids, lengths, and values</li>
          <li>Protection of CSRCs when present</li>
          <li>Simple signaling</li>
          <li>Simple crypto transform and SRTP interactions</li>
          <li>Backward compatible with unencrypted endpoints, if desired</li>
          <li>Backward compatible with existing RTP tooling</li>
        </ul>
        <t>The last point deserves further discussion. While we considered possible
solutions that would have encrypted more of the RTP header (e.g., the number
of CSRCs), we felt the inability to parse the resultant packets with current
tools, as well as additional complexity incurred, outweighed the slight
improvement in confidentiality.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in <xref target="BCP14"/> <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="design">
      <name>Design</name>
      <t>This specification proposes a mechanism to negotiate encryption of all
RTP header extensions (ids, lengths, and values) as well as CSRC values. It
reuses the existing SRTP framework, is accordingly simple to implement, and
is backward compatible with existing RTP packet parsing code, even when
support for the mechanism has been negotiated.</t>
    </section>
    <section anchor="signaling">
      <name>Signaling</name>
      <t>In order to determine whether the mechanism defined in this specification
is supported, this document defines a new "a=cryptex"
Session Description Protocol (SDP) <xref target="RFC4566"/> attribute to indicate support.</t>
      <t>This attribute takes no value, and can be used at the session level or media level.</t>
      <t>The presence of this attribute in the SDP (either in an offer or answer) indicates that
the endpoint is capable of receiving RTP packets encrypted with Cryptex, as defined below.</t>
      <t>Once each peer has verified that the other party supports receiving RTP packets encrypted with Cryptex, senders can unilaterally decide whether to use the Cryptex mechanism or not.</t>
      <t>If BUNDLE is in use and the a=cryptex attribute is present for a media line, it MUST be present for all media lines belonging to the same bundle group. This ensures that the encrypted MID header extensions used to demux BUNDLE can be processed correctly. When used with BUNDLE, this attribute is assigned to the TRANSPORT category <xref target="RFC8859"/>.</t>
      <t>It is possible to signal and negotiate both Encryption of Header Extensions as defined in <xref target="RFC6904"/> and cryptex in the SDP O/A, however if a packet is encrypted with cryptex, it MUST NOT use the <xref target="RFC6904"/> header extension encryption metchanisms.</t>
    </section>
    <section anchor="rtp-header-processing">
      <name>RTP Header Processing</name>
      <t><xref target="RFC8285"/> defines two values for the "defined by profile" field for carrying
one-byte and two-byte header extensions. In order to allow a receiver to determine
if an incoming RTP packet is using the encryption scheme in this specification,
two new values are defined:</t>
      <ul spacing="normal">
        <li>0xC0DE for the encrypted version of the one-byte header extensions (instead of 0xBEDE).</li>
        <li>0xC2DE for the encrypted versions of the two-byte header extensions (instead of 0x100).</li>
      </ul>
      <t>In the case of using two-byte header extensions, the extension id with value 256 MUST NOT
be negotiated, as the value of this id is meant to be contained in the "appbits" of the
"defined by profile" field, which are not available when using the values above.</t>
      <t>If the "a=extmap-allow-mixed" attribute defined in <xref target="RFC8285"/> is negotiated, either one-byte
or two-byte header ids can be used (with the values above), as in <xref target="RFC8285"/>.</t>
      <section anchor="sending">
        <name>Sending</name>
        <t>When the mechanism defined by this specification has been negotiated,
sending a RTP packet that has any CSRCs or contains any {RFC8285}}
header extensions follows the steps below. This mechanism MUST NOT be
used with header extensions other than the <xref target="RFC8285"/> variety.</t>
        <t>If the packet contains solely one-byte extension ids, the 16-bit RTP header extension
tag MUST be set to 0xC0DE to indicate that the encryption has been applied, and the
one-byte framing is being used. If the packet contains only two-byte extension ids,
the header extension tag MUST be set to 0xC2DE to indicate encryption has been applied,
and the two-byte framing is being used.</t>
        <t>If the packet contains CSRCs but no header extensions, an empty extension block
consisting of the 0xC0DE tag and a 16-bit length field set to zero (explicitly
permitted by <xref target="RFC3550"/>) MUST be appended, and the X bit MUST be set to 1 to
indicate an extension block is present. This is necessary to provide the receiver
an indication that the CSRCs in the packet are encrypted.</t>
        <t>The RTP packet MUST then be encrypted as described in Encryption Procedure.</t>
      </section>
      <section anchor="receiving">
        <name>Receiving</name>
        <t>When receiving an RTP packet that contains header extensions, the
"defined by profile" field MUST be checked to ensure the payload is
formatted according to this specification. If the field does not match
one of the values defined above, the implementation MUST instead
handle it according to the specification that defines that value.
