<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wish-whip-09" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="whip">WebRTC-HTTP ingestion protocol (WHIP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wish-whip-09"/>
    <author initials="S." surname="Murillo" fullname="Sergio Garcia Murillo">
      <organization>Millicast</organization>
      <address>
        <email>sergio.garcia.murillo@cosmosoftware.io</email>
      </address>
    </author>
    <author initials="A." surname="Gouaillard" fullname="Alexandre Gouaillard">
      <organization>CoSMo Software</organization>
      <address>
        <email>alex.gouaillard@cosmosoftware.io</email>
      </address>
    </author>
    <date year="2023" month="July" day="24"/>
    <area>ART</area>
    <workgroup>wish</workgroup>
    <keyword>WebRTC</keyword>
    <abstract>
      <?line 34?>

<t>This document describes a simple HTTP-based protocol that will allow WebRTC-based ingestion of content into streaming services and/or CDNs.</t>
    </abstract>
  </front>
  <middle>
    <?line 38?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IETF RTCWEB working group standardized JSEP (<xref target="RFC8829"/>), a mechanism used to control the setup, management, and teardown of a multimedia session. It also describes how to negotiate media flows using the Offer/Answer Model with the Session Description Protocol (SDP) <xref target="RFC3264"/> as well as the formats for data sent over the wire (e.g., media types, codec parameters, and encryption). WebRTC intentionally does not specify a signaling transport protocol at application level.</t>
      <t>Unfortunately, the lack of a standardized signaling mechanism in WebRTC has been an obstacle to adoption as an ingestion protocol within the broadcast/streaming industry, where a streamlined production pipeline is taken for granted: plug in cables carrying raw media to hardware encoders, then push the encoded media to any streaming service or Content Delivery Network (CDN) ingest using an ingestion protocol.</t>
      <t>While WebRTC can be integrated with standard signaling protocols like SIP <xref target="RFC3261"/> or XMPP <xref target="RFC6120"/>, they are not designed to be used in broadcasting/streaming services, and there also is no sign of adoption in that industry. RTSP <xref target="RFC7826"/>, which is based on RTP, is not compatible with the SDP offer/answer model <xref target="RFC3264"/>.</t>
      <t>This document proposes a simple protocol for supporting WebRTC as media ingestion method which:</t>
      <ul spacing="normal">
        <li>Is easy to implement,</li>
        <li>Is as easy to use as popular IP-based broadcast protocols</li>
        <li>Is fully compliant with WebRTC and RTCWEB specs</li>
        <li>Allows for ingest both in traditional media platforms and in WebRTC end-to-end platforms with the lowest possible latency.</li>
        <li>Lowers the requirements on both hardware encoders and broadcasting services to support WebRTC.</li>
        <li>Is usable both in web browsers and in native encoders.</li>
      </ul>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ul spacing="normal">
        <li>WHIP client: WebRTC media encoder or producer that acts as a client of the WHIP protocol by encoding and delivering the media to a remote Media Server.</li>
        <li>WHIP endpoint: Ingest server receiving the initial WHIP request.</li>
        <li>WHIP endpoint URL: URL of the WHIP endpoint that will create the WHIP resource.</li>
        <li>Media Server: WebRTC Media Server or consumer that establishes the media session with the WHIP client and receives the media produced by it.</li>
        <li>WHIP resource: Allocated resource by the WHIP endpoint for an ongoing ingest session that the WHIP client can send requests for altering the session (ICE operations or termination, for example).</li>
        <li>WHIP resource URL: URL allocated to a specific media session by the WHIP endpoint which can be used to perform operations such as terminating the session or ICE restarts.</li>
      </ul>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The WebRTC-HTTP Ingest Protocol (WHIP) uses an HTTP POST request to perform a single-shot SDP offer/answer so an ICE/DTLS session can be established between the encoder/media producer (WHIP client) and the broadcasting ingestion endpoint (Media Server).</t>
      <t>Once the ICE/DTLS session is set up, the media will flow unidirectionally from the encoder/media producer (WHIP client) to the broadcasting ingestion endpoint (Media Server). In order to reduce complexity, no SDP renegotiation is supported, so no  "m=" sections can be added once the initial SDP offer/answer over HTTP is completed.</t>
      <figure>
        <name>WHIP session setup and teardown</name>
        <artwork><![CDATA[
                                                                               
 +-------------+    +---------------+ +--------------+ +---------------+
 | WHIP client |    | WHIP endpoint | | Media Server | | WHIP resource |
 +--+----------+    +---------+-----+ +------+-------+ +--------|------+
    |                         |              |                  |       
    |                         |              |                  |       
    |HTTP POST (SDP Offer)    |              |                  |       
    +------------------------>+              |                  |       
    |201 Created (SDP answer) |              |                  |       
    +<------------------------+              |                  |       
    |          ICE REQUEST                   |                  |       
    +--------------------------------------->+                  |       
    |          ICE RESPONSE                  |                  |       
    |<---------------------------------------+                  |       
    |          DTLS SETUP                    |                  |       
    |<======================================>|                  |       
    |          RTP/RTCP FLOW                 |                  |       
    +<-------------------------------------->+                  |       
    | HTTP DELETE                                               |       
    +---------------------------------------------------------->+       
    | 200 OK                                                    |       
    <-----------------------------------------------------------x       
                                                                               
]]></artwork>
      </figure>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <t>In order to set up an ingestion session, the WHIP client will generate an SDP offer according to the JSEP rules and perform an HTTP POST request to the configured WHIP endpoint URL.</t>
      <t>The HTTP POST request will have a content type of "application/sdp" and contain the SDP offer as the body. The WHIP endpoint will generate an SDP answer and return a "201 Created" response with a content type of "application/sdp", the SDP answer as the body, and a Location header field pointing to the newly created resource.</t>
      <t>The SDP offer <bcp14>SHOULD</bcp14> use the "sendonly" attribute and the SDP answer <bcp14>MUST</bcp14> use the "recvonly" attribute in any case.</t>
      <figure>
        <name>HTTP POST doing SDP O/A example</name>
        <artwork><![CDATA[
POST /whip/endpoint HTTP/1.1
Host: whip.example.com
Content-Type: application/sdp
Content-Length: 1326

v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=msid-semantic: WMS
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:EsAw
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:EsAw
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

HTTP/1.1 201 Created
ETag: "xyzzy"
Content-Type: application/sdp
Content-Length: 1400
Location: https://whip.example.com/resource/id

v=0
o=- 1657793490019 1 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-lite
a=msid-semantic: WMS *
