<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wish-whip-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="whip">WebRTC-HTTP ingestion protocol (WHIP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wish-whip-05"/>
    <author initials="S." surname="Murillo" fullname="Sergio Garcia Murillo">
      <organization>Millicast</organization>
      <address>
        <email>sergio.garcia.murillo@cosmosoftware.io</email>
      </address>
    </author>
    <author initials="A." surname="Gouaillard" fullname="Alexandre Gouaillard">
      <organization>CoSMo Software</organization>
      <address>
        <email>alex.gouaillard@cosmosoftware.io</email>
      </address>
    </author>
    <date year="2022" month="October" day="19"/>
    <area>ART</area>
    <workgroup>wish</workgroup>
    <keyword>WebRTC</keyword>
    <abstract>
      <t>This document describes a simple HTTP-based protocol that will allow WebRTC-based ingestion of content into streaming services and/or CDNs.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>While WebRTC has been very successful in a wide range of scenarios, its adoption in the broadcasting/streaming industry is lagging behind.</t>
      <t>The IETF RTCWEB working group standardized JSEP (<xref target="RFC8829"/>), a mechanism used to control the setup, management, and teardown of a multimedia session. It also describes how to negotiate media flows using the Offer/Answer Model with the Session Description Protocol (SDP) <xref target="RFC3264"/> as well as the formats for data sent over the wire (e.g., media types, codec parameters, and encryption). WebRTC intentionally does not specify a signaling transport protocol at application level. This flexibility has allowed the implementation of a wide range of services. However, those services are typically standalone silos which don't require interoperability with other services or leverage the existence of tools that can communicate with them.</t>
      <t>In the broadcasting/streaming world, the use of hardware encoders that make it very simple to plug in cables carrying raw media, encode it in-place, and push it to any streaming service or CDN ingest is already ubiquitous. The adoption of a custom signaling transport protocol for each WebRTC service has hindered broader adoption as an ingestion protocol.</t>
      <t>While some standard signaling protocols are available that can be integrated with WebRTC, like SIP <xref target="RFC3261"/> or XMPP <xref target="RFC6120"/>, they are not designed to be used in broadcasting/streaming services, and there also is no sign of adoption in that industry. RTSP <xref target="RFC7826"/>, which is based on RTP and may be the closest in terms of features to WebRTC, is not compatible with the SDP offer/answer model <xref target="RFC3264"/>.</t>
      <t>So, currently, there is no standard protocol designed for ingesting media into a streaming service using WebRTC and so content providers still rely heavily on protocols like RTMP for doing so. Most of those protocols are not RTP based, requiring media protocol translation when doing egress via WebRTC. Avoiding this media protocol translation is desirable as there is no functional parity between those protocols and WebRTC and it increases the implementation complexity at the media server side.</t>
      <t>Also, the media codecs used in those protocols tend to be limited and not negotiated, not always matching the mediac codes supported in WebRTC. This requires transcoding on the ingest node, which introduces delay, degrades media quality and increases the processing workload required on the server side. Server side transcoding that has traditionally been done to present multiple renditions in Adaptive Bit Rate Streaming (ABR) implementations can be replaced with Simulcast <xref target="RFC8853"/> and SVC codecs that are well supported by WebRTC clients. In addition, WebRTC clients can adjust client-side encoding parameters based on RTCP feedback to maximize encoding quality.</t>
      <t>This document proposes a simple protocol for supporting WebRTC as media ingestion method which:</t>
      <ul spacing="normal">
        <li>Is easy to implement,</li>
        <li>Is as easy to use as popular IP-based broadcast protocols</li>
        <li>Is fully compliant with WebRTC and RTCWEB specs</li>
        <li>Allows for ingest both in traditional media platforms and in WebRTC end-to-end platforms with the lowest possible latency.</li>
        <li>Lowers the requirements on both hardware encoders and broadcasting services to support WebRTC.</li>
        <li>Is usable both in web browsers and in native encoders.</li>
      </ul>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>WHIP client: WebRTC media encoder or producer that acts as a client of the WHIP protocol by encoding and delivering the media to a remote Media Server.</li>
        <li>WHIP endpoint: Ingest server receiving the initial WHIP request.<em>**</em></li>
        <li>WHIP endpoint URL: URL of the WHIP endpoint that will create the WHIP resource.</li>
        <li>Media Server: WebRTC Media Server or consumer that establishes the media session with the WHIP client and receives the media produced by it.</li>
        <li>WHIP resource: Allocated resource by the WHIP endpoint for an ongoing ingest session that the WHIP client can send requests for altering the session (ICE operations or termination, for example).</li>
        <li>WHIP resource URL: URL allocated to a specific media session by the WHIP endpoint which can be used to perform operations such as terminating the session or ICE restarts.</li>
      </ul>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The WebRTC-HTTP Ingest Protocol (WHIP) uses an HTTP POST request to perform a single-shot SDP offer/answer so an ICE/DTLS session can be established between the encoder/media producer (WHIP client) and the broadcasting ingestion endpoint (Media Server).</t>
      <t>Once the ICE/DTLS session is set up, the media will flow unidirectionally from the encoder/media producer (WHIP client) to the broadcasting ingestion endpoint (Media Server). In order to reduce complexity, no SDP renegotiation is supported, so no tracks or streams can be added or removed once the initial SDP offer/answer over HTTP is completed.</t>
      <figure>
        <name>WHIP session setup and teardown</name>
        <artwork><![CDATA[
                                                                               
 +-------------+    +---------------+ +--------------+ +---------------+
 | WHIP client |    | WHIP endpoint | | Media Server | | WHIP Resource |
 +--+----------+    +---------+-----+ +------+-------+ +--------|------+
    |                         |              |                  |       
    |                         |              |                  |       
    |HTTP POST (SDP Offer)    |              |                  |       
    +------------------------>+              |                  |       
    |201 Created (SDP answer) |              |                  |       
    +<------------------------+              |                  |       
    |          ICE REQUEST                   |                  |       
    +--------------------------------------->+                  |       
    |          ICE RESPONSE                  |                  |       
    |<---------------------------------------+                  |       
    |          DTLS SETUP                    |                  |       
    |<======================================>|                  |       
    |          RTP/RTCP FLOW                 |                  |       
