Floor Control draft-camarillo-xcon-bfcp-00.txt Issue tracker at:

Slides:



Advertisements
Similar presentations
Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
Advertisements

© 2006 NEC Corporation - Confidential age 1 November SPEERMINT Security Threats and Suggested Countermeasures draft-ietf-speermint-voipthreats-01.
Naming, Addressing, & Discovery
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Remote Procedure Call (RPC)
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Network Security Protocols in Practice Part II.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Real-time Transport Protocol (RTP) Recommendations for SIPREC (draft-eckel-siprec-rtp-rec-01) Charles Eckel IETF-81, Quebec City, July.
Secure Remote Access: SSH. K. Salah 2 What is SSH?  SSH – Secure Shell  SSH is a protocol for secure remote login and other secure network services.
SIP, Session Initiation Protocol Internet Draft, IETF, RFC 2543.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
1 RFC 3486 Compressing the Session Initiation Protocol (SIP) 曾朝弘 電機系 系統組 碩士班一年級.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
XCON Interim Meeting Boston, MA May 26, Note Well All statements related to the activities of the IETF and addressed to the IETF are subject to.
XMPP – Extensible Messaging and Presence Protocol Vidya Satyanarayanan.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Introducing CoMI Aligned with RestCONF (draft-ietf-netconf-restconf-04) Common data modeling language (YANG defined in RFC 6020) Protocol (CoAP instead.
Chapter 21 Distributed System Security Copyright © 2008.
Presented By Team Netgeeks SIP Session Initiation Protocol.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
DNS SRV and NAPTR Use for SPEERMINT - Tom Creighton, Gaurav Khandpur Comcast SPEERMINT Intermin Meeting Philadelphia Sept
Mediactrl Framework draft-melanchuk-mediactrl-framework-00 Tim Melanchuk
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-03.
DNS Discovery Discussion Report Draft-ietf-ipngwg-dns-discovery-01.txt.
19 December 1998EMGnet meeting INRIA Rhône-Alpes1 An Overview of Security Issues in the Web José KAHAN OBLATT W3C/INRIA 19 December 1998.
IETF-81, Quebec City, July 25-29, 2011
1 CPCP Open Issues Hisham Khartabil XCON WG Interim Meeting, Boston 26 th May, 2004
Slide #1 Boston, Jan 5 – 6, 2005XCON WG Interim draft-levin-xcon-cccp-01.txt By Orit Levin
Client/Server Socket Programming Project
MEGACO MIB Matt Holdrege – Ilya Akramovich –
Interactive Connectivity Establishment : ICE
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
SCTP as a transport for Diameter draft-pascual-dime-sctp-00 IETF 79 - DIME WG November 2010,
Speechsc Protocol Proposal Sarvi Shanmugham Cisco Systems Inc. shanmugham-speechsc-00.txt.
March 20th, 2001 SIP WG meeting 50th IETF SIP WG meeting Overlap signalling handling
Introduction of PPSP Yunfei 88 Nov 3, 2013.
Cryptography CSS 329 Lecture 13:SSL.
Process-to-Process Delivery:
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Chapter 7: Transport Layer
Session-Independent Policies draft-ietf-sipping-session-indep-policy-02 Volker Hilt Jonathan Rosenberg Gonzalo.
Chapter 3 outline 3.1 Transport-layer services
Phil Hunt, Hannes Tschofenig
draft-ietf-simple-message-sessions-00 Ben Campbell
IETF 82 BFCPBIS WG Meeting
Transport Layer.
Connection Establishment in BFCP draft-ietf-xcon-bfcp-connection-00
IMTC SIP Interconnect and SuperOp
IMTC SIP Interconnect and SuperOp
draft-ietf-geopriv-lbyr-requirements-02 status update
COSC-100 (Elements of Computer Science) Prof. Juola
Binary Floor Control Protocol BIS (BFCPBIS)
SIP Basics Workshop Dennis Baron July 20, 2005.
SCTP in SDP draft-loreto-mmusic-sctp-sdp-07
Transport Layer Our goals:
Presentation transcript:

Floor Control draft-camarillo-xcon-bfcp-00.txt Issue tracker at:

Outline Requirements CPCP vs. SDP Floor IDs Transport Encoding Security Application-Layer Responses Privacy

Requirements draft-ietf-xcon-floor-control-req-00.txt Have been last called Waiting for a new revision to come up

Establishment Need to provide user name, conf ID, shared secret, and host URI obtained using CPCP SDP Offer/Answer Should we support both mechanisms? m=control 9999 bfcp * a=uri: 1

Floor IDs How do clients learn which floor ID apply to which stream?

Transport Pure client/server protocol –No intermediaries TCP for now –SCTP may be added in the future Transport param NAPTR lookup if no transport param

Transport (cont.) Alternative –Rules to choose transport E.g., if no transport param, TCP is used –Only SRV lookups

Encoding Needs to be binary to meet requirements –TLVs –SUN RPCs

Security Client obtains user ID and shared secret at establishment time Adds a TLV that contains a hash of the messages and the shared secret Confidentiality, if needed, is achieved by using TLS

Floor Request Operation

Application-Layer Responses Only when needed –Add one between (4) and (5) ? –Actions if not received ?

Privacy Should we address privacy? –The identity of the floor requester/holder is not delivered to the other users and the chairs