BEHAVE J. Rosenberg Internet-Draft Cisco Systems Expires:January 18,August 5, 2006 C. Huitema Microsoft R. MahyAirspace July 17, 2005Plantronics D. Wing Cisco Systems February 2006 Simple Traversal of UDP Through Network Address Translators (NAT) (STUN)draft-ietf-behave-rfc3489bis-02draft-ietf-behave-rfc3489bis-03 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onJanuary 18,August 5, 2006. Copyright Notice Copyright (C) The Internet Society(2005).(2006). Abstract Simple Traversal of UDP Through NATs (STUN) is a lightweight protocol that provides the ability for applications to determine the public IP addresses and ports allocated to them by theNAT.NAT and to keep NAT bindings open. These addresses and ports can be placed into protocol payloads where a client needs to provide a publically routable IP address. STUN works with many existing NATs, and does not require any special behavior from them. As a result, it allows a wide variety of applications to work through existing NAT infrastructure. Table of Contents 1. Applicability Statement . . . . . . . . . . . . . . . . . . .45 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .45 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . .56 4. Definitions . . . . . . . . . . . . . . . . . . . . . . . . .56 5.NAT VariationsOverview of Operation . . . . . . . . . . . . . . . . . . . . 7 6. STUN Message Structure . . . .6 6. Overview of Operation. . . . . . . . . . . . . . . . 9 7. STUN Transactions . . . . .6 7. Message Overview. . . . . . . . . . . . . . . . . 11 7.1. Request Transaction Reliability . . . . . .9. . . . . . . 11 8.ServerGeneral Client Behavior . . . . . . . . . . . . . . . . . . . 12 8.1. Request Message Types . . . .10 8.1 Binding Requests. . . . . . . . . . . . . . 12 8.1.1. Discovery . . . . . . .10 8.2. . . . . . . . . . . . . . . 12 8.1.2. Obtaining a Shared SecretRequests. . . . . . . . . . . . . . 13 8.1.3. Formulating the Request Message . . . . . . . . . . . 149. Client Behavior8.1.4. Processing Responses . . . . . . . . . . . . . . . . . 14 8.1.5. Using the Mapped Address . . . . . . .16 9.1 Discovery. . . . . . . . 15 8.2. Indication Message Types . . . . . . . . . . . . . . . .16 9.2 Obtaining a Shared Secret17 8.2.1. Formulating the Indication Message . . . . . . . . . . 17 9. General Server Behavior . . . . . . . . . . . . . . . . . . . 179.3 Formulating the Binding9.1. Request Message Types . . . . . . . . . . . . .18 9.4 Processing Binding Responses. . . . . 17 9.1.1. Receive Request Message . . . . . . . . . .19 9.5 Using. . . . . 17 9.1.2. Constructing theMapped AddressResponse . . . . . . . . . . . . . . 19 9.1.3. Sending the Response . . . .21 10. Protocol Details. . . . . . . . . . . . . 19 9.2. Indication Message Types . . . . . . . . . . .22 10.1 Message Header. . . . . 19 10. Short-Term Passwords . . . . . . . . . . . . . . . . .22 10.2 Message. . . . 19 11. STUN Attributes . . . . . . . . . . . . . . . . . . . .23 10.2.1. . . 20 11.1. MAPPED-ADDRESS . . . . . . . . . . . . . . . . . . . .25 10.2.2. 21 11.2. RESPONSE-ADDRESS . . . . . . . . . . . . . . . . . . .26 10.2.3. 21 11.3. CHANGED-ADDRESS . . . . . . . . . . . . . . . . . . .26 10.2.4. . 22 11.4. CHANGE-REQUEST . . . . . . . . . . . . . . . . . . . .26 10.2.5. 22 11.5. SOURCE-ADDRESS . . . . . . . . . . . . . . . . . . . .27 10.2.6. 23 11.6. USERNAME . . . . . . . . . . . . . . . . . . . . . . .27 10.2.7. 23 11.7. PASSWORD . . . . . . . . . . . . . . . . . . . . . . .27 10.2.8. 23 11.8. MESSAGE-INTEGRITY . . . . . . . . . . . . . . . . . .27 10.2.9. . 23 11.9. ERROR-CODE . . . . . . . . . . . . . . . . . . . . . .27 10.2.10. 24 11.10. REFLECTED-FROM . . . . . . . . . . . . . . . . . . . . . 26 11.11. ALTERNATE-SERVER . . . . . . . . . . . . . . . . . . . . 26 11.12. REALM . . . . . . . . . . . . . . . . . . . . . . . . . . 26 11.13. NONCE . . . . . . . . . . . . . . . . . . . . . . . . . . 26 11.14. UNKNOWN-ATTRIBUTES . . . . . . . . . . . . . . . . . . . 27 11.15. XOR-MAPPED-ADDRESS . . . . . . . . . . . . . . . . . . . 27 11.16. SERVER . . . . . . . . . . . . . . . . . . . . . . . . . 28 11.17. ALTERNATE-SERVER . . . . . . . . . . . . . . . . . . . . 28 11.18. BINDING-LIFETIME . . . . . . . . . . . . . . . . . . . . 2910.2.11 REFLECTED-FROM12. STUN Usages . . . . . . . . . . . . . . . . . . . . . . . . . 2910.2.12 XOR-MAPPED-ADDRESS12.1. Defined STUN Usages . . . . . . . . . . . . . . . . . . . 2910.2.13 XOR-ONLY12.2. Binding Discovery . . . . . . . . . . . . . . . . . . . . 29 12.2.1. Applicability . . . . . . . . . . . . . . . . . . . . 29 12.2.2. Client Discovery of Server . . . . . . . . . . . . . . 3010.2.14 SERVER12.2.3. Server Determination of Usage . . . . . . . . . . . . 30 12.2.4. New Requests or Indications . . . . . . . . . . . . . 3011.12.2.5. New Attributes . . . . . . . . . . . . . . . . . . . . 30 12.2.6. New Error Response Codes . . . . . . . . . . . . . . . 30 12.2.7. Client Procedures . . . . . . . . . . . . . . . . . . 30 12.2.8. Server Procedures . . . . . . . . . . . . . . . . . . 30 12.2.9. Security Considerations for Binding Discovery . . . . 30 12.3. Connectivity Check . . . . . . . . . . . . . . . . . . . 31 12.3.1. Applicability . . . . . . . . . . . . . . . . . . . . 31 12.3.2. Client Discovery of Server . . . . . . . . . . . . . . 31 12.3.3. Server Determination of Usage . . . . . . . . . . . . 31 12.3.4. New Requests or Indications . . . . . . . . . . . . . 31 12.3.5. New Attributes . . . . . . . . . . . . . . . . . . . . 31 12.3.6. New Error Response Codes . . . . . . . . . . . . . . . 31 12.3.7. Client Procedures . . . . . . . . . . . . . . . . . . 3111.112.3.8. Server Procedures . . . . . . . . . . . . . . . . . . 32 12.3.9. Security Considerations for Connectivity Check . . . . 32 12.4. NAT Keepalives . . . . . . . . . . . . . . . . . . . . . 32 12.4.1. Applicability . . . . . . . . . . . . . . . . . . . . 32 12.4.2. Client Discovery of Server . . . . . . . . . . . . . . 32 12.4.3. Server Determination of Usage . . . . . . . . . . . . 32 12.4.4. New Requests or Indications . . . . . . . . . . . . . 33 12.4.5. New Attributes . . . . . . . . . . . . . . . . . . . . 33 12.4.6. New Error Response Codes . . . . . . . . . . . . . . . 33 12.4.7. Client Procedures . . . . . . . . . . . . . . . . . . 33 12.4.8. Server Procedures . . . . . . . . . . . . . . . . . . 33 12.4.9. Security Considerations for NAT Keepalives . . . . . . 33 12.5. Short-Term Password . . . . . . . . . . . . . . . . . . . 33 12.5.1. Applicability . . . . . . . . . . . . . . . . . . . . 33 12.5.2. Client Discovery of Server . . . . . . . . . . . . . . 34 12.5.3. Server Determination of Usage . . . . . . . . . . . . 34 12.5.4. New Requests or Indications . . . . . . . . . . . . . 34 12.5.5. New Attributes . . . . . . . . . . . . . . . . . . . . 35 12.5.6. New Error Response Codes . . . . . . . . . . . . . . . 35 12.5.7. Client Procedures . . . . . . . . . . . . . . . . . . 35 12.5.8. Server Procedures . . . . . . . . . . . . . . . . . . 35 12.5.9. Security Considerations for Short-Term Password . . . 35 13. Security Considerations . . . . . . . . . . . . . . . . . . . 36 13.1. Attacks on STUN . . . . . . . . . . . . . . . . . . . . .31 11.1.136 13.1.1. Attack I:DDOSDDoS Against a Target . . . . . . . . . . .31 11.1.236 13.1.2. Attack II: Silencing a Client . . . . . . . . . . . .31 11.1.336 13.1.3. Attack III: Assuming the Identity of a Client . . . .32 11.1.437 13.1.4. Attack IV: Eavesdropping . . . . . . . . . . . . . . .32 11.237 13.2. Launching the Attacks . . . . . . . . . . . . . . . . . .32 11.2.137 13.2.1. Approach I: Compromise a Legitimate STUN Server . . .33 11.2.238 13.2.2. Approach II: DNS Attacks . . . . . . . . . . . . . . .33 11.2.338 13.2.3. Approach III: Rogue Router or NAT . . . . . . . . . .33 11.2.438 13.2.4. Approach IV:MITM . . . . . .Man in the Middle . . . . . . . . . . . .34 11.2.539 13.2.5. Approach V: Response Injection Plus DoS . . . . . . .34 11.2.639 13.2.6. Approach VI: Duplication . . . . . . . . . . . . . . .35 11.339 13.3. Countermeasures . . . . . . . . . . . . . . . . . . . . .35 11.440 13.4. Residual Threats . . . . . . . . . . . . . . . . . . . .. 37 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . 37 13.42 14. IAB Considerations . . . . . . . . . . . . . . . . . . . . .37 13.1. 42 14.1. Problem Definition . . . . . . . . . . . . . . . . . . .. 37 13.242 14.2. Exit Strategy . . . . . . . . . . . . . . . . . . . . . .38 13.343 14.3. Brittleness Introduced by STUN . . . . . . . . . . . . .. 38 13.443 14.4. Requirements for a Long Term Solution . . . . . . . . . .40 13.545 14.5. Issues with Existing NAPT Boxes . . . . . . . . . . . . .41 13.646 14.6. In Closing . . . . . . . . . . . . . . . . . . . . . . . 46 15. IANA Considerations .42 14.. . . . . . . . . . . . . . . . . . . . 47 15.1. STUN Message Type Registry . . . . . . . . . . . . . . . 47 15.2. STUN Attribute Registry . . . . . . . . . . . . . . . . . 47 16. Changes Since RFC 3489 . . . . . . . . . . . . . . . . . . .42 15. Acknowledgments. 48 17. Acknowledgements . . . . . . . . . . . . . . . . . . . . .43 16.. . 49 18. References . . . . . . . . . . . . . . . . . . . . . . . . .43 16.1. 49 18.1. Normative References . . . . . . . . . . . . . . . . . .. 43 16.2 Informative49 18.2. Informational References . . . . . . . . . . . . . . . .. . 4350 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . .45. . 