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:38sdf4fdsf54
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:38sdf4fdsf54
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96
]]></artwork>
      </figure>
      <t>Once a session is setup, ICE consent freshness <xref target="RFC7675"/> <bcp14>SHALL</bcp14> be used to detect non graceful disconnection and DTLS teardown for session termination by either side.</t>
      <t>To explicitly terminate a session, the WHIP client <bcp14>MUST</bcp14> perform an HTTP DELETE request to the resource URL returned in the Location header field of the initial HTTP POST. Upon receiving the HTTP DELETE request, the WHIP resource will be removed and the resources freed on the Media Server, terminating the ICE and DTLS sessions.</t>
      <t>A Media Server terminating a session <bcp14>MUST</bcp14> follow the procedures in <xref target="RFC7675"/> Section 5.2 for immediate revocation of consent.</t>
      <t>The WHIP endpoints <bcp14>MUST</bcp14> return an "405 Method Not Allowed" response for any HTTP GET, HEAD or PUT requests on the endpoint URL in order to reserve its usage for future versions of this protocol specification.</t>
      <t>The WHIP endpoints <bcp14>MUST</bcp14> support OPTIONS requests for Cross-Origin Resource Sharing (CORS) as defined in <xref target="FETCH"/> and it <bcp14>SHOULD</bcp14> include an "Accept-Post" header with a mime type value of "application/sdp" on the "200 OK" response to any OPTIONS request received as per <xref target="W3C.REC-ldp-20150226"/>.</t>
      <t>The WHIP resources <bcp14>MUST</bcp14> return an "405 Method Not Allowed" response for any HTTP GET, HEAD, POST or PUT requests on the resource URL in order to reserve its usage for future versions of this protocol specification.</t>
      <section anchor="ice-and-nat-support">
        <name>ICE and NAT support</name>
        <t>The initial offer by the WHIP client <bcp14>MAY</bcp14> be sent after the full ICE gathering is complete with the full list of ICE candidates, or it <bcp14>MAY</bcp14> only contain local candidates (or even an empty list of candidates) as per <xref target="RFC8863"/>.</t>
        <t>In order to simplify the protocol, there is no support for exchanging gathered trickle candidates from Media Server ICE candidates once the SDP answer is sent. The WHIP Endpoint <bcp14>SHALL</bcp14> gather all the ICE candidates for the Media Server before responding to the client request and the SDP answer <bcp14>SHALL</bcp14> contain the full list of ICE candidates of the Media Server. The Media Server <bcp14>MAY</bcp14> use ICE lite, while the WHIP client <bcp14>MUST</bcp14> implement full ICE.</t>
        <t>The WHIP client <bcp14>MAY</bcp14> perform trickle ICE or ICE restarts as per <xref target="RFC8838"/> by sending an HTTP PATCH request to the WHIP resource URL with a body containing a SDP fragment with MIME type "application/trickle-ice-sdpfrag" as specified in <xref target="RFC8840"/>. When used for trickle ICE, the body of this PATCH message will contain the new ICE candidate; when used for ICE restarts, it will contain a new ICE ufrag/pwd pair.</t>
        <t>Trickle ICE and ICE restart support is <bcp14>RECOMMENDED</bcp14> for a WHIP resource.</t>
        <t>If the WHIP resource supports either Trickle ICE or ICE restarts, but not both, it <bcp14>MUST</bcp14> return a "405 Not Implemented" response for the HTTP PATCH requests that are not supported.</t>
        <t>If the  WHIP resource does not support the PATCH method for any purpose, it <bcp14>MUST</bcp14> return a "501 Not Implemented" response, as described in <xref target="RFC9110"/> Section 6.6.2.</t>
        <t>As the HTTP PATCH request sent by a WHIP client may be received out-of-order by the WHIP resource, the WHIP resource <bcp14>MUST</bcp14> generate a
unique strong entity-tag identifying the ICE session as per <xref target="RFC9110"/> Section 2.3. The initial value of the entity-tag identifying the initial ICE session <bcp14>MUST</bcp14> be returned in an ETag header field in the "201 Created" response to the initial POST request to the WHIP endpoint. It <bcp14>MUST</bcp14> also be returned in the "200 OK" of any PATCH request that triggers an ICE restart. Note that including the ETag in the original "201 Created" response is only <bcp14>REQUIRED</bcp14> if the WHIP resource supports ICE restarts and <bcp14>OPTIONAL</bcp14> otherwise.</t>
        <t>A WHIP client sending a PATCH request for performing trickle ICE <bcp14>MUST</bcp14> include an "If-Match" header field with the latest known entity-tag as per <xref target="RFC9110"/> Section 3.1. When the PATCH request is received by the WHIP resource, it <bcp14>MUST</bcp14> compare the indicated entity-tag value with the current entity-tag of the resource as per <xref target="RFC9110"/> Section 3.1 and return a "412 Precondition Failed" response if they do not match.</t>
        <t>WHIP clients <bcp14>SHOULD NOT</bcp14> use entity-tag validation when matching a specific ICE session is not required, such as for example when initiating a DELETE request to terminate a session. WHIP resources <bcp14>MUST</bcp14> ignore any entity-tag value sent by the WHIP client when ICE session matching is not required, as in the HTTP DELETE request.</t>
        <t>A WHIP resource receiving a PATCH request with new ICE candidates, but which does not perform an ICE restart, <bcp14>MUST</bcp14> return a "204 No Content" response without body. If the Media Server does not support a candidate transport or is not able to resolve the connection address, it <bcp14>MUST</bcp14> accept the HTTP request with the "204 No Content" response and silently discard the candidate.</t>
        <figure>
          <name>Trickle ICE request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whip.example.com
If-Match: "xyzzy"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 548

a=ice-ufrag:EsAw
a=ice-pwd:P2uYro0UCOQ4zxjKXaWCBui1
m=audio 9 RTP/AVP 0
a=mid:0
a=candidate:1387637174 1 udp 2122260223 192.0.2.1 61764 typ host generation 0 ufrag EsAw network-id 1
a=candidate:3471623853 1 udp 2122194687 198.51.100.1 61765 typ host generation 0 ufrag EsAw network-id 2
a=candidate:473322822 1 tcp 1518280447 192.0.2.1 9 typ host tcptype active generation 0 ufrag EsAw network-id 1
a=candidate:2154773085 1 tcp 1518214911 198.51.100.2 9 typ host tcptype active generation 0 ufrag EsAw network-id 2
a=end-of-candidates

HTTP/1.1 204 No Content
]]></artwork>
        </figure>
        <t>A WHIP client sending a PATCH request for performing ICE restart <bcp14>MUST</bcp14> contain an "If-Match" header field with a field-value "*" as per <xref target="RFC9110"/> Section 3.1.</t>
        <t>If the HTTP PATCH request results in an ICE restart, the WHIP resource <bcp14>SHALL</bcp14> return a "200 OK" with an "application/trickle-ice-sdpfrag" body containing the new ICE username fragment and password and OPTIONALLY a new set of ICE candidates for the WHIP client . Also, the "200 OK" response for a successful ICE restart <bcp14>MUST</bcp14> contain the new entity-tag corresponding to the new ICE session in an ETag response header field and <bcp14>MAY</bcp14> contain a new set of ICE candidates for the Media Server.</t>
        <t>If the ICE request cannot be satisfied by the WHIP resource, the resource <bcp14>MUST</bcp14> return an appropriate HTTP error code and <bcp14>MUST NOT</bcp14> terminate the session immediately. The WHIP client <bcp14>MAY</bcp14> retry performing a new ICE restart or terminate the session by issuing an HTTP DELETE request instead. In either case, the session <bcp14>MUST</bcp14> be terminated if the ICE consent expires as a consequence of the failed ICE restart as per <xref target="RFC7675"/> Section 5.1.</t>
        <figure>
          <name>ICE restart request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whip.example.com
If-Match: "*"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 54

a=ice-ufrag:ysXw
a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k