    +<-------------------------------------->+                  |       
    | HTTP DELETE                                               |       
    +---------------------------------------------------------->+       
    | 200 OK                                                    |       
    <-----------------------------------------------------------x       
                                                                               
]]></artwork>
      </figure>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <t>In order to set up an ingestion session, the WHIP client will generate an SDP offer according to the JSEP rules and perform an HTTP POST request to the configured WHIP endpoint URL.</t>
      <t>The HTTP POST request will have a content type of "application/sdp" and contain the SDP offer as the body. The WHIP endpoint will generate an SDP answer and return a "201 Created" response with a content type of "application/sdp", the SDP answer as the body, and a Location header field pointing to the newly created resource.</t>
      <t>The SDP offer <bcp14>SHOULD</bcp14> use the "sendonly" attribute and the SDP answer <bcp14>MUST</bcp14> use the "recvonly" attribute.</t>
      <figure>
        <name>HTTP POST doing SDP O/A example</name>
        <artwork><![CDATA[
POST /whip/endpoint HTTP/1.1
Host: whip.example.com
Content-Type: application/sdp
Content-Length: 1326

v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=msid-semantic: WMS
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:EsAw
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:EsAw
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

HTTP/1.1 201 Created
ETag: "xyzzy"
Content-Type: application/sdp
Content-Length: 1400
Location: https://whip.example.com/resource/id

v=0
o=- 1657793490019 1 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-lite
a=msid-semantic: WMS *
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:38sdf4fdsf54
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:38sdf4fdsf54
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96
]]></artwork>
      </figure>
      <t>Once a session is setup, ICE consent freshness <xref target="RFC7675"/> will be used to detect non graceful disconnection and DTLS teardown for session termination by either side.</t>
      <t>To explicitly terminate a session, the WHIP client <bcp14>MUST</bcp14> perform an HTTP DELETE request to the resource URL returned in the Location header field of the initial HTTP POST. Upon receiving the HTTP DELETE request, the WHIP resource will be removed and the resources freed on the Media Server, terminating the ICE and DTLS sessions.</t>
      <t>A Media Server terminating a session <bcp14>MUST</bcp14> follow the procedures in <xref target="RFC7675"/> section 5.2 for immediate revocation of consent.</t>
      <t>The WHIP endpoints <bcp14>MUST</bcp14> return an HTTP 405 response for any HTTP GET, HEAD or PUT requests on the endpoint URL in order to reserve its usage for future versions of this protocol specification.</t>
      <t>The WHIP endpoint <bcp14>MUST</bcp14> support OPTIONS requests for Cross-Origin Resource Sharing (CORS) as defined in <xref target="FETCH"/> and it <bcp14>SHOULD</bcp14> include an "Accept-Post" header with a mime type value of "application/sdp" on the "200 OK" response to any OPTIONS request recevied as per <xref target="W3C.REC-ldp-20150226"/>.</t>
      <t>The WHIP resources <bcp14>MUST</bcp14> return an HTTP 405 response for any HTTP GET, HEAD, POST or PUT requests on the resource URL in order to reserve its usage for future versions of this protocol specification.</t>
      <section anchor="ice-and-nat-support">
        <name>ICE and NAT support</name>
        <t>The initial offer by the WHIP client <bcp14>MAY</bcp14> be sent after the full ICE gathering is complete with the full list of ICE candidates, or it <bcp14>MAY</bcp14> only contain local candidates (or even an empty list of candidates) as per <xref target="RFC8863"/>.</t>
        <t>In order to simplify the protocol, there is no support for exchanging gathered trickle candidates from Media Server ICE candidates once the SDP answer is sent. The WHIP Endpoint <bcp14>SHALL</bcp14> gather all the ICE candidates for the Media Server before responding to the client request and the SDP answer <bcp14>SHALL</bcp14> contain the full list of ICE candidates of the Media Server. The Media Server <bcp14>MAY</bcp14> use ICE lite, while the WHIP client <bcp14>MUST</bcp14> implement full ICE.</t>
        <t>The WHIP client <bcp14>MAY</bcp14> perform trickle ICE or ICE restarts as per <xref target="RFC8838"/> by sending an HTTP PATCH request to the WHIP resource URL with a body containing a SDP fragment with MIME type "application/trickle-ice-sdpfrag" as specified in <xref target="RFC8840"/>. When used for trickle ICE, the body of this PATCH message will contain the new ICE candidate; when used for ICE restarts, it will contain a new ICE ufrag/pwd pair.</t>
        <t>Trickle ICE and ICE restart support is <bcp14>OPTIONAL</bcp14> for a WHIP resource.</t>
        <t>If the WHIP resource supports either Trickle ICE or ICE restarts, the WHIP endpoint <bcp14>MUST</bcp14> include an "Accept-Patch" header with a mime type value of "application/trickle-ice-sdpfrag" in the "201 Created" of the POST request that creates the WHIP resource as per <xref target="RFC5789"/> section 3.1.</t>
        <t>If the WHIP resource supports either Trickle ICE or ICE restarts, but not both, it <bcp14>MUST</bcp14> return a 405 (Not Implemented) for the HTTP PATCH requests that are not supported.</t>
        <t>If the  WHIP resource does not support the PATCH method for any purpose,  it returns a 501 (Not Implemented), as described in <xref target="RFC9110"/> section 6.6.2.</t>
        <t>As the HTTP PATCH request sent by a WHIP client may be received out-of-order by the WHIP resource, the WHIP resource <bcp14>MUST</bcp14> generate a
unique strong entity-tag identifying the ICE session as per <xref target="RFC9110"/> section 2.3. The initial value of the entity-tag identifying the initial ICE session <bcp14>MUST</bcp14> be returned in an ETag header field in the "201 response" to the initial POST request to the WHIP endpoint. It <bcp14>MUST</bcp14> also be returned in the "200 OK" of any PATCH request that triggers an ICE restart. Note that including the ETag in the original "201 Created" response is only <bcp14>REQUIRED</bcp14> if the WHIP resource supports ICE restarts and <bcp14>OPTIONAL</bcp14> otherwise.</t>
        <t>A WHIP client sending a PATCH request for performing trickle ICE <bcp14>MUST</bcp14> include an "If-Match" header field with the latest known entity-tag as per <xref target="RFC9110"/> section 3.1. When the PATCH request is received by the WHIP resource, it <bcp14>MUST</bcp14> compare the indicated entity-tag value with the current entity-tag of the resource as per <xref target="RFC9110"/> section 3.1 and return a "412 Precondition Failed" response if they do not match.</t>
        <t>WHIP clients <bcp14>SHOULD NOT</bcp14> use entity-tag validation when matching a specific ICE session is not required, such as for example when initiating a DELETE request to terminate a session.</t>
        <t>A WHIP resource receiving a PATCH request with new ICE candidates, but which does not perform an ICE restart, <bcp14>MUST</bcp14> return a "204 No Content" response without body. If the Media Server does not support a candidate transport or is not able to resolve the connection address, it <bcp14>MUST</bcp14> accept the HTTP request with the 204 response and silently discard the candidate.</t>
        <figure>