52 Intellectual Property and Copyright Statements . . . . . . . .46. . 53 1. Applicability Statement This protocol is not a cure-all for the problems associated with NAT. It does not enable incoming TCP connections through NAT. It allows incoming UDP packets through NAT, but only through a subset of existing NAT types. In particular, STUN does not enable incoming UDP packets throughsymmetric NATs (defined below),"symmetric NATs", which is a NAT where all requests from the same internal IP address and port, to a specific destination IP address and port, are mapped to the same external IP address and port. If the same host sends a packet with the same source address and port, but to a different destination, a different mapping is used. Furthermore, only the external host that receives a packet can send a UDP packet back to the internal host. This type of NAT is common in large enterprises. STUN does not work when it is used to obtain an address to communicate with a peer which happens to be behind the same NAT. STUN does not work when the STUN server is not in a common shared address realm. In order to work with such a NAT, a media relay such as TURN [3] is required. All other types of NATs work without a media relay. For a more complete discussion of the limitations of STUN, see Section13.14. 2. Introduction Network Address Translators (NATs), while providing many benefits, also come with many drawbacks. The most troublesome of those drawbacks is the fact that they break many existing IP applications, and make it difficult to deploy new ones. Guidelines have been developed[8][17] that describe how to build "NAT friendly" protocols, but many protocols simply cannot be constructed according to those guidelines. Examples of such protocols include almost all peer-to- peer protocols, such as multimedia communications, file sharing and games. To combat this problem, Application Layer Gateways (ALGs) have been embedded in NATs. ALGs perform the application layer functions required for a particular protocol to traverse a NAT. Typically, this involves rewriting application layer messages to contain translated addresses, rather than the ones inserted by the sender of the message. ALGs have serious limitations, including scalability, reliability, and speed of deploying new applications.To resolve these problems, the Middlebox Communications (MIDCOM) protocol is being developed [9]. MIDCOM allows an application entity, such as an end client or network server of some sort (like a Session Initiation Protocol (SIP) proxy [10]) to control a NAT (or firewall), in order to obtain NAT bindings and open or close pinholes. In this way, NATs and applications can be separated once more, eliminating the need for embedding ALGs in NATs, and resolving the limitations imposed by current architectures. Unfortunately, MIDCOM requires upgrades to existing NAT and firewalls, in addition to application components. Complete upgrades of these NAT and firewall products will take a long time, potentially years. This is due, in part, to the fact that the deployers of NAT and firewalls are not the same people who are deploying and using applications. As a result, the incentive to upgrade these devices will be low in many cases. Consider, for example, an airport Internet lounge that provides access with a NAT. A user connecting to the NATed network may wish to use a peer-to-peer service, but cannot, because the NAT doesn't support it. Since the administrators of the lounge are not the ones providing the service, they are not motivated to upgrade their NAT equipment to support it, using either an ALG, or MIDCOM. Another problem is that the MIDCOM protocol requires that the agent controlling the middleboxes know the identity of those middleboxes, and have a relationship with them which permits control. In many configurations, this will not be possible. For example, many cable access providers use NAT in front of their entire access network. This NAT could be in addition to a residential NAT purchased and operated by the end user. The end user will probably not have a control relationship with the NAT in the cable access network, and may not even know of its existence.Many existing proprietary protocols, such as those for online games (such as the games described inRFC 3027 [11])RFC3027 [18]) and Voice over IP, have developed tricks that allow them to operate through NATs without changing those NATs and without relying on ALG behavior in the NATs. This documentis an attempt to taketakes some of thoseideas,ideas andcodifycodifies them into an interoperable protocol that can meet the needs of many applications. The protocol described here, Simple Traversal of UDP Through NAT (STUN),allowsprovides a toolkit of functions. These functions allow entities behind a NAT to learn the address bindings allocated by theNAT.NAT, to keep those bindings open, and communicate with other STUN- aware to validate connecivity. STUN requires no changes to NATs, and works with an arbitrary number of NATs in tandem between the application entity and the public Internet. 3. Terminology In this document, the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in BCP 14, RFC 2119 [1] and indicate requirement levels for compliant STUN implementations. 4. Definitions STUNClient:Client A STUN client (also just referred to as a client) is an entity that generates STUN requests.A STUN client can execute on an end system, such as a user's PC, or can run in a network element, such as a conferencing server.STUNServer:Server A STUN Server (also just referred to as a server) is an entity that receives STUN requests, and sends STUN responses.STUN servers are generally attached to the public Internet. 5. NAT Variations It is assumed that the reader is familiar with NATs. It has been observed that NAT treatment of UDP varies among implementations.Transport Address Thefour treatments observed in implementations are: Full Cone: A full cone NAT is one where all requests from the same internal IP address and port are mapped to the same externalcombination of an IP address and (UDP or TCP) port.Furthermore, any external host can send a packet to the internal host, by sending a packet to the mapped external address. Restricted Cone:Reflexive Transport Address Arestricted cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IPtransport addressand port. Unlikelearned by afull cone NAT, an externalclient which identifies that client as seen by another host(withon an IPaddress X) can send a packet to the internal host only if the internal host had previously sentnetwork, typically apacket to IP address X. Port Restricted Cone: A port restricted cone NATSTUN server. When there islike a restricted cone NAT, but the restriction includes port numbers. Specifically,anexternal host can send a packet, with source IP address Xintervening NAT between the client andsource port P, totheinternal host only ifother host, theinternal host had previously sent a packet to IPreflexive addressX and port P. Symmetric: A symmetric NAT is one where all requests fromrepresents thesame internal IP address and port,binding allocated toa specific destination IP address and port,the client on the public side of the NAT. Reflexive transport addresses aremapped tolearned from thesame externalmapped address attribute (MAPPED-ADDRESS or XOR-MAPPED-ADDRESS) in STUN responses. Mapped Address The source IP address andport. Ifport of thesame host sends aSTUN Binding Request packetwithreceived by thesame source addressSTUN server andport, but to a different destination, a different mapping is used. Furthermore, onlyinserted into theexternal host that receives a packet can send a UDP packet back tomapped address attribute (MAPPED-ADDRESS or XOR-MAPPED-ADDRESS) of theinternal host. 6.Binding Response message. 5. Overview of Operation This section is descriptive only. Normative behavior is described in Section 8 and Section9. /-----\. /----\ // STUN \\ | Server | \\ //\-----/\----/ +--------------+ Public Internet ................| NAT 2 |....................... +--------------+ +--------------+ Private NET 2 ................