The implementation MAY stop and report an error if it considers use of
this specification mandatory for the RTP stream.</t>
        <t>If the RTP packet passes this check, it is then decrypted according to
Decryption Procedure, and passed to the the next layer to process
the packet and its extensions. In the event that a zero-length extension
block was added as indicated above, it can be left as-is and will be
processed normally.</t>
      </section>
    </section>
    <section anchor="encryption-and-decryption">
      <name>Encryption and Decryption</name>
      <section anchor="packet-structure">
        <name>Packet Structure</name>
        <t>When this mechanism is active, the SRTP packet is protected as follows:</t>
        <artwork><![CDATA[
     0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
  |V=2|P|X|  CC   |M|     PT      |       sequence number         | |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
  |                           timestamp                           | |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
  |           synchronization source (SSRC) identifier            | |
+>+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ |
| |            contributing source (CSRC) identifiers             | |
| |                               ....                            | |
+>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
X |       0xC0    |    0xDE       |           length=3            | |
+>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| |                  RFC 8285 header extensions                   | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| |                          payload  ...                         | |
| |                               +-------------------------------+ |
| |                               | RTP padding   | RTP pad count | |
+>+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<+
| ~                     SRTP MKI (OPTIONAL)                       ~ |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| :                 authentication tag (RECOMMENDED)              : |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
|                                                                   |
+- Encrypted Portions*                     Authenticated Portion ---+
]]></artwork>
        <ul spacing="normal">
          <li>Note that the 4 bytes at the start of the extension block are not encrypted, as
required by <xref target="RFC8285"/>.</li>
        </ul>
        <t>Specifically, the encrypted portion MUST include any CSRC identifiers, any
RTP header extension (except for the first 4 bytes), and the RTP payload.</t>
      </section>
      <section anchor="encryption-procedure">
        <name>Encryption Procedure</name>
        <t>The encryption procedure is identical to that of <xref target="RFC3711"/> except for the
region to encrypt, which is as shown in the section above.</t>
        <t>To minimize changes to surrounding code, the encryption mechanism can choose
to replace a "defined by profile" field from <xref target="RFC8285"/> with its counterpart
defined in RTP Header Processing above and encrypt at the same time.</t>
        <t>For AEAD ciphers (e.g., GCM), the 12-byte fixed header and the four-byte header
extension header (the "defined by profile" field and the length) are considered
AAD, even though they are non-contiguous in the packet if CSRCs are present.</t>
      </section>
      <section anchor="decryption-procedure">
        <name>Decryption Procedure</name>
        <t>The decryption procedure is identical to that of <xref target="RFC3711"/> except
for the region to decrypt, which is as shown in the section above.</t>
        <t>To minimize changes to surrounding code, the decryption mechanism can choose
to replace the "defined by profile" field with its no-encryption counterpart
from <xref target="RFC8285"/> and decrypt at the same time.</t>
      </section>
    </section>
    <section anchor="backwards-compatibility">
      <name>Backwards Compatibility</name>
      <t>This specification attempts to encrypt as much as possible without interfering
with backwards compatibility for systems that expect a certain structure from
an RTPv2 packet, including systems that perform demultiplexing based on packet
headers. Accordingly, the first two bytes of the RTP packet are not encrypted.</t>
      <t>This specification also attempts to reuse the key scheduling from SRTP, which
depends on the RTP packet sequence number and SSRC identifier. Accordingly
these values are also not encrypted.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification extends SRTP by expanding the portion of the packet that is
encrypted, as shown in Packet Structure. It does not change how SRTP authentication
