The security considerations of the RTP specification, the RTP/SAVPF profile, and the various RTP/RTCP extensions and RTP payload formats that form the complete protocol suite described in this memo apply. It is believed that there are no new security considerations resulting from the combination of these various protocol extensions.
The "Extended Secure RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/SAVPF)" document [
RFC 5124] provides the handling of fundamental issues by offering confidentiality, integrity, and partial source authentication. A mandatory-to-implement and use media security solution is created by combining this secured RTP profile and DTLS-SRTP keying [
RFC 5764] as defined in the communication security section of this memo (
Section 7).
RTCP packets convey a CNAME identifier that is used to associate RTP packet streams that need to be synchronized across related RTP sessions. Inappropriate choice of CNAME values can be a privacy concern, since long-term persistent CNAME identifiers can be used to track users across multiple calls. The communication security section of this memo (
Section 7) mandates the generation of short- term persistent RTCP CNAMEs, as specified in [
RFC 7022], so they can't be used for long-term tracking of the users.
Some potential denial-of-service attacks exist if the RTCP reporting interval is configured to an inappropriate value. This could be done by configuring the RTCP bandwidth fraction to an excessively large or small value using the SDP "b=RR:" or "b=RS:" lines [
RFC 3556], or some similar mechanism, or by choosing an excessively large or small value for the RTP/AVPF minimal receiver report interval (if using SDP, this is the "a=rtcp-fb:... trr-int" parameter) [
RFC 4585]. The risks are as follows:
-
The RTCP bandwidth could be configured to make the regular reporting interval so large that effective congestion control cannot be maintained, potentially leading to denial of service due to congestion caused by the media traffic;
-
The RTCP interval could be configured to a very small value, causing endpoints to generate high-rate RTCP traffic, which potentially leads to denial of service due to the non-congestion-controlled RTCP traffic; and
-
RTCP parameters could be configured differently for each endpoint, with some of the endpoints using a large reporting interval and some using a smaller interval, leading to denial of service due to premature participant timeouts, which are due to mismatched timeout periods that are based on the reporting interval (this is a particular concern if endpoints use a small but non-zero value for the RTP/AVPF minimal receiver report interval (trr-int) [RFC 4585], as discussed in [RFC 8108]).
Premature participant timeout can be avoided by using the fixed (non- reduced) minimum interval when calculating the participant timeout [
RFC 8108]. To address the other concerns, endpoints
SHOULD ignore parameters that configure the RTCP reporting interval to be significantly longer than the default five-second interval specified in [
RFC 3550] (unless the media data rate is so low that the longer reporting interval roughly corresponds to 5% of the media data rate) or that configure the RTCP reporting interval small enough that the RTCP bandwidth would exceed the media bandwidth.
The guidelines in [
RFC 6562] apply when using variable bit rate (VBR) audio codecs such as Opus.
Encryption of the header extensions is
RECOMMENDED, unless there are known reasons, like RTP middleboxes performing voice-activity-based source selection or third-party monitoring that will greatly benefit from the information, and this has been expressed using API or signaling. If further evidence is produced to show that information leakage is significant from audio level indications, then the use of encryption needs to be mandated at that time.
In multi-party communication scenarios using RTP middleboxes, the middleboxes are
REQUIRED, by this protocol, to not weaken the sessions' security. The middlebox
SHOULD maintain confidentiality, maintain integrity, and perform source authentication. The middlebox
MAY perform checks that prevent any endpoint participating in a conference to impersonate another. Some additional security considerations regarding multi-party topologies can be found in [
RFC 7667].
The CaptureID is created as part of the CLUE protocol. The CaptId SDES item is used to convey the same CaptureID value in the SDES item. When sending the SDES item, the security considerations specified in
Section 6 of
RFC 7941 and in the communication security section of this memo (see
Section 7) are applicable. Note that since the CaptureID is also carried in CLUE protocol messages, it is
RECOMMENDED that this SDES item use at least similar protection profiles as the CLUE protocol messages carried in the CLUE data channel.