| NAT 1 |....................... +--------------+/-----\/----\ // STUN \\ | Client | \\ // Private NET 1\-----/\----/ Figure11: Typical STUN Server Configuration The typical STUN configuration is shown in Figure 1. A STUN client is connected to private network 1. This network connects to private network 2 through NAT 1. Private network 2 connects to the public Internet through NAT 2. The STUN server resides on the public Internet. STUN is a simple client-server protocol.ATwo types of messages are available -- request/response in which client sends a request to a server, and the server returns a response; and indications which can be initiated by the client or by the server and which do not elicit a response. There are two types of requests defined in this specification - Binding Requests, sent over UDP, and Shared Secret Requests, sent over TLS[2][6] over TCP. Shared Secret Requests ask the server to return a temporary username and password. This username and password are used in a subsequent Binding Request and Binding Response, for the purposes of authentication and message integrity. Binding requests are used to determine the bindings allocated by NATs. The client sends a Binding Request to the server, over UDP. The server examines the source IP address and port of the request, and copies them into a response that is sent back to theclient. There are some parameters in the request that allow theclientto ask that the response be sent elsewhere, or that the server send-- this is theresponse from a different address and port. The flags allow for STUN to be used in diagnostic applications.'mapped address'. There are attributes for providing message integrity and authentication. The STUN client is typically embedded in an application which needs to obtain a public IP address and port that can be used to receive data. For example, it might need to obtain an IP address and port to receive Real Time Transport Protocol(RTP) [12](RTP [14]) traffic. When the application starts, the STUN client within the application sends a STUN Shared Secret Request to its server, obtains a username and password, and then sends it a Binding Request. STUN servers can be discovered through DNS SRV records[3],[4], and it is generally assumed that the client is configured with the domain to use to find the STUN server. Generally, this will be the domain of the provider of the service the application is using (such a provider is incented to deploy STUN servers in order to allow its customers to use its application through NAT). Of course, a client can determine the address or domain name of a STUN server through other means. A STUN server can even be embedded within an end system. The STUN Binding Request is used to discover the public IP address and port mappings generated by the NAT. Binding Requests are sent to the STUN server using UDP. When a Binding Request arrives at the STUN server, it may have passed through one or more NATs between the STUN client and the STUN server. As a result, the source address of the request received by the server will be the mapped address created by the NAT closest to the server. The STUN server copies that source IP address and port into a STUN Binding Response, and sends it back to the source IP address and port of the STUN request.For allEvery type oftheNATtypes above, this responsewillarriveroute that response so that it arrives at the STUN client. When the STUN client receives the STUN Binding Response, it compares the IP address and port in the packet with the local IP address and port it bound to when the request was sent. If these do not match, the STUN client knows is behind one or more NATs.TheIf the STUN server is publicly routable the IP address and port in thebody of theSTUNresponseBinding Response arepublic,also publicly routable, and can be used by any host on the public Internet to send packets to the application that sent the STUN request. An application need only listen on the IP address and port from which the STUN request was sent. Packets sent by a host on the public Internet to the public address and port learned by STUN will be received by the application, so long as conditions permit. The conditions in which these packets will not be received by the client are described in Section 1. It should be noted that the configuration in Figure 1 is not the only permissible configuration. The STUN server can be located anywhere, including within another client. The only requirement is that the STUN server is reachable by the client, and if the client is trying to obtain a publicly routable address, that the server reside on the public Internet.7.6. STUN MessageOverviewStructure STUN messages are TLV (type-length-value) encoded using big endian (network ordered) binary. STUN messages are encoded using binary fields. All integer fields are carried in network byte order, that is, most significant byte (octet) first. This byte order is commonly known as big-endian. The transmission order is described in detail in Appendix B of RFC791 [2]. Unless otherwise noted, numeric constants are in decimal (base 10). All STUN messages start with a single STUNheader,header followed by a STUN payload. The payload is a series of STUN attributes, the set of which depends on the message type. The STUN header contains a STUN message type, transaction ID, and length. Themessage type can be Binding Request, Binding Response, Binding Error Response, Shared Secret Request, Shared Secret Response, or Shared Secret Error Response. The transaction ID is used to correlate requests and responses. Thelength indicates the total length of the STUN payload, not including the 20-byte header.This allowsThere are two categories of STUNto run over TCP. Shared Secretmessage types: Requestsare always sent over TCP (indeed, using TLS over TCP). Severaland Indications. Upon receiving a STUNattributes are defined. The first isrequest, aMAPPED-ADDRESS attribute, whichSTUN server will send a STUN success response or a STUN error response. All STUN success responses MUST have a type whose value isan IP address0x100 higher than their associated request, andport. Itall STUN error responses MUST have a type whose value isalways placed in the Binding Response,0x110 higher than their associated request. Any newly defined STUN message types MUST use message type values 0x100 andit indicates the source IP address0x110 higher for their success andport the server saw in the Binding Request. Thereerror responses, respectively. STUN Requests are sent reliably (Section 7.1). The transaction ID isalso a RESPONSE- ADDRESS attribute, which contains an IP addressused to correlate requests andport. The RESPONSE-ADDRESS attributeresponses. An indication message can bepresent in the Binding Request, and indicates wheresent from theBinding Response isclient tobe sent. It's optional, and when not present,theBinding Response is sent toserver, or from thesource IP address and port ofserver to theBinding Request. The third attribute isclient. Indication messages are not sent reliably do not have an associated success response message type or associated error response message type. Indication messages can be sent by theCHANGE-REQUEST attribute, and it contains two flagsSTUN client tocontroltheIP address and port usedserver, or from the STUN server tosendtheresponse. These flags are called "change IP" and "change port" flags.client. TheCHANGE-REQUEST attributetransaction ID isallowed only in the Binding Request. They instruct the serverused tosend the Binding Responses fromdistinguish indication messages. All STUN messages consist of adifferent source IP address and port.20 byte header: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0 0| STUN Message Type | Message Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Magic Cookie | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Transaction ID +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 2: Format of STUN Message Header TheCHANGE-REQUEST attribute is optional inmost significant two bits of every STUN message are 0b00. This, combined with theBinding Request. The fourth attributemagic cookie, aids in differentiating STUN packets from other protocols when STUN is multiplexed with other protocols on theCHANGED-ADDRESS attribute. It is present insame port. The STUN message types BindingResponses. It informs the client of the source IP address and port that would be used if the client requested the "change IP"Request, Response, and"change port" behavior. The fifth attribute is the SOURCE-ADDRESS attribute. It is only presentError Response are defined inBinding Responses. It indicates the source IP addressSection 8 andport where the response was sent from.Section 9.1. TheRESPONSE-ADDRESS, CHANGE-REQUEST, CHANGED-ADDRESSShared Secret Request, Response, andSOURCE- ADDRESS attributesError Response areprimarily useful for diagnostic applications that use STUNdescribed inorder to determine information aboutSection 12.5. Their values are enumerated in Section 15. The message length is thetypesize, in bytes, ofNAT.the message not including the 20 byte STUN header. Theusage of these attributes for such purposesmagic cookie isoutsidea fixed value, 0x2112A442. In thescopeprevious version of thisspecification. The sixth attributespecification [13] this field was part of the transaction ID. This fixed value affords easy identification of a STUN message when STUN is multiplexed with other protocols on theUSERNAME attribute. Itsame port, as ispresentdone for example ina Shared Secret Response, which provides[12] and [15]. The magic cookie additionally indicates the STUN client is compliant witha temporary username and password (encoded in the PASSWORD attribute).this specification. TheUSERNAMEmagic cookie isalsopresent inBinding Requests, serving as an index toall STUN messages -- requests, success responses and error responses. The transaction ID is a 96 bit identifier. STUN transactions are identified by their unique 96-bit transaction ID. This transaction ID is chosen by theshared secret usedSTUN client and MUST be unique for each new STUN transaction by that STUN client. Any two requests that are not bit- wise identical, and not sent to theintegrity protection ofsame server from theBinding Request.same IP address and port, MUST have a different transaction ID. Theseventh attribute, PASSWORD, is only found in Shared Secret Response messages.transaction ID MUST be uniformly and randomly distributed between 0 and 2**96 - 1. Theeight attributelarge range is needed because theMESSAGE- INTEGRITY attribute, which containstransaction ID serves as amessage integrity check overform of randomization, helping to prevent replays of previously signed responses from theBinding Requestserver. After the STUN header are zero orBinding Response. The ninthmore attributes. Each attribute isthe ERROR-CODE attribute. This is present in the Binding Error ResponseTLV encoded, with a 16 bit type, 16 bit length, andShared Secret Error Response. It indicates the error that has occurred.variable value: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value .... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: Format of STUN Attributes Thetenthattributeis the UNKNOWN-ATTRIBUTES attribute, which is presenttypes defined ineitherthis specification are in Section 11 . 7. STUN Transactions STUN clients are allowed to pipeline STUN requests. That is, a STUN client MAY have multiple outstanding STUN requests with different transaction IDs and not wait for completion of a STUN request/ response exchange before sending another STUN request. 7.1. Request Transaction Reliability When running STUN over UDP it is possible that theBinding Error ResponseSTUN request orShared Secret Error Response. It indicates the mandatory attributes fromits response might be dropped by the network. Reliability of STUN requestwhich were unknown. The eleventh attributemessage types isthe REFLECTED-FROM attribute, whichispresent in Binding Responses. It indicatesaccomplished through client retransmissions. Clients SHOULD retransmit theIP address and portrequest starting with an interval of 100ms, doubling every retransmit until thesenderinterval reaches 1.6 seconds. Retransmissions continue with intervals of 1.6 seconds until aBinding Request, used for traceability purposes to prevent certain denial-of-service attacks. The twelfth attributeresponse isXOR-MAPPED-ADDRESS. Like MAPPED-ADDRESS, itreceived, or a total of 9 requests have been sent. If no response ispresent inreceived by 1.6 seconds after theBinding Response, and tellslast request has been sent, the client SHOULD consider thesource IP addresstransaction to have failed. In other words, requests would be sent at times 0ms, 100ms, 300ms, 700ms, 1500ms, 3100ms, 4700ms, 6300ms, andport where7900ms. At 9500ms, theBinding Request came from. However, it is encoded using an Exclusive Or (XOR) operation withclient considers the transactionID. Some NAT devicesto have failed if no response has beenfoundreceived. When running STUN over TCP, TCP is responsible for ensuring delivery. The STUN application SHOULD NOT retransmit STUN requests when running over TCP. For STUN requests, failure occurs if there is a transport failure of some sort (generally, due torewrite binary encoded IP addresses presentfatal ICMP errors inprotocol PDUs. Such behavior interferes with the operation of STUN. Clients use XOR-MAPPED-ADDRESS instead of MAPPED-ADDRESS whenever both are presentUDP or connection failures in TCP) or if retransmissions of the same STUN Request doesn't elicit aBindingResponse.Using XOR-MAPPED-ADDRESS protectsIf a failure occurs and the SRV query indicated other STUN servers are available, the clientfrom such interfering NAT devices. The last attributeSHOULD create a new request, which isXOR-ONLY. It can be present inidentical to theBinding Request. It tellsprevious, but has a different transaction ID and MESSAGE INTEGRITY attribute (the HMAC will change because theservertransaction ID has changed). That request is sent toonly send a XOR-MAPPED-ADDRESSthe next element in theBinding Response.list as specified by RFC2782. The Indication message types are not sent reliably. 8.ServerGeneral Client BehaviorThe serverThere are two classes of client behaviordepends on whether-- one for the requestis amessage types and another for the indication message types. 8.1. Request Message Types This section applies to client behavior for the Request message types -- Binding Requestor aand Shared Secret Request.8.1 Binding Requests A STUN server MUST be prepared to receive Binding Requests on four address/port combinations - (A1, P1), (A2, P1), (A1, P2), and (A2, P2). (A1, P1) representFor Request message types, theprimaryclient must discover the STUN server's address and port, obtain a shared secret, formulate the Request, transmit the request reliability, process the Binding Response, andthese areuse theones obtained throughinformation in the Response. 8.1.1. Discovery Unless stated otherwise by a STUN usage, DNS is used to discover the STUN server following these procedures. The clientdiscovery procedures below. Typically, P1will beport 3478,configured with a domain name of the provider of thedefaultSTUNport. A2 and P2 are arbitrary. A2servers. This domain name is resolved to an IP address andP2port using the SRV procedures specified in RFC2782 [4]. The mechanism for configuring the STUN client with the domain name to look up is not in scope of this document. The DNS SRV service name is "stun". The protocol is "udp" for sending Binding Requests, or "tcp" for sending Shared Secret Requests. The procedures of RFC 2782 areadvertised byfollowed to determine the serverthroughto contact. RFC 2782 spells out theCHANGED-ADDRESS attribute, as described below. OPEN ISSUE: Experience has showndetails of how a set of SRV records are sorted and then tried. However, RFC2782 only states that theusageclient should "try to connect to the (protocol, address, service)" without giving any details on what happens in the event ofa dynamicfailure; those details for STUN are described in Section 8.1.3. The default port forP2 has been problematic. ThisSTUN requests isbecause firewall administrators have opened up3478, for both TCP and UDP. Administrators SHOULD use this port3478 to permit STUN,in their SRV records, butdisallowed the dynamic port used byMAY use others. If no SRV records were found, theserver. This causesclient performs an A or AAAA record lookup of thediagnostic techniques to fail. Thisdomain name. The result will be a list of IP addresses, each of which can befixedcontacted at the default port. 8.1.2. Obtaining a Shared Secret As discussed in Section 13, there are several attacks possible on STUN systems. Many of these attacks are prevented throughallocationintegrity protection ofa second port number from IANA. Doesrequests and responses. To provide thatbelong in this specification orintegrity, STUN makes use of a shared secret between client and server which is used as the keying material for the MESSAGE-INTEGRITY attribute in STUN messages. STUN allows for thediagnostic specification? I think it hasshared secret togo here. Itbe obtained in any way (for example Kerberos [16] or ICE [12]). The shared secret MUST have at least 128 bits of randomness. When a client isRECOMMENDED thatneeds to send a Request or an Indication, it can do one of three things: 1. send theserver checkmessage without MESSAGE-INTEGRITY, if permitted by theBinding Request forSTUN usage. 2. use aMESSAGE-INTEGRITY attribute. If not present, andshort term credential, as determined by theserver requires integrity checks onSTUN usage. In this case, therequest, it generates a Binding Error Response with an ERROR-CODE attribute with response code 401. IfSTUN Request or STUN Indication would contain the USERNAME and MESSAGE-INTEGRITYattribute was present,attributes. The message would not contain theserver computesNONCE attribute. The key for MESSAGE-INTEGRITY is theHMAC overpassword. 3. use long term credential, as determined by STUN usage. In this case, the STUN requestas described in Section 10.2.8.contains the USERNAME, REALM, and MESSAGE- INTEGRITY attributes. The request does not contain the NONCE attribute. The keyto use dependsfor MESSAGE-INTEGRITY is MD5(unq(USERNAME- value) ":" unq(REALM-value) ":" password). Based on theshared secret mechanism.STUN usage, the server does one of four things: 1. The server processes the request and generates a response. If theSTUN Shared Secret Request was used,request included thekey MUST beMESSAGE-INTEGRITY attribute, theone associatedserver would also include MESSAGE-INTEGRITY in its response. 2. The server generates an error response indicating that MESSAGE- INTEGRITY with short-term or with long-term credentials are required (error 401). To indicate that short-term credentials are required, theUSERNAMEREALM attribute MUST NOT be present in therequest. Iferror response. To indicate short-term credentials are required, theUSERNAMEREALM attributewas not present,MOST be present in theserver MUST generate a Binding Error Response.error response. 3. TheBinding Error Response MUST includeserver generates anERROR-CODE attribute witherror responsecode 432. If the USERNAMEindicating that a NONCE attribute ispresent, butrequired (error 435) or that the supplied NONCE attribute's value is stale (error 437). 