works in any way. Given that more of the packet is being encrypted than before,
this is necessarily an improvement.</t>
      <t>The RTP fields that are left unencrypted (see rationale above) are as follows:</t>
      <ul spacing="normal">
        <li>RTP version</li>
        <li>padding bit</li>
        <li>extension bit</li>
        <li>number of CSRCs</li>
        <li>marker bit</li>
        <li>payload type</li>
        <li>sequence number</li>
        <li>timestamp</li>
        <li>SSRC identifier</li>
        <li>number of <xref target="RFC8285"/> header extensions</li>
      </ul>
      <t>These values contain a fixed set (i.e., one that won't be changed by
extensions) of information that, at present, is observed to have low
sensitivity. In the event any of these values need to be encrypted, SRTP
is likely the wrong protocol to use and a fully-encapsulating protocol
such as DTLS is preferred (with its attendant per-packet overhead).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cryptex-sdp-attribute">
        <name>cryptex SDP Attribute</name>
        <t>This document updates the "Session Description Protocol Parameters" registry as specified in Section 8.2.4 of <xref target="RFC8866"/>. Specifically, it adds the SDP 'cryptex' attribute to the table for SDP media-level attributes.</t>
        <t>Contact name: TBD</t>
        <t>Contact email address: TBD</t>
        <t>Attribute name: cryptex</t>
        <t>Attribute syntax: This attribute takes no values.</t>
        <t>Attribute semantics: N/A</t>
        <t>Attribute value: N/A</t>
        <t>Usage level: media-level</t>
        <t>Charset dependent: No</t>
        <t>Purpose: The presence of this attribute in the SDP indicates that the endpoint is capable of receiving RTP packets encrypted with Cryptex as described in this document.
O/A procedures: SDP O/A procedures are described in Section 4 of this document.</t>
        <t>Mux Category: TRANSPORT</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Lennart Grahl for pointing out many of the issues with the existing
header encryption mechanism, as well as suggestions for this proposal.
Thanks also to Jonathan Lennox, Inaki Castillo, and Bernard Aboba for their review and suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3550" target="https://www.rfc-editor.org/info/rfc3550">
          <front>
            <title>RTP: A Transport Protocol for Real-Time Applications</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <author fullname="S. Casner" initials="S." surname="Casner">
              <organization/>
            </author>
            <author fullname="R. Frederick" initials="R." surname="Frederick">
              <organization/>
            </author>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson">
              <organization/>
            </author>
            <date month="July" year="2003"/>
            <abstract>
              <t>This memorandum describes RTP, the real-time transport protocol.  RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services.  RTP does not address resource reservation and does not guarantee quality-of- service for real-time services.  The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality.  RTP and RTCP are designed to be independent of the underlying transport and network layers.  The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes.  There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="64"/>
          <seriesInfo name="RFC" value="3550"/>
          <seriesInfo name="DOI" value="10.17487/RFC3550"/>
        </reference>
        <reference anchor="RFC3711" target="https://www.rfc-editor.org/info/rfc3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <author fullname="M. Naslund" initials="M." surname="Naslund">
              <organization/>
            </author>
            <author fullname="E. Carrara" initials="E." surname="Carrara">
              <organization/>
            </author>
            <author fullname="K. Norrman" initials="K." surname="Norrman">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP).   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC4566" target="https://www.rfc-editor.org/info/rfc4566">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="M. Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson">
              <organization/>
            </author>
            <author fullname="C. Perkins" initials="C." surname="Perkins">
              <organization/>
            </author>
            <date month="July" year="2006"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP).  SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4566"/>
          <seriesInfo name="DOI" value="10.17487/RFC4566"/>
        </reference>