          <name>Trickle ICE request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whip.example.com
If-Match: "xyzzy"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 548

a=ice-ufrag:EsAw
a=ice-pwd:P2uYro0UCOQ4zxjKXaWCBui1
m=audio 9 RTP/AVP 0
a=mid:0
a=candidate:1387637174 1 udp 2122260223 192.0.2.1 61764 typ host generation 0 ufrag EsAw network-id 1
a=candidate:3471623853 1 udp 2122194687 198.51.100.1 61765 typ host generation 0 ufrag EsAw network-id 2
a=candidate:473322822 1 tcp 1518280447 192.0.2.1 9 typ host tcptype active generation 0 ufrag EsAw network-id 1
a=candidate:2154773085 1 tcp 1518214911 198.51.100.2 9 typ host tcptype active generation 0 ufrag EsAw network-id 2
a=end-of-candidates

HTTP/1.1 204 No Content
]]></artwork>
        </figure>
        <t>A WHIP client sending a PATCH request for performing ICE restart <bcp14>MUST</bcp14> contain an "If-Match" header field with a field-value "*" as per <xref target="RFC9110"/> section 3.1.</t>
        <t>If the HTTP PATCH request results in an ICE restart, the WHIP resource <bcp14>SHALL</bcp14> return a "200 OK" with an "application/trickle-ice-sdpfrag" body containing the new ICE username fragment and password. Also, the "200 OK" response for a successful ICE restart <bcp14>MUST</bcp14> contain the new entity-tag corresponding to the new ICE session in an ETag response header field and <bcp14>MAY</bcp14> contain a new set of ICE candidates for the Media Server.</t>
        <t>If the ICE request cannot be satisfied by the WHIP resource, the resource <bcp14>MUST</bcp14> return an appropriate HTTP error code and <bcp14>MUST NOT</bcp14> terminate the session immediately. The WHIP client <bcp14>MAY</bcp14> retry performing a new ICE restart or terminate the session by issuing an HTTP DELETE request instead. In either case, the session <bcp14>MUST</bcp14> be terminated if the ICE consent expires as a consequence of the failed ICE restart as per <xref target="RFC7675"/> section 5.1.</t>
        <figure>
          <name>ICE restart request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whip.example.com
If-Match: "*"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 54

a=ice-ufrag:ysXw
a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k

HTTP/1.1 200 OK
ETag: "abccd"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 102

a=ice-lite
a=ice-ufrag:289b31b754eaa438
a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
]]></artwork>
        </figure>
        <t>Because the WHIP client needs to know the entity-tag associated with the ICE session in order to send new ICE candidates, it <bcp14>MUST</bcp14> buffer any gathered candidates before it receives the HTTP response to the initial POST request or the PATCH request with the new entity-tag value. Once it knows the entity-tag value, the WHIP client <bcp14>SHOULD</bcp14> send a single aggregated HTTP PATCH request with all the ICE candidates it has buffered so far.</t>
        <t>In case of unstable network conditions, the ICE restart HTTP PATCH requests and responses might be received out of order. In order to mitigate this scenario, when the client performs an ICE restart, it <bcp14>MUST</bcp14> discard any previous ice username/pwd frags and ignore any further HTTP PATCH response received from a pending HTTP PATCH request. Clients <bcp14>MUST</bcp14> apply only the ICE information received in the response to the last sent request. If there is a mismatch between the ICE information at the client and at the server (because of an out-of-order request), the STUN requests will contain invalid ICE information and will be rejected by the server. When this situation is detected by the WHIP Client, it <bcp14>SHOULD</bcp14> send a new ICE restart request to the server.</t>
      </section>
      <section anchor="webrtc-constraints">
        <name>WebRTC constraints</name>
        <t>In the specific case of media ingestion into a streaming service, some assumptions can be made about the server-side which simplifies the WebRTC compliance burden, as detailed in WebRTC-gateway document <xref target="I-D.draft-ietf-rtcweb-gateways"/>.</t>
        <t>In order to reduce the complexity of implementing WHIP in both clients and Media Servers, WHIP imposes the following restrictions regarding WebRTC usage:</t>
        <t>Both the WHIP client and the WHIP endpoint <bcp14>SHALL</bcp14> use SDP bundle <xref target="RFC9143"/>. Each "m=" section <bcp14>MUST</bcp14> be part of a single BUNDLE group. Hence, when a WHIP client sends an SDP offer, it <bcp14>MUST</bcp14> include a "bundle-only" attribute in each bundled "m=" section. The WHIP client and the Media Server <bcp14>MUST</bcp14> support multiplexed media associated with the BUNDLE group as per <xref target="RFC9143"/> section 9. In addition, per <xref target="RFC9143"/> the WHIP client and Media Server will use RTP/RTCP multiplexing for all bundled media. The WHIP client and Media Server <bcp14>SHOULD</bcp14> include the "rtcp-mux-only" attribute in each bundled "m=" sections as per <xref target="RFC8858"/>.</t>
        <t>While this version of the specification only supports a single audio and video track, in order to ensure forward compatibility, if the number of audio and or video tracks or number streams is not supported by the WHIP Endpoint, it <bcp14>MUST</bcp14> reject the HTTP POST request with a 406 Not Acceptable error code.</t>
        <t>Furthermore, the WHIP Endpoint <bcp14>SHOULD NOT</bcp14> reject individual "m=" sections as per <xref target="RFC8829"/> section 5.3.1 in case there is any error processing the "m=" section, but reject the HTTP POST request with a 406 Not Acceptable error code to prevent having partially successful WHIP sessions.</t>
        <t>When a WHIP client sends an SDP offer, it <bcp14>SHOULD</bcp14> insert an SDP "setup" attribute with an "actpass" attribute value, as defined in <xref target="RFC8842"/>. However, if the WHIP client only implements the DTLS client role, it <bcp14>MAY</bcp14> use an SDP "setup" attribute with an "active" attribute value. If the WHIP endpoint does not support an SDP offer with an SDP "setup" attribute with an "active" attribute value, it <bcp14>SHOULD</bcp14> reject the request with a 422 Unprocessable Entity response.</t>
        <t>NOTE: <xref target="RFC8842"/> defines that the offerer must insert an SDP "setup" attribute with an "actpass" attribute value. However, the WHIP client will always communicate with a Media Server that is expected to support the DTLS server role, in which case the client might choose to only implement support for the DTLS client role.</t>
        <t>Trickle ICE and ICE restarts support is <bcp14>OPTIONAL</bcp14> for both the WHIP clients and Media Servers as explained in section 4.1.</t>
      </section>
      <section anchor="load-balancing-and-redirections">
        <name>Load balancing and redirections</name>
        <t>WHIP endpoints and Media Servers might not be colocated on the same server, so it is possible to load balance incoming requests to different Media Servers. WHIP clients <bcp14>SHALL</bcp14> support HTTP redirection via the "307 Temporary Redirect response code" as described in <xref target="RFC9110"/> section 6.4.7. The WHIP resource URL <bcp14>MUST</bcp14> be a final one, and redirections are not required to be supported for the PATCH and DELETE requests sent to it.</t>
        <t>In case of high load, the WHIP endpoints <bcp14>MAY</bcp14> return a 503 (Service Unavailable) status code indicating that the server is currently unable to handle the request due to a temporary overload or scheduled maintenance, which will likely be alleviated after some delay. The WHIP endpoint might send a Retry-After header field indicating the minimum time that the user agent ought to wait before making a follow-up request.</t>