4. The serverdoesn't remember the shared secret forgenerates an error response indicating thatUSERNAME (because it timed out, for example),theserver MUST generate a Binding Error Response. The Binding Error Response MUST include an ERROR-CODE attribute with response code 430. If the server does know the shared secret, but the computed HMAC differs from the one in the request, the server MUST generate a Binding Error Response with an ERROR-CODE attribute with response code 431. The Binding Error Response is sent to the IP address and port the Binding Request came from, and sent from the IP address and port the Binding Request was sent to. Assuming the message integrity check passed, processing continues. The server MUST check for any attributes in the request with values less than or equal to 0x7fff which it does not understand. If it encounters any, the server MUST generate a Binding Error Response, and it MUST include an ERROR-CODE attribute with a 420 response code. That response MUST contain an UNKNOWN-ATTRIBUTES attribute listing the attributes with values less than or equal to 0x7fff which were not understood. The Binding Error Response is sent to the IP address and port the Binding Request came from, and sent from the IP address and port the Binding Request was sent to. Assuming the request was correctly formed, the server MUST generate a single Binding Response. The Binding Response MUST contain the same transaction ID contained in the Binding Request. The length in the message header MUST contain the total length of the message in bytes, excluding the header.short- term credentials are no longer valid (error 430). TheBinding Response MUSTclient will havea message type of "Binding Response". If the XOR-ONLY attribute was not present in the request, the server MUST add a MAPPED-ADDRESS attributetothe Binding Response. The IP address component of this attribute MUST be setobtain new short-term credentials appropriate to its STUN usage. In all of thesource IP address observed inabove error responses, theBinding Request. The port component of thisNONCE attributeMUSTMAY optionally beset to the source port observedincluded in theBinding Request. If the XOR-ONLY attribute was presenterror response, in which case therequest, the serverclient MUSTNOTincludethe MAPPED-ADDRESS attribute in the Binding Response. The server MUST add a XOR-MAPPED-ADDRESS attribute to the Binding Response. This attribute has the same information content as MAPPED- ADDRESS (in particular, it conveys the IP address and port observedthat NONCE in thesource IP and source port fields of thesubsequent STUNrequest), but is encoded by performing an XOR operation between the transaction ID and the IP address and port. The details on the encoding can be found in Section 10.2.12. The server SHOULD add a SERVER attribute to any Binding Response or Binding Error Response it generates, and its value SHOULD indicate the manufacturer of the software and a software version or build number. If the RESPONSE-ADDRESS attribute was absent from the Binding Request, the destination address and port of the Binding Response MUST be the same as the source address and port of the Binding Request. Otherwise, the destination address and port of the Binding Response MUST be the value of the IP address and port in the RESPONSE-ADDRESS attribute.transaction. Thesource address and port of the Binding Response depend on theNONCE valueof the CHANGE-REQUEST attribute and on the address and port the Binding Request was received on, and are summarized in Table 1. Let Da represent the destination IP address of the Binding Request (which will be either A1 or A2), and Dp represent the destination port of the Binding Request (which will be either P1 or P2). Let Ca represent the other address, so that if DaisA1, Ca is A2. If Da is A2, Ca is A1. Similarly, let Cp represent the other port, so that if Dp is P1, Cp is P2. If Dp is P2, Cp is P1. If the "change port" flag was set in CHANGE-REQUEST attribute of the Binding Request, and the "change IP" flag wasnotset, the source IP address of the Binding Response MUST be Da and the source port of the Binding Response MUST be Cp. If the "change IP" flag was set in the Binding Request, and the "change port" flag was not set, the source IP address of the Binding Response MUST be Ca and the source port of the Binding Response MUST be Dp. When both flags are set, the source IP address of the Binding Response MUST be Ca and the source port of the Binding Response MUST be Cp. If neither flag is set, or ifstored by theCHANGE-REQUEST attributeSTUN client; it isabsent entirely, the source IP address of the Binding Response MUST be Da and the source port of the Binding Response MUST be Dp. Flags Source Address Source Port CHANGED-ADDRESS none Da Dp Ca:Cp Change IP Ca Dp Ca:Cp Change port Da Cp Ca:Cp Change IP and Change port Ca Cp Ca:Cp Figure 2 The server MUST add a SOURCE-ADDRESS attribute to the Binding Response, containing the source address and port used to send the Binding Response. The server MUST add a CHANGED-ADDRESS attribute to the Binding Response. This containsonly valid for thesource IP addresssubsequent STUN transaction andportthatwould be used if the client had set the "change IP" and "change port" flags in the Binding Request. As summarized in Table 1, these are Ca and Cp, respectively, regardless of the value of the CHANGE-REQUEST flags. If the Binding Request contained both the USERNAME and MESSAGE- INTEGRITY attributes, the server MUST add a MESSAGE-INTEGRITY attribute to the Binding Response. The attribute contains an HMAC [13] over the response, as describedtransactions retransmissions. STUN messages generated inSection 10.2.8. The keyorder touse depends onobtain the shared secretmechanism. If the STUN Shared Secret Request was used, the key MUST be the one associated with the USERNAME attribute present in the Binding Request. If the Binding Request contained a RESPONSE-ADDRESS attribute, the server MUST add a REFLECTED-FROM attribute to the response. If the Binding Request was authenticated using a username obtained from a Shared Secret Request, the REFLECTED-FROM attribute MUST containare formulated like other messages by following Section 8.1.3. 8.1.3. Formulating thesource IP address and port where that Shared SecretRequestcame from. If the username present in the request was not allocated using a Shared Secret Request, the REFLECTED-FROM attribute MUST contain the source address and port of the entity which obtained the username, as best can be verified with the mechanism used to allocate the username. If the username was not present in the request, and the server was willing to process the request, the REFLECTED-FROM attribute SHOULD contain the source IP address and port where the request came from.Message Theserver SHOULD NOT retransmit the response. Reliability is achieved by having theclientperiodically resend the request, each of which triggers a response from the server. 8.2 Shared Secret Requests Shared Secret Requests are always received on TLS connections. When the server receives a request from the client to establish a TLS connection, it MUST proceed with TLS, and SHOULD present a site certificate. The TLS ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA [4] SHOULD be used. Client TLS authentication MUST NOT be done, since the server is not allocating any resources to clients, and the computational burden can be a source of attacks. If the server receives a Shared Secret Request, it MUST verify that the request arrived on a TLS connection. If it did not receive the request over TLS, it MUST generate a Shared Secret Error Response, and it MUST include an ERROR-CODE attribute with a 433 response code. The destination for the error response depends on the transport on which the request was received. If the Shared Secret Request was received over TCP, the Shared Secret Error Response is sent over the same connection the request was received on. If the Shared Secret Request was receive over UDP, the Shared Secret Error Response is sent to the source IP address and port thatfollows therequest came from. The server MUST check for any attributessyntax rules defined inthe request with values less than or equal to 0x7fff which it does not understand. If it encounters any, the server MUST generate a Shared Secret Error Response,Section 6 andit MUST include an ERROR-CODE attribute with a 420 response code. That response MUST contain an UNKNOWN-ATTRIBUTES attribute listing the attributes with values less than or equal to 0x7fff which were not understood. The Shared Secret Error Response is sent over the TLS connection. All Shared Secret Error Responses MUST contain the same transaction ID contained in the Shared Secret Request. The length in the message header MUST contain the total length of the message in bytes, excluding the header. The Shared Secret Error Response MUST have a message type of "Shared Secret Error Response" (0x0112). Assumingtherequest was properly constructed, the server creates a Shared Secret Response. The Shared Secret Response MUST contain the same transaction ID contained in the Shared Secret Request. The length in the message header MUST contain the total lengthtransmission rules ofthe message in bytes, excluding the header.Section 7. TheShared Secret Response MUST have amessage type of"Shared Secret Response". The Shared Secret Response MUST contain a USERNAME attribute and a PASSWORD attribute. The USERNAME attribute serves as an index to the password, which is contained in the PASSWORD attribute. The server can use any mechanism it chooses to generate the username. However, the username MUST be valid for a period of at least 10 minutes. Validity means thattheserver can compute the password for that username. ThereMUST be asingle password for each username. In other words, the server cannot, 10 minutes later, assign a different password to the same