W3C home > Mailing lists > Public > public-webrtc-logs@w3.org > January 2022

Re: [webrtc-extensions] RTP Header Extension Encryption (#47)

From: Harald Alvestrand via GitHub <sysbot+gh@w3.org>
Date: Fri, 07 Jan 2022 10:26:57 +0000
To: public-webrtc-logs@w3.org
Message-ID: <issue_comment.created-1007300319-1641551216-sysbot+gh@w3.org>
Since this is an extension, we need to consider what happens if the extension is not implemented at one end, and the extension is implemented but defaulted on the other end - also when there are middle boxes like SDP mungers that know / don't know about the extension.

In particular, the scenario:

- Application doesn't care
- Source and destination UAs implement a=cryptex
- Middle box (SFU, for instance) doesn't know about a=cryptex, passes all unknown SDP options blindly
- Middle box depends on reading RTP header extensions (like audio volume)

If the default is "negotiate", header extensions will be encrypted, and hidden from the SFU, despite neither app desiring to hide them.

I think the default (the interpretation when no configuration is given) needs to be "off", unfortunately.

GitHub Notification of comment by alvestrand
Please view or discuss this issue at https://github.com/w3c/webrtc-extensions/issues/47#issuecomment-1007300319 using your GitHub account

Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Friday, 7 January 2022 10:26:59 UTC

This archive was generated by hypermail 2.4.0 : Saturday, 6 May 2023 21:19:55 UTC