      </section>
      <section anchor="stunturn-server-configuration">
        <name>STUN/TURN server configuration</name>
        <t>The WHIP endpoint <bcp14>MAY</bcp14> return STUN/TURN server configuration URLs and credentials usable by the client in the "201 Created" response to the HTTP POST request to the WHIP endpoint URL.</t>
        <t>Each STUN/TURN server will be returned using the "Link" header field <xref target="RFC8288"/> with a "rel"" attribute value of "ice-server". The Link target URI is the server URL as defined in <xref target="RFC7064"/> and <xref target="RFC7065"/>. The credentials are encoded in the Link target attributes as follows:</t>
        <ul spacing="normal">
          <li>username: If the Link header field represents a TURN server, and credential-type is "password", then this attribute specifies the username to use with that TURN server.</li>
          <li>credential: If the "credential-type" attribute is missing or has a "password" value, the credential attribute represents a long-term authentication password, as described in <xref target="RFC8489"/>, Section 10.2.</li>
          <li>credential-type: If the Link header field represents a TURN server, then this attribute specifies how the credential attribute value should be used when that TURN server requests authorization. The default value if the attribute is not present is "password".</li>
        </ul>
        <figure>
          <name>Example ICE server configuration</name>
          <artwork><![CDATA[
     Link: <stun:stun.example.net>; rel="ice-server"
     Link: <turn:turn.example.net?transport=udp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
     Link: <turn:turn.example.net?transport=tcp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
     Link: <turns:turn.example.net?transport=tcp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
]]></artwork>
        </figure>
        <t>NOTE: The naming of both the "rel" attribute value of "ice-server" and the target attributes follows the one used on the W3C WebRTC recommendation <xref target="W3C.REC-webrtc-20210126"/> RTCConfiguration dictionary in section 4.2.1. "rel" attribute value of "ice-server" is not prepended with the "urn:ietf:params:whip:" so it can be reused by other specifications which may use this mechanism to configure the usage of STUN/TURN servers.</t>
        <t>NOTE: Depending on the ICE Agent implementation, the WHIP client may need to call the setConfiguration method before calling the setLocalDescription method with the local SDP offer in order to avoid having to perform an ICE restart for applying the updated STUN/TURN server configuration on the next ICE gathering phase.</t>
        <t>There are some WebRTC implementations that do not support updating the STUN/TURN server configuration after the local offer has been created as specified in <xref target="RFC8829"/> section 4.1.18. In order to support these clients, the WHIP endpoint <bcp14>MAY</bcp14> also include the STUN/TURN server configuration on the responses to OPTIONS request sent to the WHIP endpoint URL before the POST request is sent. However, this method is not <bcp14>NOT RECOMMENDED</bcp14> and if supported by the underlying WHIP Client's webrtc implementation, the WHIP Client <bcp14>SHOULD</bcp14> wait for the information to be returned by the WHIP Endpoint on the response of the HTTP POST request instead.</t>
        <t>The generation of the TURN server credentials may require performing a request to an external provider, which can both add latency to the OPTIONS request processing and increase the processing required to handle that request. In order to prevent this, the WHIP Endpoint <bcp14>SHOULD NOT</bcp14> return the STUN/TURN server configuration if the OPTIONS request is a preflight request for CORS, that is, if The OPTIONS request does not contain an Access-Control-Request-Method with "POST" value and the the Access-Control-Request-Headers HTTP header does not contain the "Link" value.</t>
        <t>It might be also possible to configure the STUN/TURN server URLs with long term credentials provided by either the broadcasting service or an external TURN provider on the WHIP client, overriding the values provided by the WHIP endpoint.</t>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and authorization</name>
        <t>WHIP endpoints and resources <bcp14>MAY</bcp14> require the HTTP request to be authenticated using an HTTP Authorization header field with a Bearer token as specified in <xref target="RFC6750"/> section 2.1. WHIP clients <bcp14>MUST</bcp14> implement this authentication and authorization mechanism and send the HTTP Authorization header field in all HTTP requests sent to either the WHIP endpoint or resource except the preflight OPTIONS requests for CORS.</t>
        <t>The nature, syntax, and semantics of the bearer token, as well as how to distribute it to the client, is outside the scope of this document. Some examples of the kind of tokens that could be used are, but are not limited to, JWT tokens as per <xref target="RFC6750"/> and <xref target="RFC8725"/> or a shared secret stored on a database. The tokens are typically made available to the end user alongside the WHIP endpoint URL and configured on the WHIP clients (similar to the way RTMP URLs and Stream Keys are distributed).</t>
        <t>WHIP endpoints and resources could perform the authentication and authorization by encoding an authentication token within the URLs for the WHIP endpoints or resources instead. In case the WHIP client is not configured to use a bearer token, the HTTP Authorization header field must not be sent in any request.</t>
      </section>
      <section anchor="simulcast-and-scalable-video-coding">
        <name>Simulcast and scalable video coding</name>
        <t>Both Simulcast <xref target="RFC8853"/> and Scalable Video Coding (SVC), including K-SVC (also known as "S modes", in which multiple encodings are sent on the same SSRC), <bcp14>MAY</bcp14> be supported by both the Media Servers and WHIP clients through negotiation in the SDP offer/answer.</t>
        <t>If the client supports simulcast and wants to enable it for publishing, it <bcp14>MUST</bcp14> negotiate the support in the SDP offer according to the procedures in <xref target="RFC8853"/> section 5.3. A server accepting a simulcast offer <bcp14>MUST</bcp14> create an answer according to the procedures <xref target="RFC8853"/> section 5.3.2.</t>
      </section>
      <section anchor="protocol-extensions">
        <name>Protocol extensions</name>
        <t>In order to support future extensions to be defined for the WHIP protocol, a common procedure for registering and announcing the new extensions is defined.</t>
        <t>Protocol extensions supported by the WHIP server <bcp14>MUST</bcp14> be advertised to the WHIP client in the "201 Created" response to the initial HTTP POST request sent to the WHIP endpoint. The WHIP endpoint <bcp14>MUST</bcp14> return one "Link" header field for each extension, with the extension "rel" type attribute and the URI for the HTTP resource that will be available for receiving requests related to that extension.</t>
        <t>Protocol extensions are optional for both WHIP clients and servers. WHIP clients <bcp14>MUST</bcp14> ignore any Link attribute with an unknown "rel" attribute value and WHIP servers <bcp14>MUST NOT</bcp14> require the usage of any of the extensions.</t>