HTTP/1.1 200 OK
ETag: "abccd"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 102

a=ice-lite
a=ice-ufrag:289b31b754eaa438
a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
]]></artwork>
        </figure>
        <t>Because the WHIP client needs to know the entity-tag associated with the ICE session in order to send new ICE candidates, it <bcp14>MUST</bcp14> buffer any gathered candidates before it receives the HTTP response to the initial POST request or the PATCH request with the new entity-tag value. Once it knows the entity-tag value, in order to lower the HTTP traffic and processing time required, the WHIP client <bcp14>SHOULD</bcp14> send a single aggregated HTTP PATCH request with all the ICE candidates it has buffered so far.</t>
        <t>In case of unstable network conditions, the ICE restart HTTP PATCH requests and responses might be received out of order. In order to mitigate this scenario, when the client performs an ICE restart, it <bcp14>MUST</bcp14> discard any previous ICE username and passwords fragments and ignore any further HTTP PATCH response received from a pending HTTP PATCH request. WHIP clients <bcp14>MUST</bcp14> apply only the ICE information received in the response to the last sent request. If there is a mismatch between the ICE information at the client and at the server (because of an out-of-order request), the STUN requests will contain invalid ICE information and will be rejected by the server. When this situation is detected by the WHIP Client, it <bcp14>MUST</bcp14> send a new ICE restart request to the server.</t>
      </section>
      <section anchor="webrtc-constraints">
        <name>WebRTC constraints</name>
        <t>In the specific case of media ingestion into a streaming service, some assumptions can be made about the server-side which simplifies the WebRTC compliance burden, as detailed in WebRTC-gateway document <xref target="I-D.draft-ietf-rtcweb-gateways"/>.</t>
        <t>In order to reduce the complexity of implementing WHIP in both clients and Media Servers, WHIP imposes the following restrictions regarding WebRTC usage:</t>
        <t>Both the WHIP client and the WHIP endpoint <bcp14>SHALL</bcp14> use SDP bundle <xref target="RFC9143"/>. Each "m=" section <bcp14>MUST</bcp14> be part of a single BUNDLE group. Hence, when a WHIP client sends an SDP offer, it <bcp14>MUST</bcp14> include a "bundle-only" attribute in each bundled "m=" section. The WHIP client and the Media Server <bcp14>MUST</bcp14> support multiplexed media associated with the BUNDLE group as per <xref target="RFC9143"/> Section 9. In addition, per <xref target="RFC9143"/> the WHIP client and Media Server will use RTP/RTCP multiplexing for all bundled media. In order to reduce the network resources required at the Media Server, both The WHIP client and Media Server <bcp14>SHOULD</bcp14> include the "rtcp-mux-only" attribute in each bundled "m=" sections as per <xref target="RFC8858"/> i.</t>
        <t>This version of the specification only supports, at most, a single audio and video MediaStreamTrack in a single MediaStream as defined in [[!RFC8830]] and therefore, all "m=" sections <bcp14>MUST</bcp14> contain an "msid" attribute with the same value. However, it would be possible for future revisions of this spec to allow more than a single MediaStream or MediaStreamTrack of each media kind, so in order to ensure forward compatibility, if the number of audio and or video tracks or number streams is not supported by the WHIP Endpoint, it <bcp14>MUST</bcp14> reject the HTTP POST request with a "406 Not Acceptable" error response.</t>
        <t>Furthermore, the WHIP Endpoint <bcp14>SHOULD NOT</bcp14> reject individual "m=" sections as per <xref target="RFC8829"/> Section 5.3.1 in case there is any error processing the "m=" section, but reject the HTTP POST request with a "406 Not Acceptable" error response to prevent having partially successful WHIP sessions which can be misleading to end users.</t>
        <t>When a WHIP client sends an SDP offer, it <bcp14>SHOULD</bcp14> insert an SDP "setup" attribute with an "actpass" attribute value, as defined in <xref target="RFC8842"/>. However, if the WHIP client only implements the DTLS client role, it <bcp14>MAY</bcp14> use an SDP "setup" attribute with an "active" attribute value. If the WHIP endpoint does not support an SDP offer with an SDP "setup" attribute with an "active" attribute value, it <bcp14>SHOULD</bcp14> reject the request with a "422 Unprocessable Entity" response.</t>
        <t>NOTE: <xref target="RFC8842"/> defines that the offerer must insert an SDP "setup" attribute with an "actpass" attribute value. However, the WHIP client will always communicate with a Media Server that is expected to support the DTLS server role, in which case the client might choose to only implement support for the DTLS client role.</t>
        <t>Trickle ICE and ICE restarts support is <bcp14>OPTIONAL</bcp14> for both the WHIP clients and Media Servers as explained in section 4.1.</t>
      </section>
      <section anchor="load-balancing-and-redirections">
        <name>Load balancing and redirections</name>
        <t>WHIP endpoints and Media Servers might not be colocated on the same server, so it is possible to load balance incoming requests to different Media Servers. WHIP clients <bcp14>SHALL</bcp14> support HTTP redirection via the "307 Temporary Redirect" response as described in <xref target="RFC9110"/> Section 6.4.7. The WHIP resource URL <bcp14>MUST</bcp14> be a final one, and redirections are not required to be supported for the PATCH and DELETE requests sent to it.</t>
        <t>In case of high load, the WHIP endpoints <bcp14>MAY</bcp14> return a "503 Service Unavailable" response indicating that the server is currently unable to handle the request due to a temporary overload or scheduled maintenance, which will likely be alleviated after some delay. The WHIP endpoint might send a Retry-After header field indicating the minimum time that the user agent ought to wait before making a follow-up request.</t>
      </section>
      <section anchor="stunturn-server-configuration">
        <name>STUN/TURN server configuration</name>
        <t>The WHIP endpoint <bcp14>MAY</bcp14> return STUN/TURN server configuration URLs and credentials usable by the client in the "201 Created" response to the HTTP POST request to the WHIP endpoint URL.</t>
        <t>A reference to each STUN/TURN server will be returned using the "Link" header field <xref target="RFC8288"/> with a "rel" attribute value of "ice-server". The Link target URI is the server URI as defined in <xref target="RFC7064"/> and <xref target="RFC7065"/>. The credentials are encoded in the Link target attributes as follows:</t>
        <ul spacing="normal">
          <li>username: If the Link header field represents a TURN server, and credential-type is "password", then this attribute specifies the username to use with that TURN server.</li>
          <li>credential: If the "credential-type" attribute is missing or has a "password" value, the credential attribute represents a long-term authentication password, as described in <xref target="RFC8489"/>, Section 10.2.</li>
          <li>credential-type: If the Link header field represents a TURN server, then this attribute specifies how the credential attribute value should be used when that TURN server requests authorization. The default value if the attribute is not present is "password".</li>
        </ul>
        <figure>
          <name>Example ICE server configuration</name>
          <artwork><![CDATA[
     Link: <stun:stun.example.net>; rel="ice-server"
     Link: <turn:turn.example.net?transport=udp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
     Link: <turn:turn.example.net?transport=tcp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
     Link: <turns:turn.example.net?transport=tcp>; rel="ice-server";
           username="user"; credential="myPassword"; credential-type="password"