username. The server MUST hand out a different username for each distinct Sharedrequest type; "Binding Request" or "Shared SecretRequest. Distinct, in this case, implies a different transaction ID. It is RECOMMENDED that the server explicitly invalidate the username after ten minutes. It MUST invalidate the username after 30 minutes. The PASSWORD contains the password bound to that username. The password MUST have at least 128 bits. The likelihood that the server assignsRequest" are thesame password fortwodifferent usernames MUST be vanishingly small, and the passwords MUST be unguessable. In other words, they MUST be a cryptographically random function of the username. These requirements can still be met using a stateless server,defined byintelligently computing the USERNAME and PASSWORD. One approach is to construct the USERNAME as: USERNAME = <prefix,rounded-time,clientIP,hmac> Where prefix is some random text string (different for each shared secret request), rounded-time is the current time modulo 20 minutes, clientIP is the source IP address where the Shared Secret Request came from, and hmac is an HMAC [13] over the prefix, rounded-time, and client IP, using a server private key. The password is then computed as: password = <hmac(USERNAME,anotherprivatekey)> Withthisstructure, the username itself, which will be present in the Binding Request, contains the source IP address where the Shared Secret Request came from. That allows the server to meet the requirements specified in Section 8.1 for constructing the REFLECTED- FROM attribute. The server can verify that the username was not tampered with, using the hmac present in the username. The server SHOULD include a SERVER attribute in any Shared Secret Response or Shared Secret Error response it generates, and its value SHOULD indicate the manufacturer of the software and a software version or build number. The Shared Secret Response is sent over the same TLS connection the request was received on. The server SHOULD keep the connection open, and let the client close it. 9. Client Behaviordocument. Thebehavior of the client is very straightforward. Its task is to discover the STUN server, obtain a shared secret, formulate the Binding Request, handle request reliability, process the Binding Responses, and use the resulting addresses. 9.1 Discovery Generally, theclientwill be configured withcreates adomain name of the provider of theSTUNservers. This domain name is resolved to an IP address and port using the SRV procedures specified in RFC 2782 [3]. Specifically, the service name is "stun". The protocol is "udp" for sending Binding Requests, or "tcp" for sending Shared Secret Requests. The procedures of RFC 2782 are followed to determine the server to contact. RFC 2782 spells out the details of how a set of SRV records are sorted and then tried. However, it only states that the client should "try to connect to the (protocol, address, service)" without giving any details on what happens inmessage following theevent of failure. Those details are described here for STUN. ForSTUNrequests, failure occurs if there is a transport failure of some sort (generally, due to fatal ICMP errors in UDP or connection failuresmessage structure described inTCP). Failure also occurs if the transaction fails due to timeout. This occurs 9.5 seconds after the first request is sent, for both Shared Secret Requests and Binding Requests. SeeSection9.3 for details on transaction timeouts for Binding Requests. If a failure occurs, the6. The client SHOULDcreate a new request, which is identical to the previous, but hasadd adifferent transaction ID and MESSAGEMESSAGE- INTEGRITYattribute (the HMAC will change because the transaction ID has changed). That request is sent to the next element in the list as specified by RFC 2782. The default port for STUN requests is 3478, for both TCPandUDP. Administrators SHOULD use this port in their SRV records, but MAY use others. If no SRV records were found, the client performs an A record lookup of the domain name. The result will be a list of IP addresses, each of which can be contacted at the default port. This would allow a firewall adminUSERNAME attribute toopentheSTUN port, so hosts within the enterprise could access new applications. Whether they will or won't do this is a good question. 9.2 Obtaining a Shared Secret As discussed in Section 11, there are several attacks possible on STUN systems. Many of these are prevented through integrity of requests and responses. To provide that integrity, STUN makes use of a shared secret between client and server, used as the keying material for an HMAC used in both the BindingRequestand Binding Response. STUN allows for the shared secret to be obtained in any way (for example, Kerberos [14]). However, it MUST have at least 128 bits of randomness. In order to ensure interoperability, this specification describes a TLS-based mechanism. This mechanism, described in this section, MUST be implemented by clients and servers. First, the client determines the IP address and port that it will open a TCP connection to. This is done using the discovery procedures in Section 9.1. The client opens up the connection to that address and port, and immediately begins TLS negotiation [2]. The client MUST verify the identity of the server. To do that, it follows the identification procedures defined in Section 3.1 of RFC 2818 [5]. Those procedures assume the client is dereferencing a URI. For purposes of usage with this specification, the client treats the domain name or IP address used in Section 9.1 as the host portion of the URI that has been dereferenced.message. Oncethe connection is opened,formulated, the client sendsa Shared Secret request. This request has no attributes, just the header. The transaction ID in the header MUST meet the requirements outlined for the transaction ID in a binding request, described in Section 9.3 below. The server generates a response, which can either be a Shared Secret Response or a Shared Secret Error Response. If the response was a Shared Secret Error Response, the client checks the response code in the ERROR-CODE attribute. Interpretation of those response codes is identical to the processing of Section 9.4 forthe BindingError Response. If a client receives a Shared Secret Response with an attribute that is not understood whose typeRequest. Reliability isgreater than 0x7fff, the attribute MUST be ignored. If theaccomplished through clientreceives a Shared Secret Response with an unknown attribute whose type is less than or equal to 0x7fff, the response is ignored. Ifretransmissions, following theresponse was a Shared Secret Response, it will contain a short lived username and password, encodedprocedure inthe USERNAME and PASSWORD attributes, respectively.Section 7.1. The client MAYgeneratesend multipleShared Secret Requestsrequests on the connection, and itMAY do so before receiving Shared Secret Responses to previous Shared Secret Requests. Themay pipeline requests (that is, it can have multiple requests outstanding at the same time). When using TCP the client SHOULD close the connection as soon as it hasfinished obtaining usernames and passwords. Section 9.3 describes how these passwords are used to provide integrity protection over Binding Requests, and Section 8.1 describes how it is used in Binding Responses. 9.3 Formulating the Binding Request A Binding Request formulated by the client follows the syntax rules defined in Section 10. Any two requests that are not bit-wise identical, and not sent to the same server from the same IP address and port, MUST carry different transaction IDs. The transaction ID MUST be uniformly and randomly distributed between 0 and 2**128 - 1. The large range is needed becausereceived thetransaction ID serves as a form of randomization, helping to prevent replays of previously signedSTUN Response. 8.1.4. Processing Responses All responses, whether success responsesfrom the server. The message type of the requestor error responses, MUST first be"Binding Request". The RESPONSE-ADDRESS attribute is optional inauthenticated by theBinding Request. Itclient. Authentication isused ifperformed by first comparing theclient wishesTransaction ID of the response tobe sent to a different IP address and port thanan oustanding request. If there is no match, theoneclient MUST discard therequest was sent from. The CHANGE-REQUEST attribute is also optional. It tellsresponse. Then theserver to sendclient SHOULD check the responsefromfor adifferent address or port. Both RESPONSE-ADDRESSMESSAGE-INTEGRITY attribute. If not present, andCHANGE-REQUEST are primarily useful in diagnostic operations for analyzingthebehavior of a NAT. Under normal usage, neither of these attributes will be present. TheclientSHOULD addplaced a MESSAGE-INTEGRITYand USERNAMEattributetointo theBinding Request. Thisassociated request, it MUST discard the response. If MESSAGE-INTEGRITYattribute contains an HMAC [13]. The value ofis present, theusername, andclient computes the HMAC over the response as described in Section 11.8. The key to usein the MESSAGE-INTEGRITY attribute dependdepends on the shared secret mechanism. If the STUN Shared Secret Request was used, theUSERNAME mustkey MUST bea valid username obtained from a Shared Secret Response within the last nine minutes. The shared secret for the HMAC is the value of the PASSWORD attribute obtained from thesameShared Secret Response. Once formulated, the client sends the Binding Request. Reliability is accomplished through client retransmissions. Clients SHOULD retransmitas used to compute therequest starting with an interval of 100ms, doubling every retransmit untilMESSAGE-INTEGRITY attribute in theinterval reaches 1.6s. Retransmissions continue with intervals of 1.6s until a response is received, or a total of 9 requests have been sent.request. Ifno response is received by 1.6 seconds after the last request has been sent, the client SHOULD considerthetransaction to have failed. In other words, requests would be sent at times 0ms, 100ms, 300ms, 700ms, 1500ms, 3100ms, 4700ms, 6300ms, and 7900ms. At 9500ms,computed HMAC matches theclient considersone from thetransaction to have failed if no response has been received. 