        <reference anchor="RFC8285" target="https://www.rfc-editor.org/info/rfc8285">
          <front>
            <title>A General Mechanism for RTP Header Extensions</title>
            <author fullname="D. Singer" initials="D." surname="Singer">
              <organization/>
            </author>
            <author fullname="H. Desineni" initials="H." surname="Desineni">
              <organization/>
            </author>
            <author fullname="R. Even" initials="R." role="editor" surname="Even">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document provides a general mechanism to use the header extension feature of RTP (the Real-time Transport Protocol).  It provides the option to use a small number of small extensions in each RTP packet, where the universe of possible extensions is large and registration is decentralized.  The actual extensions in use in a session are signaled in the setup information for that session.  This document obsoletes RFC 5285.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8285"/>
          <seriesInfo name="DOI" value="10.17487/RFC8285"/>
        </reference>
        <reference anchor="RFC8859" target="https://www.rfc-editor.org/info/rfc8859">
          <front>
            <title>A Framework for Session Description Protocol (SDP) Attributes When Multiplexing</title>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>The purpose of this specification is to provide a framework for analyzing the multiplexing characteristics of Session Description Protocol (SDP) attributes when SDP is used to negotiate the usage of a single 5-tuple for sending and receiving media associated with multiple media descriptions.</t>
              <t>This specification also categorizes the existing SDP attributes based on the framework described herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8859"/>
          <seriesInfo name="DOI" value="10.17487/RFC8859"/>
        </reference>
        <reference anchor="RFC8866" target="https://www.rfc-editor.org/info/rfc8866">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="A. Begen" initials="A." surname="Begen">
              <organization/>
            </author>
            <author fullname="P. Kyzivat" initials="P." surname="Kyzivat">
              <organization/>
            </author>
            <author fullname="C. Perkins" initials="C." surname="Perkins">
              <organization/>
            </author>
            <author fullname="M. Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. This document obsoletes RFC 4566.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8866"/>
          <seriesInfo name="DOI" value="10.17487/RFC8866"/>
        </reference>
        <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
          <!-- reference.RFC.2119.xml -->
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
            <front>
              <title>Key words for use in RFCs to Indicate Requirement Levels</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner">
                <organization/>
              </author>
              <date month="March" year="1997"/>
              <abstract>
                <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          </reference>
          <!-- reference.RFC.8174.xml -->
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
            <front>
              <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
              <author fullname="B. Leiba" initials="B." surname="Leiba">
                <organization/>
              </author>
              <date month="May" year="2017"/>
              <abstract>
                <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          </reference>
        </referencegroup>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6464" target="https://www.rfc-editor.org/info/rfc6464">
          <front>
            <title>A Real-time Transport Protocol (RTP) Header Extension for Client-to-Mixer Audio Level Indication</title>
            <author fullname="J. Lennox" initials="J." role="editor" surname="Lennox">
              <organization/>
            </author>
            <author fullname="E. Ivov" initials="E." surname="Ivov">
              <organization/>
            </author>
            <author fullname="E. Marocco" initials="E." surname="Marocco">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines a mechanism by which packets of Real-time Transport Protocol (RTP) audio streams can indicate, in an RTP header extension, the audio level of the audio sample carried in the RTP packet.  In large conferences, this can reduce the load on an audio mixer or other middlebox that wants to forward only a few of the loudest audio streams, without requiring it to decode and measure every stream that is received.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6464"/>