]]></artwork>
        </figure>
        <t>NOTE: The naming of both the "rel" attribute value of "ice-server" and the target attributes follows the one used on the W3C WebRTC recommendation <xref target="W3C.REC-webrtc-20210126"/> RTCConfiguration dictionary in section 4.2.1. "rel" attribute value of "ice-server" is not prepended with the "urn:ietf:params:whip:" so it can be reused by other specifications which may use this mechanism to configure the usage of STUN/TURN servers.</t>
        <t>NOTE: Depending on the ICE Agent implementation, the WHIP client may need to call the setConfiguration method before calling the setLocalDescription method with the local SDP offer in order to avoid having to perform an ICE restart for applying the updated STUN/TURN server configuration on the next ICE gathering phase.</t>
        <t>There are some WebRTC implementations that do not support updating the STUN/TURN server configuration after the local offer has been created as specified in <xref target="RFC8829"/> Section 4.1.18. In order to support these clients, the WHIP endpoint <bcp14>MAY</bcp14> also include the STUN/TURN server configuration on the responses to OPTIONS request sent to the WHIP endpoint URL before the POST request is sent. However, this method is not <bcp14>NOT RECOMMENDED</bcp14> and if supported by the underlying WHIP Client's webrtc implementation, the WHIP Client <bcp14>SHOULD</bcp14> wait for the information to be returned by the WHIP Endpoint on the response of the HTTP POST request instead.</t>
        <t>The generation of the TURN server credentials may require performing a request to an external provider, which can both add latency to the OPTIONS request processing and increase the processing required to handle that request. In order to prevent this, the WHIP Endpoint <bcp14>SHOULD NOT</bcp14> return the STUN/TURN server configuration if the OPTIONS request is a preflight request for CORS, that is, if The OPTIONS request does not contain an Access-Control-Request-Method with "POST" value and the the Access-Control-Request-Headers HTTP header does not contain the "Link" value.</t>
        <t>It might be also possible to configure the STUN/TURN server URIs with long term credentials provided by either the broadcasting service or an external TURN provider on the WHIP client, overriding the values provided by the WHIP endpoint.</t>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and authorization</name>
        <t>WHIP endpoints and resources <bcp14>MAY</bcp14> require the HTTP request to be authenticated using an HTTP Authorization header field with a Bearer token as specified in <xref target="RFC6750"/> Section 2.1. WHIP clients <bcp14>MUST</bcp14> implement this authentication and authorization mechanism and send the HTTP Authorization header field in all HTTP requests sent to either the WHIP endpoint or resource except the preflight OPTIONS requests for CORS.</t>
        <t>The nature, syntax, and semantics of the bearer token, as well as how to distribute it to the client, is outside the scope of this document. Some examples of the kind of tokens that could be used are, but are not limited to, JWT tokens as per <xref target="RFC6750"/> and <xref target="RFC8725"/> or a shared secret stored on a database. The tokens are typically made available to the end user alongside the WHIP endpoint URL and configured on the WHIP clients (similar to the way RTMP URLs and Stream Keys are distributed).</t>
        <t>WHIP endpoints and resources could perform the authentication and authorization by encoding an authentication token within the URLs for the WHIP endpoints or resources instead. In case the WHIP client is not configured to use a bearer token, the HTTP Authorization header field must not be sent in any request.</t>
      </section>
      <section anchor="simulcast-and-scalable-video-coding">
        <name>Simulcast and scalable video coding</name>
        <t>Simulcast as per <xref target="RFC8853"/> <bcp14>MAY</bcp14> be supported by both the Media Servers and WHIP clients through negotiation in the SDP offer/answer.</t>
        <t>If the client supports simulcast and wants to enable it for publishing, it <bcp14>MUST</bcp14> negotiate the support in the SDP offer according to the procedures in <xref target="RFC8853"/> Section 5.3. A server accepting a simulcast offer <bcp14>MUST</bcp14> create an answer according to the procedures <xref target="RFC8853"/> Section 5.3.2.</t>
        <t>It is possible for both Media Servers and WHIP clients to support Scalable Video Coding (SVC). However, as there is no universal negotiation mechanism in SDP for SVC, the encoder must consider the negotiated codec(s), intended usage, and SVC support in available decoders when configuring SVC.</t>
      </section>
      <section anchor="protocol-extensions">
        <name>Protocol extensions</name>
        <t>In order to support future extensions to be defined for the WHIP protocol, a common procedure for registering and announcing the new extensions is defined.</t>
        <t>Protocol extensions supported by the WHIP server <bcp14>MUST</bcp14> be advertised to the WHIP client in the "201 Created" response to the initial HTTP POST request sent to the WHIP endpoint. The WHIP endpoint <bcp14>MUST</bcp14> return one "Link" header field for each extension, with the extension "rel" type attribute and the URI for the HTTP resource that will be available for receiving requests related to that extension.</t>
        <t>Protocol extensions are optional for both WHIP clients and servers. WHIP clients <bcp14>MUST</bcp14> ignore any Link attribute with an unknown "rel" attribute value and WHIP servers <bcp14>MUST NOT</bcp14> require the usage of any of the extensions.</t>
        <t>Each protocol extension <bcp14>MUST</bcp14> register a unique "rel" attribute value at IANA starting with the prefix: "urn:ietf:params:whip:ext" as defined in <xref target="urn-whip-subspace"/>.</t>
        <t>For example, considering a potential extension of server-to-client communication using server-sent events as specified in https://html.spec.whatwg.org/multipage/server-sent-events.html#server-sent-events, the URL for connecting to the server side event resource for the published stream could be returned in the initial HTTP "201 Created" response with a "Link" header field and a "rel" attribute of "urn:ietf:params:whip:ext:example:server-sent-events". (This document does not specify such an extension, and uses it only as an example.)</t>
        <t>In this theoretical case, the "201 Created" response to the HTTP POST request would look like:</t>
        <artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/sdp
Location: https://whip.example.com/resource/id
Link: <https://whip.ietf.org/publications/213786HF/sse>;
      rel="urn:ietf:params:whip:ext:example:server-side-events"
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a new protocol on top of HTTP and WebRTC, thus, security security protocols and considerations from related specifications apply to the WHIP specidifcation. These include:</t>
      <ul spacing="normal">
        <li>WebRTC security considerations: <xref target="RFC8826"/>. HTTPS <bcp14>SHALL</bcp14> be used in order to preserve the WebRTC security model.</li>
        <li>Transport Layer Security (TLS): <xref target="RFC8446"/>, <xref target="RFC8446"/>, and <xref target="RFC9147"/>.</li>
        <li>HTTP security: Section 11 of <xref target="RFC9112"/>, Section 17 of <xref target="RFC9110"/>, etc.</li>
        <li>URI security: Section 7 of <xref target="RFC3986"/>.</li>
      </ul>
      <t>On top of that, the WHIP protocol exposes a thin new attack surface expecific of the REST API methods used within it:</t>
      <ul spacing="normal">
        <li>HTTP POST flooding and resource exhaustion:
It would be possible for an attacker in possesion of authentication credentials valid to publish a WHIP stream to make multiple HTTP POST to the WHIP endpoint.
