CARVIEW |
Select Language
HTTP/2 200
date: Fri, 10 Oct 2025 08:40:45 GMT
content-type: text/plain; charset=utf-8
content-encoding: gzip
content-security-policy: default-src 'self' 'unsafe-inline' data: https://datatracker.ietf.org/ https://www.ietf.org/ https://ietf.org/ https://analytics.ietf.org https://static.ietf.org; frame-ancestors 'self' ietf.org *.ietf.org meetecho.com *.meetecho.com
cross-origin-opener-policy: unsafe-none
etag: W/"b25a05e5c6d3c29afae08f02c37393b8"
referrer-policy: strict-origin-when-cross-origin
strict-transport-security: max-age=3600; includeSubDomains
vary: Cookie, Accept-Encoding
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
cf-cache-status: MISS
expires: Fri, 10 Oct 2025 12:40:45 GMT
cache-control: public, max-age=14400
set-cookie: __cf_bm=7f0jiIseYIGouaCj5ERzugDC9qT7x2eUkJpfAIUYZF8-1760085645-1.0.1.1-ZADWDK_tDj3sfmQnCCr..p7mmDPenJkArn2Yz98fo9fEMxmVFoNe6I52nrA_35hoPMvHJKQKDy0.MnYuU9I4.ri8GxcSukZGMqlTdg5mD2E; path=/; expires=Fri, 10-Oct-25 09:10:45 GMT; domain=.ietf.org; HttpOnly; Secure; SameSite=None
server: cloudflare
cf-ray: 98c4d0926c73c18d-BLR
alt-svc: h3=":443"; ma=86400
@misc{rfc7201,
series = {Request for Comments},
number = 7201,
howpublished = {RFC 7201},
publisher = {RFC Editor},
doi = {10.17487/RFC7201},
url = {https://www.rfc-editor.org/info/rfc7201},
author = {Magnus Westerlund and Colin Perkins},
title = {{Options for Securing RTP Sessions}},
pagetotal = 37,
year = 2014,
month = apr,
abstract = {The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism.},
}