          <seriesInfo name="DOI" value="10.17487/RFC6464"/>
        </reference>
        <reference anchor="RFC6465" target="https://www.rfc-editor.org/info/rfc6465">
          <front>
            <title>A Real-time Transport Protocol (RTP) Header Extension for Mixer-to-Client Audio Level Indication</title>
            <author fullname="E. Ivov" initials="E." role="editor" surname="Ivov">
              <organization/>
            </author>
            <author fullname="E. Marocco" initials="E." role="editor" surname="Marocco">
              <organization/>
            </author>
            <author fullname="J. Lennox" initials="J." surname="Lennox">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document describes a mechanism for RTP-level mixers in audio conferences to deliver information about the audio level of individual participants.  Such audio level indicators are transported in the same RTP packets as the audio data they pertain to. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6465"/>
          <seriesInfo name="DOI" value="10.17487/RFC6465"/>
        </reference>
        <reference anchor="RFC6904" target="https://www.rfc-editor.org/info/rfc6904">
          <front>
            <title>Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="J. Lennox" initials="J." surname="Lennox">
              <organization/>
            </author>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Secure Real-time Transport Protocol (SRTP) provides authentication, but not encryption, of the headers of Real-time Transport Protocol (RTP) packets.  However, RTP header extensions may carry sensitive information for which participants in multimedia sessions want confidentiality.  This document provides a mechanism, extending the mechanisms of SRTP, to selectively encrypt RTP header extensions in SRTP.</t>
              <t>This document updates RFC 3711, the Secure Real-time Transport Protocol specification, to require that all future SRTP encryption transforms specify how RTP header extensions are to be encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6904"/>
          <seriesInfo name="DOI" value="10.17487/RFC6904"/>
        </reference>
      </references>
    </references>
    <section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>All values are in hexadecimal and represented in network order (big endian).</t>
      <section anchor="aes-ctr">
        <name>AES-CTR</name>
        <t>Common values are organized as follows:</t>
        <artwork><![CDATA[
    Rollover Counter:          00000000
    Master Key:                e1f97a0d3e018be0d64fa32c06de4139
    Master Salt:               0ec675ad498afeebb6960b3aabe6
    Crypto Suite:              AES_CM_128_HMAC_SHA1_80
    Session Key:               c61e7a93744f39ee10734afe3ff7a087
    Session Salt:              30cbbc08863d8c85d49db34a9ae1
    Authentication Key:        cebe321f6ff7716b6fd4ab49af256a156d38baa4
]]></artwork>
        <section anchor="rtp-packet-with-1-byte-header-extension">
          <name>RTP Packet with 1-byte header extension</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    900f1235
    decafbad
    cafebabe
    bede0001
    51000200
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    900f1235
    decafbad
    cafebabe
    c0de0001
    eb923652
    51c3e036
    f8de27e9
    c27ee3e0
    b4651d9f
    bc4218a7
    0244522f
    34a5
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-2-byte-header-extension">
          <name>RTP Packet with 2-byte header extension</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    900f1236
    decafbad
    cafebabe
    10000001
    05020002
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    900f1236
    decafbad
    cafebabe
    c2de0001
    4ed9cc4e
    6a712b30
    96c5ca77
    339d4204
    ce0d7739
    6cab6958
    5fbce381
    94a5
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-1-byte-header-extension-and-csrc-fields">
          <name>RTP Packet with 1-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f1238
    decafbad
    cafebabe
    0001e240
    0000b26e
    bede0001
    51000200
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f1238
    decafbad
    cafebabe
    8bb6e12b
    5cff16dd
    c0de0001
    92838c8c
    09e58393
    e1de3a9a
    74734d67
    45671338
    c3acf11d
    a2df8423
    bee0
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-2-byte-header-extension-and-csrc-fields">
          <name>RTP Packet with 2-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f1239
    decafbad
    cafebabe
    0001e240
    0000b26e
    10000001
    05020002
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f1239
    decafbad
    cafebabe
    f70e513e
    b90b9b25
    c2de0001