9.4 Processing Binding Responsesresponse, processing continues. The response can either be a Binding Response or Binding Error Response.Binding Error Responses are always received on the source address and port the request was sent from. A Binding Response will be received on the address and port placed in the RESPONSE-ADDRESS attribute of the request. If none was present, the Binding Responses will be received on the source address and port the request was sent from.If the response isa Bindingan Error Response, the client checks the response code from the ERROR-CODE attribute of the response. For a 400 response code, the client SHOULD display the reason phrase to the user. For a 420 response code, the client SHOULD retry the request, this time omitting any attributes listed in the UNKNOWN-ATTRIBUTES attribute of the response. For a 430 response code, the client SHOULD obtain a newshared secret,one-time username and password, and retry theBindingAllocate Request with a new transaction. For 401 and 432 response codes, if the client had omitted the USERNAME or MESSAGE-INTEGRITY attribute as indicated by the error, it SHOULD try again with those attributes. A new one-time username and password is needed in that case. For a 431 response code, the client SHOULD alert the user, and MAY try the request again after obtaining a new username and password. For a 300 response code, the client SHOULD attempt a new transaction to the server indicated in the ALTERNATE-SERVER attribute. For a 500 response code, the client MAY wait several seconds and then retry therequest.request with a new username and password. For a 600 response code,theclient MUST NOT retry therequest,request and SHOULD display the reason phrase to the user. Unknownattributesresponse codes between 400 and 499 are treated like a 400, unknownattributesresponse codes between 500 and 599 are treated like a 500, and unknownattributesresponse codes between 600 and 699 are treated like a 600. Any response between 100 and399299 MUST result in the cessation of request retransmissions, but otherwise is discarded.If a client receives a response with anBinding Responses containing unknownattribute whose type is greateroptional attributes (greater than0x7fff, the attribute0x7FFF) MUST beignored. Ifignored by theclient receives a response with anSTUN client. Binding Responses containing unknownattribute whose type is lessmandatory attributions (less than or equal to0x7fff, request retransmissions MUST cease, but the entire response is otherwise ignored. If the response is a Binding Response, the client SHOULD check the response for a MESSAGE-INTEGRITY attribute. If not present, and the client placed a MESSAGE-INTEGRITY attribute into the request, it MUST discard the response. If present, the client computes the HMAC over the response as described in Section 10.2.8. The key to use depends on the shared secret mechanism. If the STUN Shared Secret Request was used, the key0x7FFF) MUST besame as used to compute the MESSAGE- INTEGRITY attribute in the request. If the computed HMAC differs from the one in the response, the client SHOULD determine if the integrity check failed due to a NAT rewriting the MAPPED-ADDRESS. To perform this check, the client compares the IP address and port in the MAPPED-ADDRESS with the IP address and port extracted from XOR- MAPPED-ADDRESS (extraction involves xor'ing the contents of X-port and X-value with the transaction ID, as described in Section 10). If the two IP addresses and ports differ, the client MUST discard the response, but then it SHOULD retry the Binding Request with the XOR- ONLY attribute included. This tells the server not to include a MAPPED-ADDRESS in the Binding Response. If there is no XOR-MAPPED-ADDRESS, or if there is, but there are no differences between the two IP addresses and ports, the client MUST discard the response and SHOULD alert the user about a possible attack. If the computed HMAC matches the one from the response, processing continues. Reception of a response (either Binding Error Response or Binding Response) to a Binding Request will terminate retransmissions of that request. However, clients MUST continue to listen for responses to a Binding Request for 10 seconds after the first response. If it receives any responses in this interval with different message types (Binding Responses and Binding Error Responses, for example), different MAPPED-ADDRESSes, or different XOR-MAPPED-ADDRESSes, it is an indication of a possible attack. The client MUST NOT use the MAPPED-ADDRESS or XOR-MAPPED-ADDRESS from any of the responses it received (either the first or the additional ones), and SHOULD alert the user. Furthermore, if a client receives more than twice as many Binding Responses as the number of Binding Requests it sent, it MUST NOT use the MAPPED-ADDRESS or XOR-MAPPED-ADDRESS from any of those responses, and SHOULD alert the user about a potential attack. If the Binding Response is authenticated, and the MAPPED-ADDRESS or XOR-MAPPED-ADDRESS was notdiscardedbecause of a potential attack, the CLIENT MAY use the information in the Binding Response. In particular, the client SHOULD used the IP addressandport from the XOR-MAPPED-ADDRESS instead of the information from the MAPPED- ADDRESS, assuming XOR-MAPPED-ADDRESS was present in the Binding Response. Servers compliant to RFC 3489 [19] will not generate XOR- MAPPED-ADDRESS, so a client MUST be prepared to handle the case where only MAPPED-ADDRESS is present. In suchconsidered immediately as acase, the information from MAPPED-ADDRESS is used.failed transaction. It is also possible for an IPv4 host to receive a XOR-MAPPED-ADDRESS or MAPPED-ADDRESS containing an IPv6 address, or for an IPv6 host to receive a XOR-MAPPED-ADDRESS or MAPPED-ADDRESS containing an IPv4 address. Clients MUST be prepared for this case.The next section provides additional details on how the mapped address information is used. 9.58.1.5. Using the Mapped Address This section applies to the Binding Response message type. The Binding Response message type always includes either the MAPPED- ADDRESS attribute or the XOR-MAPPED-ADDRESS attribute, depending on the presence of the magic cookie in the corresponding Binding Request. The mapped address present in theXOR-MAPPED-ADDRESS attribute (or MAPPED-ADDRESS if not present) of thebinding response can be used by clients to facilitateUDPtraversal of NATs for many applications. NAT traversal is problematic for applications which require a client to insert an IP address and port into a message, to which subsequent messages will be delivered by other entities in a network. Normally, the client would insert the IP address and port from a local interface into the message. However, if the client is behind a NAT, this local interface will be a private address. Clients within other address realms will not be able to send messages to that address. An example of a such an application is SIP, which requires a client to include IP address and port information in several places, including the Session Description Protocol(SDP)(SDP [19]) body[20]carried by SIP. The IP address and port present in the SDP is used for receipt of media. To use STUN as a technique for traversal of SIP and other protocols, when the client wishes to send a protocol message, it figures out the places in the protocol data unit where it is supposed to insert its own IP address along with a port. Instead of directly using a port allocated from a local interface, the client allocates a port from the local interface, and from that port, initiates the STUN procedures described above. TheXOR-MAPPED-ADDRESS (or MAPPED- ADDRESS if not present)mapped address in theSTUNBinding Response (XOR-MAPPED-ADDRESS or MAPPED- ADDRESS) provides the client with an alternative IP address and port which it can then include in the protocolPDU.payload. This IP address and port may be within a different address family than the local interfaces used by the client. This is not an error condition. In such a case, the client would use the learned IP address and port as if the client was a host with an interface within that address family. In the case of SIP, to populate the SDP appropriately, a client would generate two STUN Binding Request messages at the time a call is initiated or answered. One is used to obtain the IP address and port for RTP, and the other, for the Real Time Control Protocol(RTCP) [12].