This will force the WHIP endpoint to process the incoming SDP and allocate resources for being able to setup the DTLS/ICE connection.
While the malicious client do not need to initiate the DTLS/ICE connection at all, the WHIP resource will have to wait for the DTLS/ICE connection timeout in order to release the associated resources.
If the connection rate is high enought, this could lead to a resource exhaustion on the WHIP server and it will not be able to process legit incoming publications.
In order to prevent this scenario, WHIP endpoints <bcp14>SHOULD</bcp14> implemement a rate limit and abalanche control mechanism for incoming initial HTTP POST requests.</li>
        <li>Insecure direct object references (IDOR) on the WHIP resource locations:
If the URsL returned by the WHIP endpoint for the WHIP resources location are easy to guess, it would be possible for an attacker to send multiple HTTP DELETE requests and terminate all the WHIP resources currentlyrunning in a a WHIP server.
In order to prevent this scenario, WHIP endpoints <bcp14>SHOULD</bcp14> generate URLs with enought randomness, using a cryptographically secure pseudorandom number generator and implemement a rate limit and abalanche control mechanism for HTTP DELETE requests.
The security considerations for Universally Unique IDentifier (UUID) <xref target="RFC4122"/> Section 6 are applicable for generating the WHIP resources location URL.</li>
        <li>HTTP PATCH flooding: 
Similar to the HTTP POST flooding, a malicious client could also create a resource exhaustion by sending multiple HTTP PATCH request to the WHIP resource, although the WHIP Resources can limit the impact by not allocating new ICE candaidates and reusing the existing ICE candidates when doing ICE restarts.
In order to prevent this scenario, WHIP endpoints <bcp14>SHOULD</bcp14> implemement a rate limit and abalanche control mechanism for incoming HTTP PATCH requests.</li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification adds a new link relation type and a registry for URN sub-namespaces for WHIP protocol extensions.</t>
      <section anchor="link-relation-type-ice-server">
        <name>Link Relation Type: ice-server</name>
        <t>The link relation type below has been registered by IANA per Section 4.2 of <xref target="RFC8288"/>.</t>
        <t>Relation Name: ice-server</t>
        <t>Description: For the WHIP protocol, conveys the STUN and TURN servers that can be used by an ICE Agent to establish a connection with a peer.</t>
        <t>Reference: TBD</t>
      </section>
      <section anchor="registration-of-whip-urn-sub-namespace-and-whip-registry">
        <name>Registration of WHIP URN Sub-namespace and WHIP Registry</name>
        <t>IANA is asked to add an entry to the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers" registry and create a sub-namespace for the Registered Parameter Identifier as per <xref target="RFC3553"/>: "urn:ietf:params:whip".</t>
        <t>To manage this sub-namespace, IANA is asked to created the "WebRTC-HTTP ingestion protocol (WHIP) URIs" registry, which is used to manage entries within the "urn:ietf:params:whip" namespace. The registry description is as follows:</t>
        <ul spacing="normal">
          <li>Registry name: WebRTC-HTTP ingestion protocol (WHIP) URIs</li>
          <li>Specification: this document (RFC TBD)</li>
          <li>Registration policy: Specification Required</li>
          <li>Repository: See Section <xref target="urn-whip-subspace"/></li>
          <li>Index value: See Section <xref target="urn-whip-subspace"/></li>
        </ul>
      </section>
      <section anchor="urn-whip-subspace">
        <name>URN Sub-namespace for WHIP</name>
        <t>WHIP Endpoint utilizes URIs to identify the supported WHIP protocol extensions on the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/>.</t>
        <t>This section creates and registers an IETF URN Sub-namespace for use in the WHIP specifications and future extensions.</t>
        <section anchor="specification-template">
          <name>Specification Template</name>
          <t>Namespace ID:</t>
          <ul spacing="normal">
            <li>The Namespace ID "whip" has been assigned.</li>
          </ul>
          <t>Registration Information:</t>
          <ul spacing="normal">
            <li>Version: 1</li>
            <li>Date: TBD</li>
          </ul>
          <t>Declared registrant of the namespace:</t>
          <ul spacing="normal">
            <li>Registering organization: The Internet Engineering Task Force.</li>
            <li>Designated contact: A designated expert will monitor the WHIP public mailing list, "wish@ietf.org".</li>
          </ul>
          <t>Declaration of Syntactic Structure:</t>
          <ul spacing="normal">
            <li>The Namespace Specific String (NSS) of all URNs that use the "whip" Namespace ID shall have the following structure: urn:ietf:params:whip:{type}:{name}:{other}.</li>
            <li>
              <t>The keywords have the following meaning:  </t>
              <ul spacing="normal">
                <li>type: The entity type. This specification only defines the "ext" type.</li>
                <li>name: A required US-ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines a major namespace of a WHIP protocol extension. The value <bcp14>MAY</bcp14> also be an industry name or organization name.</li>
                <li>other: Any US-ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines the sub-namespace (which <bcp14>MAY</bcp14> be further broken down in namespaces delimited by colons) as needed to uniquely identify an WHIP protocol extension.</li>
              </ul>
            </li>
          </ul>
          <t>Relevant Ancillary Documentation:</t>
          <ul spacing="normal">
            <li>None</li>
          </ul>
          <t>Identifier Uniqueness Considerations:</t>
          <ul spacing="normal">
            <li>The designated contact shall be responsible for reviewing and enforcing uniqueness.</li>
          </ul>
          <t>Identifier Persistence Considerations:</t>
          <ul spacing="normal">
            <li>Once a name has been allocated, it <bcp14>MUST NOT</bcp14> be reallocated for a different purpose.</li>
            <li>The rules provided for assignments of values within a sub-namespace <bcp14>MUST</bcp14> be constructed so that the meanings of values cannot change.</li>
            <li>This registration mechanism is not appropriate for naming values whose meanings may change over time.</li>
          </ul>
          <t>Process of Identifier Assignment:</t>
          <ul spacing="normal">
            <li>Namespace with type "ext" (e.g., "urn:ietf:params:whip:ext") is reserved for IETF-approved WHIP specifications.</li>
          </ul>
          <t>Process of Identifier Resolution:</t>
          <ul spacing="normal">
            <li>None specified.</li>
          </ul>
          <t>Rules for Lexical Equivalence:</t>
          <ul spacing="normal">
            <li>No special considerations; the rules for lexical equivalence specified in <xref target="RFC8141"/> apply.</li>
          </ul>
          <t>Conformance with URN Syntax:</t>
          <ul spacing="normal">
            <li>No special considerations.</li>
          </ul>
          <t>Validation Mechanism:</t>
          <ul spacing="normal">
            <li>None specified.</li>
          </ul>
          <t>Scope:</t>
          <ul spacing="normal">
            <li>Global.</li>
          </ul>
        </section>
      </section>
      <section anchor="registering-whip-protocol-extensions-uris">
        <name>Registering WHIP Protocol Extensions URIs</name>
        <t>This section defines the process for registering new WHIP protocol extensions URIs with IANA in the "WebRTC-HTTP ingestion protocol (WHIP) URIs" registry (see <xref target="urn-whip-subspace"/>).</t>
        <t>A WHIP Protocol Extension URI is used as a value in the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/> for the purpose of signaling the WHIP protocol extensions supported by the WHIP Endpoints.</t>
        <t>WHIP Protocol Extensions URIs have a "ext" type as defined in <xref target="urn-whip-subspace"/>.</t>
        <section anchor="registration-procedure">
          <name>Registration Procedure</name>
          <t>The IETF has created a mailing list, "wish@ietf.org", which can be used
   for public discussion of WHIP protocol extensions proposals prior to registration.