    bbed4848
    faa64466
    5f3d7f34
    125914e9
    f4d0ae92
    3c6f479b
    95a0f7b5
    3133
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-empty-1-byte-header-extension-and-csrc-fields">
          <name>RTP Packet with empty 1-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f123a
    decafbad
    cafebabe
    0001e240
    0000b26e
    bede0000
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f123a
    decafbad
    cafebabe
    7130b6ab
    fe2ab0e3
    c0de0000
    e3d9f64b
    25c9e74c
    b4cf8e43
    fb92e378
    1c2c0cea
    b6b3a499
    a14c
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-empty-2-byte-header-extension-and-csrc-fields">
          <name>RTP Packet with empty 2-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f123b
    decafbad
    cafebabe
    0001e240
    0000b26e
    10000000
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f123b
    decafbad
    cafebabe
    cbf24c12
    4330e1c8
    c2de0000
    599dd45b
    c9d687b6
    03e8b59d
    771fd38e
    88b170e0
    cd31e125
    eabe
]]></artwork>
        </section>
      </section>
      <section anchor="aes-gcm">
        <name>AES-GCM</name>
        <t>Common values are organized as follows:</t>
        <artwork><![CDATA[
    Rollover Counter:          00000000
    Master Key:                000102030405060708090a0b0c0d0e0f
    Master Salt:               a0a1a2a3a4a5a6a7a8a9aaab
    Crypto Suite:              AEAD_AES_128_GCM
    Session Key:               077c6143cb221bc355ff23d5f984a16e
    Session Salt:              9af3e95364ebac9c99c5a7c4
]]></artwork>
        <section anchor="rtp-packet-with-1-byte-header-extension-1">
          <name>RTP Packet with 1-byte header extension</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    900f1235
    decafbad
    cafebabe
    bede0001
    51000200
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    900f1235
    decafbad
    cafebabe
    c0de0001
    39972dc9
    572c4d99
    e8fc355d
    e743fb2e
    94f9d8ff
    54e72f41
    93bbc5c7
    4ffab0fa
    9fa0fbeb
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-2-byte-header-extension-1">
          <name>RTP Packet with 2-byte header extension</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    900f1236
    decafbad
    cafebabe
    10000001
    05020002
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    900f1236
    decafbad
    cafebabe
    c2de0001
    bb75a4c5
    45cd1f41
    3bdb7daa
    2b1e3263
    de313667
    c9632490
    81b35a65
    f5cb6c88
    b394235f
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-1-byte-header-extension-and-csrc-fields-1">
          <name>RTP Packet with 1-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f1238
    decafbad
    cafebabe
    0001e240
    0000b26e
    bede0001
    51000200
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f1238
    decafbad
    cafebabe
    63bbccc4
    a7f695c4
    c0de0001
    8ad7c71f
    ac70a80c
    92866b4c
    6ba98546
    ef913586
    e95ffaaf
    fe956885
    bb0647a8
    bc094ac8
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-2-byte-header-extension-and-csrc-fields-1">
          <name>RTP Packet with 2-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f1239
    decafbad
    cafebabe
    0001e240
    0000b26e
    10000001
    05020002
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f1239
    decafbad
    cafebabe
    3680524f
    8d312b00
    c2de0001
    c78d1200
    38422bc1
    11a7187a
    18246f98
    0c059cc6
    bc9df8b6
    26394eca
    344e4b05
    d80fea83
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-empty-1-byte-header-extension-and-csrc-fields-1">
          <name>RTP Packet with empty 1-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f123a
    decafbad
    cafebabe
    0001e240
    0000b26e
    bede0000
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f123a
    decafbad
    cafebabe
    15b6bb43
    37906fff
    c0de0000
    b7b96453
    7a2b03ab
    7ba5389c
    e9331712
    6b5d974d
    f30c6884
    dcb651c5
    e120c1da
]]></artwork>
        </section>
        <section anchor="rtp-packet-with-empty-2-byte-header-extension-and-csrc-fields-1">
          <name>RTP Packet with empty 2-byte header extension and CSRC fields</name>
          <t>RTP Packet:</t>
          <artwork><![CDATA[
    920f123b
    decafbad
    cafebabe
    0001e240
    0000b26e
    10000000
    abababab
    abababab
    abababab
    abababab
]]></artwork>
          <t>Encrypted RTP Packet:</t>
          <artwork><![CDATA[
    920f123b
    decafbad
    cafebabe
    dcb38c9e
    48bf95f4
    c2de0000
    61ee432c
    f9203170
    76613258
    d3ce4236
    c06ac429
    681ad084
    13512dc9
    8b5207d8
]]></artwork>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