        <t>Each protocol extension <bcp14>MUST</bcp14> register a unique "rel" attribute value at IANA starting with the prefix: "urn:ietf:params:whip:ext" as defined in <xref target="urn-whip-subspace"/>.</t>
        <t>For example, considering a potential extension of server-to-client communication using server-sent events as specified in https://html.spec.whatwg.org/multipage/server-sent-events.html#server-sent-events, the URL for connecting to the server side event resource for the published stream could be returned in the initial HTTP "201 Created" response with a "Link" header field and a "rel" attribute of "urn:ietf:params:whip:ext:example:server-sent-events". (This document does not specify such an extension, and uses it only as an example.)</t>
        <t>In this theoretical case, the HTTP 201 response to the HTTP POST request would look like:</t>
        <artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/sdp
Location: https://whip.example.com/resource/id
Link: <https://whip.ietf.org/publications/213786HF/sse>;
      rel="urn:ietf:params:whip:ext:example:server-side-events"
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>HTTPS <bcp14>SHALL</bcp14> be used in order to preserve the WebRTC security model.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification adds a new link relation type and a registry for URN sub-namespaces for WHIP protocol extensions.</t>
      <section anchor="link-relation-type-ice-server">
        <name>Link Relation Type: ice-server</name>
        <t>The link relation type below has been registered by IANA per Section 4.2 of <xref target="RFC8288"/>.</t>
        <t>Relation Name: ice-server</t>
        <t>Description: For the WHIP protocol, conveys the STUN and TURN servers that can be used by an ICE Agent to establish a connection with a peer.</t>
        <t>Reference: TBD</t>
      </section>
      <section anchor="registration-of-whip-urn-sub-namespace-and-whip-registry">
        <name>Registration of WHIP URN Sub-namespace and WHIP Registry</name>
        <t>IANA has added an entry to the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers" registry and created a sub-namespace for the Registered Parameter Identifier as per <xref target="RFC3553"/>: "urn:ietf:params:whip".</t>
        <t>To manage this sub-namespace, IANA has created the "WebRTC-HTTP ingestion protocol (WHIP) URIs" registry, which is used to manage entries within the "urn:ietf:params:whip" namespace. The registry description is as follows:</t>
        <ul spacing="normal">
          <li>Registry name: WHIP</li>
          <li>Specification: this document (RFC TBD)</li>
          <li>Repository: See Section <xref target="urn-whip-subspace"/></li>
          <li>Index value: See Section <xref target="urn-whip-subspace"/></li>
        </ul>
      </section>
      <section anchor="urn-whip-subspace">
        <name>URN Sub-namespace for WHIP</name>
        <t>WHIP Endpoint utilizes URIs to identify the supported WHIP protocol extensions on the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/>.</t>
        <t>This section creates and registers an IETF URN Sub-namespace for use in the WHIP specifications and future extensions.</t>
        <section anchor="specification-template">
          <name>Specification Template</name>
          <t>Namespace ID:</t>
          <ul spacing="normal">
            <li>The Namespace ID "whip" has been assigned.</li>
          </ul>
          <t>Registration Information:</t>
          <ul spacing="normal">
            <li>Version: 1</li>
            <li>Date: TBD</li>
          </ul>
          <t>Declared registrant of the namespace:</t>
          <ul spacing="normal">
            <li>Registering organization: The Internet Engineering Task Force.</li>
            <li>Designated contact: A designated expert will monitor the WHIP public mailing list, "wish@ietf.org".</li>
          </ul>
          <t>Declaration of Syntactic Structure:</t>
          <ul spacing="normal">
            <li>The Namespace Specific String (NSS) of all URNs that use the "whip" Namespace ID shall have the following structure: urn:ietf:params:whip:{type}:{name}:{other}.</li>
            <li>
              <t>The keywords have the following meaning:  </t>
              <ul spacing="normal">
                <li>type: The entity type. This specification only defines the "ext" type.</li>
                <li>name: A required US-ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines a major namespace of a WHIP protocol extension. The value <bcp14>MAY</bcp14> also be an industry name or organization name.</li>
                <li>other: Any US-ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines the sub-namespace (which <bcp14>MAY</bcp14> be further broken down in namespaces delimited by colons) as needed to uniquely identify an WHIP protocol extension.</li>
              </ul>
            </li>
          </ul>
          <t>Relevant Ancillary Documentation:</t>
          <ul spacing="normal">
            <li>None</li>
          </ul>
          <t>Identifier Uniqueness Considerations:</t>
          <ul spacing="normal">
            <li>The designated contact shall be responsible for reviewing and enforcing uniqueness.</li>
          </ul>
          <t>Identifier Persistence Considerations:</t>
          <ul spacing="normal">
            <li>Once a name has been allocated, it <bcp14>MUST NOT</bcp14> be reallocated for a different purpose.</li>
            <li>The rules provided for assignments of values within a sub-namespace <bcp14>MUST</bcp14> be constructed so that the meanings of values cannot change.</li>
            <li>This registration mechanism is not appropriate for naming values whose meanings may change over time.</li>
          </ul>
          <t>Process of Identifier Assignment:</t>
          <ul spacing="normal">
            <li>Namespace with type "ext" (e.g., "urn:ietf:params:whip:ext") is reserved for IETF-approved WHIP specifications.</li>
          </ul>
          <t>Process of Identifier Resolution:</t>
          <ul spacing="normal">
            <li>None specified.</li>
          </ul>
          <t>Rules for Lexical Equivalence:</t>
          <ul spacing="normal">
            <li>No special considerations; the rules for lexical equivalence specified in <xref target="RFC8141"/> apply.</li>
          </ul>
          <t>Conformance with URN Syntax:</t>
          <ul spacing="normal">
            <li>No special considerations.</li>
          </ul>
          <t>Validation Mechanism:</t>
          <ul spacing="normal">
            <li>None specified.</li>
          </ul>
          <t>Scope:</t>
          <ul spacing="normal">
            <li>Global.</li>
          </ul>
        </section>
      </section>
      <section anchor="registering-whip-protocol-extensions-uris">
        <name>Registering WHIP Protocol Extensions URIs</name>
        <t>This section defines the process for registering new WHIP protocol extensions URIs with IANA in the "WebRTC-HTTP ingestion protocol (WHIP) URIs" registry (see <xref target="urn-whip-subspace"/>).</t>
        <t>A WHIP Protocol Extension URI is used as a value in the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/> for the purpose of signaling the WHIP protocol extensions supported by the WHIP Endpoints.</t>
        <t>WHIP Protocol Extensions URIs have a "ext" type as defined in <xref target="urn-whip-subspace"/>.</t>
        <section anchor="registration-procedure">
          <name>Registration Procedure</name>
          <t>The IETF has created a mailing list, "wish@ietf.org", which can be used
   for public discussion of WHIP protocol extensions proposals prior to registration.