   Use of the mailing list is strongly encouraged.  The IESG has
   appointed a designated expert <xref target="RFC8126"/> who will monitor the
   wish@ietf.org mailing list and review registrations.</t>
          <t>Registration of new "ext" type URI (in the namespace "urn:ietf:params:whip:ext") belonging to a WHIP Protocol Extension <bcp14>MUST</bcp14> be documented in a permanent and readily available public specification, in sufficient detail so that interoperability between independent implementations is possible and reviewed by the designated expert as per <xref target="BCP26"/> Section 4.6.
   An RFC is <bcp14>REQUIRED</bcp14> for the registration of new value data types that modify existing properties.
   An RFC is also <bcp14>REQUIRED</bcp14> for registration of WHIP Protocol Extensions URIs that modify WHIP Protocol Extensions previously documented in an existing RFC.</t>
          <t>The registration procedure begins when a completed registration template, defined in the sections below, is sent to iana@iana.org.
   Decisions made by the designated expert can be appealed to an Applications and Real Time (ART) Area Director, then to the IESG.
   The normal appeals procedure described in <xref target="BCP9"/> is to be followed.</t>
          <t>Once the registration procedure concludes successfully, IANA creates
   or modifies the corresponding record in the WHIP Protocol Extension registry.</t>
          <t>An RFC specifying one or more new WHIP Protocol Extension URIs <bcp14>MUST</bcp14> include the
   completed registration templates, which <bcp14>MAY</bcp14> be expanded with
   additional information. These completed templates are intended to go
   in the body of the document, not in the IANA Considerations section.
   The RFC <bcp14>SHOULD</bcp14> include any attributes defined.</t>
        </section>
        <section anchor="guidance-for-designated-experts">
          <name>Guidance for Designated Experts</name>
          <t>The Designated Expert (DE) is expected to ascertain the existence of suitable documentation (a specification) as described in <xref target="RFC8126"/> and to verify that the document is permanently and publicly available.</t>
          <t>The DE is also expected to check the clarity of purpose and use of the requested registration.</t>
          <t>Additionally, the DE must verify that any request for one of these registrations has been made available for review and comment within the IETF: the DE will post the request to the WebRTC Ingest Signaling over HTTPS (wish) Working Group mailing list (or a successor mailing list designated by the IESG).</t>
          <t>If the request comes from within the IETF, it should be documented in an Internet-Draft. Lastly, the DE must ensure that any other request for a code point does not conflict with work that is active or already published within the IETF.</t>
        </section>
        <section anchor="whip-protocol-extension-registration-template">
          <name>WHIP Protocol Extension Registration Template</name>
          <t>A WHIP Protocol Extension URI is defined by completing the following template:</t>
          <ul spacing="normal">
            <li>URI: A unique URI for the WHIP Protocol Extension (e.g., "urn:ietf:params:whip:ext:example:server-sent-events").</li>
            <li>Reference: A formal reference to the publicly available specification</li>
            <li>Name: A descriptive name of the WHIP Protocol Extension extension (e.g., "Sender Side events").</li>
            <li>Description: A brief description of the function of the extension, in a short paragraph or two</li>
            <li>Contact information: Contact information for the organization or person making the registration</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Lorenzo Miniero, Juliusz Chroboczek, Adam Roach, Nils Ohlmeier, Christer Holmberg, Cameron Elliott, Gustavo Garcia, Jonas Birme, Sandro Gauci and everyone else in the WebRTC community that have provided comments, feedback, text and improvement proposals on the document and contributed early implementations of the spec.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8829">
          <front>
            <title>JavaScript Session Establishment Protocol (JSEP)</title>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes the mechanisms for allowing a JavaScript application to control the signaling plane of a multimedia session via the interface specified in the W3C RTCPeerConnection API and discusses how this relates to existing signaling protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8829"/>
          <seriesInfo name="DOI" value="10.17487/RFC8829"/>
        </reference>
        <reference anchor="RFC3264">
          <front>
            <title>An Offer/Answer Model with Session Description Protocol (SDP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document defines a mechanism by which two entities can make use of the Session Description Protocol (SDP) to arrive at a common view of a multimedia session between them. In the model, one participant offers the other a description of the desired session from their perspective, and the other participant answers with the desired session from their perspective. This offer/answer model is most useful in unicast sessions where information from both participants is needed for the complete view of the session. The offer/answer model is used by protocols like the Session Initiation Protocol (SIP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3264"/>
          <seriesInfo name="DOI" value="10.17487/RFC3264"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="W3C.REC-ldp-20150226" target="https://www.w3.org/TR/2015/REC-ldp-20150226/">
          <front>
            <title>Linked Data Platform 1.0</title>
            <author fullname="Ashok Malhotra" role="editor"/>
            <author fullname="John Arwe" role="editor"/>
            <author fullname="Steve Speicher" role="editor"/>
            <date day="26" month="February" year="2015"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-ldp-20150226"/>
          <seriesInfo name="W3C" value="REC-ldp-20150226"/>
        </reference>
        <reference anchor="RFC8863">
          <front>
            <title>Interactive Connectivity Establishment Patiently Awaiting Connectivity (ICE PAC)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>During the process of establishing peer-to-peer connectivity, Interactive Connectivity Establishment (ICE) agents can encounter situations where they have no candidate pairs to check, and, as a result, conclude that ICE processing has failed. However, because additional candidate pairs can be discovered during ICE processing, declaring failure at this point may be premature. This document discusses when these situations can occur.</t>
              <t>This document updates RFCs 8445 and 8838 by requiring that an ICE agent wait a minimum amount of time before declaring ICE failure, even if there are no candidate pairs left to check.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8863"/>
          <seriesInfo name="DOI" value="10.17487/RFC8863"/>
        </reference>
        <reference anchor="RFC8838">
          <front>
            <title>Trickle ICE: Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (ICE) Protocol</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov"/>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes "Trickle ICE", an extension to the Interactive Connectivity Establishment (ICE) protocol that enables ICE agents to begin connectivity checks while they are still gathering candidates, by incrementally exchanging candidates over time instead of all at once. This method can considerably accelerate the process of establishing a communication session.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8838"/>
          <seriesInfo name="DOI" value="10.17487/RFC8838"/>
        </reference>
        <reference anchor="RFC8840">
          <front>
            <title>A Session Initiation Protocol (SIP) Usage for Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (Trickle ICE)</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov"/>
            <author fullname="T. Stach" initials="T." surname="Stach"/>
            <author fullname="E. Marocco" initials="E." surname="Marocco"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>The Interactive Connectivity Establishment (ICE) protocol describes a Network Address Translator (NAT) traversal mechanism for UDP-based multimedia sessions established with the Offer/Answer model. The ICE extension for Incremental Provisioning of Candidates (Trickle ICE) defines a mechanism that allows ICE Agents to shorten session establishment delays by making the candidate gathering and connectivity checking phases of ICE non-blocking and by executing them in parallel.</t>