   Use of the mailing list is strongly encouraged.  The IESG has
   appointed a designated expert <xref target="RFC8126"/> who will monitor the
   wish@ietf.orgg mailing list and review registrations.</t>
          <t>Registration of new "ext" type URI (in the namespace
   "urn:ietf:params:whip:ext") belonging to a WHIP Protocol Extension <bcp14>MUST</bcp14> be reviewed by the
   designated expert and published in an RFC.  An RFC is <bcp14>REQUIRED</bcp14> for
   the registration of new value data types that modify existing
   properties. An RFC is also <bcp14>REQUIRED</bcp14> for registration of WHEP Protocol Extensions
   URIs that modify WHEP Protocol Extensions previously documented in an existing
   RFC.</t>
          <t>The registration procedure begins when a completed registration
   template, defined in the sections below, is sent to wish@ietf.org and
   iana@iana.org.  Within two weeks, the designated expert is expected
   to tell IANA and the submitter of the registration whether the
   registration is approved, approved with minor changes, or rejected
   with cause.  When a registration is rejected with cause, it can be
   resubmitted if the concerns listed in the cause are addressed.</t>
          <t>Decisions made by the designated expert can be appealed to the IESG
   Applications Area Director, then to the IESG. They follow the normal
   appeals procedure for IESG decisions.</t>
          <t>Once the registration procedure concludes successfully, IANA creates
   or modifies the corresponding record in the WHIP Protocol Extension registry.
   The completed registration template is discarded.</t>
          <t>An RFC specifying one or more new WHIP Protocol Extension URIs <bcp14>MUST</bcp14> include the
   completed registration templates, which <bcp14>MAY</bcp14> be expanded with
   additional information. These completed templates are intended to go
   in the body of the document, not in the IANA Considerations section.
   The RFC <bcp14>SHOULD</bcp14> include any attributes defined.</t>
        </section>
        <section anchor="whip-protocol-extension-registration-template">
          <name>WHIP Protocol Extension Registration Template</name>
          <t>A WHIP Protocol Extension URI is defined by completing the following template:</t>
          <ul spacing="normal">
            <li>URI: A unique URI for the WHIP Protocol Extension (e.g., "urn:ietf:params:whip:ext:example:server-sent-events").</li>
            <li>Reference: A formal reference to the publicly available specification</li>
            <li>Name: A descriptive name of the WHIP Protocol Extension extension (e.g., "Sender Side events").</li>
            <li>Description: A short phrase describing the function of the extension</li>
            <li>Contact information: Contact information for the organization or person making the registration</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Lorenzo Miniero, Juliusz Chroboczek, Adam Roach, Nils Ohlmeier, Christer Holmberg, Cameron Elliott, Gustavo Garcia, Jonas Birme and everyone else in the WebRTC community that have provided comments, feedback, text and improvement proposals on the document and contributed early implementations of the spec.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8829" target="https://www.rfc-editor.org/info/rfc8829">
          <front>
            <title>JavaScript Session Establishment Protocol (JSEP)</title>
            <author fullname="J. Uberti" initials="J." surname="Uberti">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes the mechanisms for allowing a JavaScript application to control the signaling plane of a multimedia session via the interface specified in the W3C RTCPeerConnection API and discusses how this relates to existing signaling protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8829"/>
          <seriesInfo name="DOI" value="10.17487/RFC8829"/>
        </reference>
        <reference anchor="RFC3264" target="https://www.rfc-editor.org/info/rfc3264">
          <front>
            <title>An Offer/Answer Model with Session Description Protocol (SDP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
              <organization/>
            </author>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document defines a mechanism by which two entities can make use of the Session Description Protocol (SDP) to arrive at a common view of a multimedia session between them.  In the model, one participant offers the other a description of the desired session from their perspective, and the other participant answers with the desired session from their perspective.  This offer/answer model is most useful in unicast sessions where information from both participants is needed for the complete view of the session.  The offer/answer model is used by protocols like the Session Initiation Protocol (SIP).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3264"/>
          <seriesInfo name="DOI" value="10.17487/RFC3264"/>
        </reference>
        <reference anchor="RFC8853" target="https://www.rfc-editor.org/info/rfc8853">
          <front>
            <title>Using Simulcast in Session Description Protocol (SDP) and RTP Sessions</title>
            <author fullname="B. Burman" initials="B." surname="Burman">
              <organization/>
            </author>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund">
              <organization/>
            </author>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar">
              <organization/>
            </author>
            <author fullname="M. Zanaty" initials="M." surname="Zanaty">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>In some application scenarios, it may be desirable to send multiple differently encoded versions of the same media source in different RTP streams. This is called simulcast. This document describes how to accomplish simulcast in RTP and how to signal it in the Session Description Protocol (SDP).  The described solution uses an RTP/RTCP identification method to identify RTP streams belonging to the same media source and makes an extension to SDP to indicate that those RTP streams are different simulcast formats of that media source. The SDP extension consists of a new media-level SDP attribute that expresses capability to send and/or receive simulcast RTP streams.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8853"/>
          <seriesInfo name="DOI" value="10.17487/RFC8853"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7675" target="https://www.rfc-editor.org/info/rfc7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="W3C.REC-ldp-20150226" target="https://www.w3.org/TR/2015/REC-ldp-20150226/">
          <front>
            <title>Linked Data Platform 1.0</title>
            <author fullname="Ashok Malhotra" role="editor"/>
            <author fullname="John Arwe" role="editor"/>
            <author fullname="Steve Speicher" role="editor"/>
            <date day="26" month="February" year="2015"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-ldp-20150226"/>
          <seriesInfo name="W3C" value="REC-ldp-20150226"/>
        </reference>
        <reference anchor="RFC8863" target="https://www.rfc-editor.org/info/rfc8863">
          <front>
            <title>Interactive Connectivity Establishment Patiently Awaiting Connectivity (ICE PAC)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <author fullname="J. Uberti" initials="J." surname="Uberti">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>During the process of establishing peer-to-peer connectivity, Interactive Connectivity Establishment (ICE) agents can encounter situations where they have no candidate pairs to check, and, as a result, conclude that ICE processing has failed. However, because additional candidate pairs can be discovered during ICE processing, declaring failure at this point may be premature. This document discusses when these situations can occur. </t>
              <t>This document updates RFCs 8445 and 8838 by requiring that an ICE agent wait a minimum amount of time before declaring ICE failure, even if there are no candidate pairs left to check.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8863"/>
          <seriesInfo name="DOI" value="10.17487/RFC8863"/>
        </reference>
        <reference anchor="RFC8838" target="https://www.rfc-editor.org/info/rfc8838">
          <front>
            <title>Trickle ICE: Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (ICE) Protocol</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov">
              <organization/>
            </author>
            <author fullname="J. Uberti" initials="J." surname="Uberti">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes "Trickle ICE", an extension to the Interactive Connectivity Establishment (ICE) protocol that enables ICE agents to begin connectivity checks while they are still gathering candidates, by incrementally exchanging candidates over time instead of all at once. This method can considerably accelerate the process of establishing a communication session.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8838"/>
          <seriesInfo name="DOI" value="10.17487/RFC8838"/>
        </reference>
        <reference anchor="RFC8840" target="https://www.rfc-editor.org/info/rfc8840">
          <front>
            <title>A Session Initiation Protocol (SIP) Usage for Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (Trickle ICE)</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov">
              <organization/>
            </author>
            <author fullname="T. Stach" initials="T." surname="Stach">
              <organization/>
            </author>
            <author fullname="E. Marocco" initials="E." surname="Marocco">
              <organization/>
            </author>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>The Interactive Connectivity Establishment (ICE) protocol describes a Network Address Translator (NAT) traversal mechanism for UDP-based multimedia sessions established with the Offer/Answer model. The ICE extension for Incremental Provisioning of Candidates (Trickle ICE) defines a mechanism that allows ICE Agents to shorten session establishment delays by making the candidate gathering and connectivity checking phases of ICE non-blocking and by executing them in parallel. </t>
              <t>This document defines usage semantics for Trickle ICE with the Session Initiation Protocol (SIP).  The document also defines a new SIP Info Package to support this usage together with the corresponding media type.  Additionally, a new Session Description Protocol (SDP) "end-of-candidates" attribute and a new SIP option tag "trickle-ice" are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8840"/>
          <seriesInfo name="DOI" value="10.17487/RFC8840"/>
        </reference>
        <reference anchor="RFC5789" target="https://www.rfc-editor.org/info/rfc5789">
          <front>
            <title>PATCH Method for HTTP</title>
            <author fullname="L. Dusseault" initials="L." surname="Dusseault">
              <organization/>
            </author>
            <author fullname="J. Snell" initials="J." surname="Snell">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>Several applications extending the Hypertext Transfer Protocol (HTTP) require a feature to do partial resource modification.  The existing HTTP PUT method only allows a complete replacement of a document. This proposal adds a new HTTP method, PATCH, to modify an existing HTTP resource.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5789"/>
          <seriesInfo name="DOI" value="10.17487/RFC5789"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9143" target="https://www.rfc-editor.org/info/rfc9143">
          <front>
            <title>Negotiating Media Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a "BUNDLE transport", and the media is referred to as "bundled media". The "m=" sections that use the BUNDLE transport form a BUNDLE group. </t>
              <t>This specification defines a new RTP Control Protocol (RTCP) Source Description (SDES) item and a new RTP header extension.</t>
              <t>This specification updates RFCs 3264, 5888, and 7941. </t>
              <t>This specification obsoletes RFC 8843.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9143"/>
          <seriesInfo name="DOI" value="10.17487/RFC9143"/>
        </reference>
        <reference anchor="RFC8858" target="https://www.rfc-editor.org/info/rfc8858">
          <front>
            <title>Indicating Exclusive Support of RTP and RTP Control Protocol (RTCP) Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines a new Session Description Protocol (SDP) media-level attribute, 'rtcp-mux-only', that can be used by an endpoint to indicate exclusive support of RTP and RTP Control Protocol (RTCP) multiplexing. The document also updates RFC 5761 by clarifying that an offerer can use a mechanism to indicate that it is not able to send and receive RTCP on separate ports.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8858"/>
          <seriesInfo name="DOI" value="10.17487/RFC8858"/>
        </reference>
        <reference anchor="RFC8842" target="https://www.rfc-editor.org/info/rfc8842">
          <front>
            <title>Session Description Protocol (SDP) Offer/Answer Considerations for Datagram Transport Layer Security (DTLS) and Transport Layer Security (TLS)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <author fullname="R. Shpount" initials="R." surname="Shpount">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines the Session Description Protocol (SDP) offer/answer procedures for negotiating and establishing a Datagram Transport Layer Security (DTLS) association.  The document also defines the criteria for when a new DTLS association must be established.  The document updates RFCs 5763 and 7345 by replacing common SDP offer/answer procedures with a reference to this specification. </t>
              <t>This document defines a new SDP media-level attribute, "tls-id". </t>
              <t>This document also defines how the "tls-id" attribute can be used for negotiating and establishing a Transport Layer Security (TLS) connection, in conjunction with the procedures in RFCs 4145 and 8122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8842"/>
          <seriesInfo name="DOI" value="10.17487/RFC8842"/>
        </reference>
        <reference anchor="RFC8288" target="https://www.rfc-editor.org/info/rfc8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC7064" target="https://www.rfc-editor.org/info/rfc7064">
          <front>
            <title>URI Scheme for the Session Traversal Utilities for NAT (STUN) Protocol</title>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar">
              <organization/>
            </author>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro">
              <organization/>
            </author>
            <author fullname="P. Jones" initials="P." surname="Jones">
              <organization/>
            </author>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin">
              <organization/>
            </author>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies the syntax and semantics of the Uniform Resource Identifier (URI) scheme for the Session Traversal Utilities for NAT (STUN) protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7064"/>