              <t>This document defines usage semantics for Trickle ICE with the Session Initiation Protocol (SIP). The document also defines a new SIP Info Package to support this usage together with the corresponding media type. Additionally, a new Session Description Protocol (SDP) "end-of-candidates" attribute and a new SIP option tag "trickle-ice" are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8840"/>
          <seriesInfo name="DOI" value="10.17487/RFC8840"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9143">
          <front>
            <title>Negotiating Media Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a "BUNDLE transport", and the media is referred to as "bundled media". The "m=" sections that use the BUNDLE transport form a BUNDLE group.</t>
              <t>This specification defines a new RTP Control Protocol (RTCP) Source Description (SDES) item and a new RTP header extension.</t>
              <t>This specification updates RFCs 3264, 5888, and 7941.</t>
              <t>This specification obsoletes RFC 8843.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9143"/>
          <seriesInfo name="DOI" value="10.17487/RFC9143"/>
        </reference>
        <reference anchor="RFC8858">
          <front>
            <title>Indicating Exclusive Support of RTP and RTP Control Protocol (RTCP) Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines a new Session Description Protocol (SDP) media-level attribute, 'rtcp-mux-only', that can be used by an endpoint to indicate exclusive support of RTP and RTP Control Protocol (RTCP) multiplexing. The document also updates RFC 5761 by clarifying that an offerer can use a mechanism to indicate that it is not able to send and receive RTCP on separate ports.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8858"/>
          <seriesInfo name="DOI" value="10.17487/RFC8858"/>
        </reference>
        <reference anchor="RFC8842">
          <front>
            <title>Session Description Protocol (SDP) Offer/Answer Considerations for Datagram Transport Layer Security (DTLS) and Transport Layer Security (TLS)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="R. Shpount" initials="R." surname="Shpount"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines the Session Description Protocol (SDP) offer/answer procedures for negotiating and establishing a Datagram Transport Layer Security (DTLS) association. The document also defines the criteria for when a new DTLS association must be established. The document updates RFCs 5763 and 7345 by replacing common SDP offer/answer procedures with a reference to this specification.</t>
              <t>This document defines a new SDP media-level attribute, "tls-id".</t>
              <t>This document also defines how the "tls-id" attribute can be used for negotiating and establishing a Transport Layer Security (TLS) connection, in conjunction with the procedures in RFCs 4145 and 8122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8842"/>
          <seriesInfo name="DOI" value="10.17487/RFC8842"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC7064">
          <front>
            <title>URI Scheme for the Session Traversal Utilities for NAT (STUN) Protocol</title>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar"/>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro"/>
            <author fullname="P. Jones" initials="P." surname="Jones"/>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies the syntax and semantics of the Uniform Resource Identifier (URI) scheme for the Session Traversal Utilities for NAT (STUN) protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7064"/>
          <seriesInfo name="DOI" value="10.17487/RFC7064"/>
        </reference>
        <reference anchor="RFC7065">
          <front>
            <title>Traversal Using Relays around NAT (TURN) Uniform Resource Identifiers</title>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin"/>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar"/>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro"/>
            <author fullname="P. Jones" initials="P." surname="Jones"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies the syntax of Uniform Resource Identifier (URI) schemes for the Traversal Using Relays around NAT (TURN) protocol. It defines two URI schemes to provision the TURN Resolution Mechanism (RFC 5928).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7065"/>
          <seriesInfo name="DOI" value="10.17487/RFC7065"/>
        </reference>
        <reference anchor="RFC8489">
          <front>
            <title>Session Traversal Utilities for NAT (STUN)</title>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin"/>
            <author fullname="G. Salgueiro" initials="G." surname="Salgueiro"/>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="R. Mahy" initials="R." surname="Mahy"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with NAT traversal. It can be used by an endpoint to determine the IP address and port allocated to it by a NAT. It can also be used to check connectivity between two endpoints and as a keep-alive protocol to maintain NAT bindings. STUN works with many existing NATs and does not require any special behavior from them.</t>
              <t>STUN is not a NAT traversal solution by itself. Rather, it is a tool to be used in the context of a NAT traversal solution.</t>
              <t>This document obsoletes RFC 5389.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8489"/>
          <seriesInfo name="DOI" value="10.17487/RFC8489"/>
        </reference>
        <reference anchor="RFC6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8853">
          <front>
            <title>Using Simulcast in Session Description Protocol (SDP) and RTP Sessions</title>
            <author fullname="B. Burman" initials="B." surname="Burman"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar"/>
            <author fullname="M. Zanaty" initials="M." surname="Zanaty"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>In some application scenarios, it may be desirable to send multiple differently encoded versions of the same media source in different RTP streams. This is called simulcast. This document describes how to accomplish simulcast in RTP and how to signal it in the Session Description Protocol (SDP). The described solution uses an RTP/RTCP identification method to identify RTP streams belonging to the same media source and makes an extension to SDP to indicate that those RTP streams are different simulcast formats of that media source. The SDP extension consists of a new media-level SDP attribute that expresses capability to send and/or receive simulcast RTP streams.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8853"/>
          <seriesInfo name="DOI" value="10.17487/RFC8853"/>
        </reference>
        <reference anchor="RFC8826">
          <front>
            <title>Security Considerations for WebRTC</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>WebRTC is a protocol suite for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web". This document defines the WebRTC threat model and analyzes the security threats of WebRTC in that model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8826"/>
          <seriesInfo name="DOI" value="10.17487/RFC8826"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4122">
          <front>
            <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4122"/>
          <seriesInfo name="DOI" value="10.17487/RFC4122"/>
        </reference>
        <reference anchor="RFC3553">
          <front>
            <title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items. The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="73"/>
          <seriesInfo name="RFC" value="3553"/>
          <seriesInfo name="DOI" value="10.17487/RFC3553"/>
        </reference>
        <referencegroup anchor="BCP26">
          <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
            <front>
              <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
              <author fullname="M. Cotton" initials="M." surname="Cotton"/>
              <author fullname="B. Leiba" initials="B." surname="Leiba"/>
              <author fullname="T. Narten" initials="T." surname="Narten"/>
              <date month="June" year="2017"/>
              <abstract>
                <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
                <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
                <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="26"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP9">
          <reference anchor="RFC2026" target="https://www.rfc-editor.org/info/rfc2026">
            <front>
              <title>The Internet Standards Process -- Revision 3</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="October" year="1996"/>
              <abstract>
                <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="2026"/>