          <seriesInfo name="DOI" value="10.17487/RFC7064"/>
        </reference>
        <reference anchor="RFC7065" target="https://www.rfc-editor.org/info/rfc7065">
          <front>
            <title>Traversal Using Relays around NAT (TURN) Uniform Resource Identifiers</title>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin">
              <organization/>
            </author>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar">
              <organization/>
            </author>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro">
              <organization/>
            </author>
            <author fullname="P. Jones" initials="P." surname="Jones">
              <organization/>
            </author>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies the syntax of Uniform Resource Identifier (URI) schemes for the Traversal Using Relays around NAT (TURN) protocol.  It defines two URI schemes to provision the TURN Resolution Mechanism (RFC 5928).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7065"/>
          <seriesInfo name="DOI" value="10.17487/RFC7065"/>
        </reference>
        <reference anchor="RFC8489" target="https://www.rfc-editor.org/info/rfc8489">
          <front>
            <title>Session Traversal Utilities for NAT (STUN)</title>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin">
              <organization/>
            </author>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro">
              <organization/>
            </author>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="R. Mahy" initials="R." surname="Mahy">
              <organization/>
            </author>
            <author fullname="P. Matthews" initials="P." surname="Matthews">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with NAT traversal.  It can be used by an endpoint to determine the IP address and port allocated to it by a NAT.  It can also be used to check connectivity between two endpoints and as a keep-alive protocol to maintain NAT bindings. STUN works with many existing NATs and does not require any special behavior from them.</t>
              <t>STUN is not a NAT traversal solution by itself.  Rather, it is a tool to be used in the context of a NAT traversal solution.</t>
              <t>This document obsoletes RFC 5389.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8489"/>
          <seriesInfo name="DOI" value="10.17487/RFC8489"/>
        </reference>
        <reference anchor="RFC6750" target="https://www.rfc-editor.org/info/rfc6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources.  Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key).  To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC3553" target="https://www.rfc-editor.org/info/rfc3553">
          <front>
            <title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="G. Klyne" initials="G." surname="Klyne">
              <organization/>
            </author>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items.  The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="73"/>
          <seriesInfo name="RFC" value="3553"/>
          <seriesInfo name="DOI" value="10.17487/RFC3553"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3261" target="https://www.rfc-editor.org/info/rfc3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
              <organization/>
            </author>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo">
              <organization/>
            </author>
            <author fullname="A. Johnston" initials="A." surname="Johnston">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="R. Sparks" initials="R." surname="Sparks">
              <organization/>
            </author>
            <author fullname="M. Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <author fullname="E. Schooler" initials="E." surname="Schooler">
              <organization/>
            </author>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC6120" target="https://www.rfc-editor.org/info/rfc6120">
          <front>
            <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6120"/>
          <seriesInfo name="DOI" value="10.17487/RFC6120"/>
        </reference>
        <reference anchor="RFC7826" target="https://www.rfc-editor.org/info/rfc7826">
          <front>
            <title>Real-Time Streaming Protocol Version 2.0</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <author fullname="A. Rao" initials="A." surname="Rao">
              <organization/>
            </author>
            <author fullname="R. Lanphier" initials="R." surname="Lanphier">
              <organization/>
            </author>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund">
              <organization/>
            </author>
            <author fullname="M. Stiemerling" initials="M." role="editor" surname="Stiemerling">
              <organization/>
            </author>
            <date month="December" year="2016"/>
            <abstract>
              <t>This memorandum defines the Real-Time Streaming Protocol (RTSP) version 2.0, which obsoletes RTSP version 1.0 defined in RFC 2326.</t>
              <t>RTSP is an application-layer protocol for the setup and control of the delivery of data with real-time properties.  RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video.  Sources of data can include both live data feeds and stored clips.  This protocol is intended to control multiple data delivery sessions; provide a means for choosing delivery channels such as UDP, multicast UDP, and TCP; and provide a means for choosing delivery mechanisms based upon RTP (RFC 3550).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7826"/>
          <seriesInfo name="DOI" value="10.17487/RFC7826"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rtcweb-gateways" target="https://www.ietf.org/archive/id/draft-ietf-rtcweb-gateways-02.txt">
          <front>
            <title>WebRTC Gateways</title>
            <author fullname="Harald T. Alvestrand" initials="H. T." surname="Alvestrand">
              <organization>Google</organization>
            </author>
            <author fullname="Uwe Rauschenbach" initials="U." surname="Rauschenbach">
              <organization>Nokia Networks</organization>
            </author>
            <date day="21" month="January" year="2016"/>
            <abstract>
              <t>   This document describes interoperability considerations for a class
   of WebRTC-compatible endpoints called "WebRTC gateways", which
   interconnect between WebRTC endpoints and devices that are not WebRTC
   endpoints.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtcweb-gateways-02"/>
        </reference>
        <reference anchor="W3C.REC-webrtc-20210126" target="https://www.w3.org/TR/2021/REC-webrtc-20210126/">
          <front>
            <title>WebRTC 1.0: Real-Time Communication Between Browsers</title>
            <author fullname="Cullen Jennings" role="editor"/>
            <author fullname="Henrik Boström" role="editor"/>
            <author fullname="Jan-Ivar Bruaroey" role="editor"/>
            <date day="26" month="January" year="2021"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-webrtc-20210126"/>
          <seriesInfo name="W3C" value="REC-webrtc-20210126"/>
        </reference>
        <reference anchor="RFC8141" target="https://www.rfc-editor.org/info/rfc8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier.  With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance.  With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA).  This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