            <seriesInfo name="DOI" value="10.17487/RFC2026"/>
          </reference>
          <reference anchor="RFC5657" target="https://www.rfc-editor.org/info/rfc5657">
            <front>
              <title>Guidance on Interoperation and Implementation Reports for Advancement to Draft Standard</title>
              <author fullname="L. Dusseault" initials="L." surname="Dusseault"/>
              <author fullname="R. Sparks" initials="R." surname="Sparks"/>
              <date month="September" year="2009"/>
              <abstract>
                <t>Advancing a protocol to Draft Standard requires documentation of the interoperation and implementation of the protocol. Historic reports have varied widely in form and level of content and there is little guidance available to new report preparers. This document updates the existing processes and provides more detail on what is appropriate in an interoperability and implementation report. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="5657"/>
            <seriesInfo name="DOI" value="10.17487/RFC5657"/>
          </reference>
          <reference anchor="RFC6410" target="https://www.rfc-editor.org/info/rfc6410">
            <front>
              <title>Reducing the Standards Track to Two Maturity Levels</title>
              <author fullname="R. Housley" initials="R." surname="Housley"/>
              <author fullname="D. Crocker" initials="D." surname="Crocker"/>
              <author fullname="E. Burger" initials="E." surname="Burger"/>
              <date month="October" year="2011"/>
              <abstract>
                <t>This document updates the Internet Engineering Task Force (IETF) Standards Process defined in RFC 2026. Primarily, it reduces the Standards Process from three Standards Track maturity levels to two. This memo documents an Internet Best Current Practice.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="6410"/>
            <seriesInfo name="DOI" value="10.17487/RFC6410"/>
          </reference>
          <reference anchor="RFC7100" target="https://www.rfc-editor.org/info/rfc7100">
            <front>
              <title>Retirement of the "Internet Official Protocol Standards" Summary Document</title>
              <author fullname="P. Resnick" initials="P." surname="Resnick"/>
              <date month="December" year="2013"/>
              <abstract>
                <t>This document updates RFC 2026 to no longer use STD 1 as a summary of "Internet Official Protocol Standards". It obsoletes RFC 5000 and requests the IESG to move RFC 5000 (and therefore STD 1) to Historic status.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7100"/>
            <seriesInfo name="DOI" value="10.17487/RFC7100"/>
          </reference>
          <reference anchor="RFC7127" target="https://www.rfc-editor.org/info/rfc7127">
            <front>
              <title>Characterization of Proposed Standards</title>
              <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <author fullname="S. Turner" initials="S." surname="Turner"/>
              <date month="January" year="2014"/>
              <abstract>
                <t>RFC 2026 describes the review performed by the Internet Engineering Steering Group (IESG) on IETF Proposed Standard RFCs and characterizes the maturity level of those documents. This document updates RFC 2026 by providing a current and more accurate characterization of Proposed Standards.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7127"/>
            <seriesInfo name="DOI" value="10.17487/RFC7127"/>
          </reference>
          <reference anchor="RFC7475" target="https://www.rfc-editor.org/info/rfc7475">
            <front>
              <title>Increasing the Number of Area Directors in an IETF Area</title>
              <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document removes a limit on the number of Area Directors who manage an Area in the definition of "IETF Area". This document updates RFC 2026 (BCP 9) and RFC 2418 (BCP 25).</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7475"/>
            <seriesInfo name="DOI" value="10.17487/RFC7475"/>
          </reference>
          <reference anchor="RFC8789" target="https://www.rfc-editor.org/info/rfc8789">
            <front>
              <title>IETF Stream Documents Require IETF Rough Consensus</title>
              <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
              <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
              <date month="June" year="2020"/>
              <abstract>
                <t>This document requires that the IETF never publish any IETF Stream RFCs without IETF rough consensus. This updates RFC 2026.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="8789"/>
            <seriesInfo name="DOI" value="10.17487/RFC8789"/>
          </reference>
          <reference anchor="RFC9282" target="https://www.rfc-editor.org/info/rfc9282">
            <front>
              <title>Responsibility Change for the RFC Series</title>
              <author fullname="B. Rosen" initials="B." surname="Rosen"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>In RFC 9280, responsibility for the RFC Series moved to the RFC Series Working Group and the RFC Series Approval Board. It is no longer the responsibility of the RFC Editor, and the role of the IAB in the RFC Series is altered. Accordingly, in Section 2.1 of RFC 2026, the sentence "RFC publication is the direct responsibility of the RFC Editor, under the general direction of the IAB" is deleted.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="9282"/>
            <seriesInfo name="DOI" value="10.17487/RFC9282"/>
          </reference>
        </referencegroup>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC6120">
          <front>
            <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities. This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions. This document obsoletes RFC 3920. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6120"/>
          <seriesInfo name="DOI" value="10.17487/RFC6120"/>
        </reference>
        <reference anchor="RFC7826">
          <front>
            <title>Real-Time Streaming Protocol Version 2.0</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="A. Rao" initials="A." surname="Rao"/>
            <author fullname="R. Lanphier" initials="R." surname="Lanphier"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="M. Stiemerling" initials="M." role="editor" surname="Stiemerling"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>This memorandum defines the Real-Time Streaming Protocol (RTSP) version 2.0, which obsoletes RTSP version 1.0 defined in RFC 2326.</t>
              <t>RTSP is an application-layer protocol for the setup and control of the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data feeds and stored clips. This protocol is intended to control multiple data delivery sessions; provide a means for choosing delivery channels such as UDP, multicast UDP, and TCP; and provide a means for choosing delivery mechanisms based upon RTP (RFC 3550).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7826"/>
          <seriesInfo name="DOI" value="10.17487/RFC7826"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rtcweb-gateways">
          <front>
            <title>WebRTC Gateways</title>
            <author fullname="Harald T. Alvestrand" initials="H. T." surname="Alvestrand">
              <organization>Google</organization>
            </author>
            <author fullname="Uwe Rauschenbach" initials="U." surname="Rauschenbach">
              <organization>Nokia Networks</organization>
            </author>
            <date day="21" month="January" year="2016"/>
            <abstract>
              <t>   This document describes interoperability considerations for a class
   of WebRTC-compatible endpoints called "WebRTC gateways", which
   interconnect between WebRTC endpoints and devices that are not WebRTC
   endpoints.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtcweb-gateways-02"/>
        </reference>
        <reference anchor="W3C.REC-webrtc-20210126" target="https://www.w3.org/TR/2021/REC-webrtc-20210126/">
          <front>
            <title>WebRTC 1.0: Real-Time Communication Between Browsers</title>
            <author fullname="Cullen Jennings" role="editor"/>
            <author fullname="Henrik Boström" role="editor"/>
            <author fullname="Jan-Ivar Bruaroey" role="editor"/>
            <date day="26" month="January" year="2021"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-webrtc-20210126"/>
          <seriesInfo name="W3C" value="REC-webrtc-20210126"/>
        </reference>
        <reference anchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
      </references>
    </references>
    <?line 609?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