(RTCP)[14]. The client might also need to use STUN to obtain IP addresses and ports for usage in other parts of the SIP message. The detailed usage of STUN to facilitate SIP NAT traversal is outside the scope of this specification. As discussed above, the addresses learned by STUN may not be usable with all entities with whom a client might wish to communicate. The way in which this problem is handled depends on the application protocol. The ideal solution is for a protocol to allow a client to include a multiplicity of addresses and ports in the PDU. One of those can be the address and port determined from STUN, and the others can include addresses and ports learned from other techniques. The application protocol would then provide a means for dynamically detecting which one works. An example of such an an approach is Interactive Connectivity Establishment(ICE) [21]. 10. Protocol Details(ICE [12]). 8.2. Indication Message Types This sectionpresentsapplies to client behavior for thedetailed encodingIndication message types. 8.2.1. Formulating the Indication Message The client follows the syntax rules defined in Section 6 and the transmission rules of Section 7. The message type MUST be one of the Indication message types; none are defined by this document. The client creates a STUNmessage.message following the STUNis a request-response protocol. Clients sendmessage structure described in Section 6. The client SHOULD add arequest,MESSAGE- INTEGRITY and USERNAME attribute to theserverRequest message. Once formulated, the client sends the Indication message. Indication message types are not sent reliably, do not elicit aresponse. Thereresponse from the server, and aretwo requests, Binding Request,not retransmitted. The client MAY send multiple indications on the connection, andShared Secret Request.it may pipeline indication messages. When using TCP the client SHOULD close the TCP connection as soon as it has transmitted the indication message. 9. General Server Behavior 9.1. Request Message Types Theresponseserver behavior for receiving request message types is described in this section. 9.1.1. Receive Request Message A STUN server MUST be prepared toa Bindingreceive Requestcan eitherand Indication messages on the IP address and UDP or TCP port that will be discovered by theBinding ResponseSTUN client when the STUN client follows its discovery procedures described in Section 8.1.1. Depending on the usage, the STUN server will listen for incoming UDP STUN messages, incoming TCP STUN messages, orBinding Error Response.incoming TLS exchanges followed by TCP STUN messages. The usages describe how the STUN server determines the usage. The server checks the request for a MESSAGE-INTEGRITY attribute. If not present, the server generates an error response with an ERROR- CODE attribute and a response code of 401. That error response MUST include a NONCE attribute, containing a nonce that the server wishes the client to reflect back in aShared Secret Request can either besubsequent request (and therefore include in the message integrity computation). The error response MUST include aShared Secret Response orREALM attribute, containing aShared Secret Error Response. STUN messages are encoded using binary fields. All integer fieldsrealm from which the username and password arecarried in network byte order, that is, most significant byte (octet) first. This byte orderscoped [8]. If the MESSAGE-INTEGRITY attribute was present, the server checks for the existence of the REALM attribute. If the attribute iscommonly known as big-endian. The transmission ordernot present, the server MUST generate an error response. That error response MUST include an ERROR-CODE attribute with response code of 434. That error response MUST also include a NONCE and a REALM attribute. If the REALM attribute was present, the server checks for the existence of the NONCE attribute. If the NONCE attribute is not present, the server MUST generate an error response. That error response MUST include an ERROR-CODE attribute with a response code of 435. That error response MUST include a NONCE attribute and a REALM attribute. If the NONCE attribute was present, the server checks for the existence of the USERNAME attribute. If it was not present, the server MUST generate an error response. The error response MUST include an ERROR-CODE attribute with a response code of 432. It MUST include a NONCE attribute and a REALM attribute. If the USERNAME attribute was present, the server computes the HMAC over the request as described indetailSection 11.8. The key is computed as MD5(unq(USERNAME-value) ":" unq(REALM-value) ":" password), where the password is the password associated with the username and realm provided inAppendix Bthe request. If the server does not have a record for that username within that realm, the server generates an error response. That error response MUST include an ERROR-CODE attribute with a response code ofRFC 791 [6]. Unless otherwise noted, numeric constants436. That error response MUST include a NONCE attribute and a REALM attribute. This format for the key was chosen so as to enable a common authentication database for SIP and STUN, as it is expected that credentials are usually stored indecimal (base 10). 10.1 Message Header All STUN messages consisttheir hashed forms. If the computed HMAC differs from the one from the MESSAGE-INTEGRITY attribute in the request, the server MUST generate an error response with an ERROR-CODE attribute with a response code of 431. This response MUST include a20 byte header: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | STUN Message Type | Message Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Transaction ID +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+NONCE attribute and a REALM attribute. If the computed HMAC doesn't differ from the one in the request, but the nonce is stale, the server MUST generate an error response. That error response MUST include an ERROR-CODE attribute with response code 430. That error response MUST include a NONCE attribute and a REALM attribute. TheMessage Types can take onserver MUST check for any mantadory attributes in thefollowing values: 0x0001 : Binding Request 0x0101 : Binding Response 0x0111 :request (values less than or equal to 0x7fff) which it does not understand. If it encounters any, the server MUST generate a Binding Error Response, and it MUST include an ERROR-CODE attribute with a 420 response code. Any attributes that are known, but are not supposed to be present in a message (MAPPED-ADDRESS in a request, for example) MUST be ignored. 9.1.2. Constructing the Response0x0002 : Shared Secret Request 0x0102 : Shared Secret Response 0x0112 : Shared Secret ErrorTo construct the STUN ResponseIt is important to note thatthemost significant two bits of everySTUN server follows the messageare equal to 0b00. This aidsstructure described indifferentiating STUN packetsSection 6. The server then copies the Transaction ID fromRTP packets,the Request to the Response. If the STUN response is a success response, the STUN server adds 0x100 to the Message Type; if a failure response the STUN server adds 0x110 to the Message Type. Depending in thecase that bothRequest message type and the message attributes of the request, the response is constructed; see Figure 4. 9.1.3. Sending the Response All Response messages are sent to thesameIP address andport, as is done with ICE. The message length isport thecount, in bytes, ofassociated Binding Request came from, and sent from thesize ofIP address and port themessage,Binding Request was sent to. 9.2. Indication Message Types Indication messages cause the server to change its state. Indication message types to notincludingcause the20 byte header. The transaction IDserver to send a response message. Indication message types are defined in other documents, for example in [3]. 10. Short-Term Passwords Short-term passwords are useful to provide authentication and integrity protection to STUN Request and STUN Response messages. Short-term passwords are useful when there is no long-term relationship with a STUN server and thus no long-term password isa 128 bit identifier. It also serves as salt to randomizeshared between therequestSTUN client and STUN server. Even if there is a long-term password, theresponse. All responses carry the same identifier as the request they correspond to. 10.2 Message Attributes After the header are 0 or more attributes. Each attributeissuance of a short-term password isTLV encoded, withuseful to prevent dictionary attacks. Short-term passwords can be used multiple times for as long as a16 bit type, 16 bit length, and variable value: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value .... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+usage allows the same short-term password to be used. Thefollowing types are defined: 0x0001: MAPPED-ADDRESS 0x0002: RESPONSE-ADDRESS 0x0003: CHANGE-REQUEST 0x0004: SOURCE-ADDRESS 0x0005: CHANGED-ADDRESS 0x0006: USERNAME 0x0007: PASSWORD 0x0008: MESSAGE-INTEGRITY 0x0009: ERROR-CODE 0x000a: UNKNOWN-ATTRIBUTES 0x000b: REFLECTED-FROM 0x8020: XOR-MAPPED-ADDRESS 0x0021: XOR-ONLY 0x8022: SERVERduration of validity is determined by usage. 11. STUN Attributes To allow future revisions of this specification to add new attributes if needed, the attribute space is divided into optional and mandatory ones. Attributes with values greater than 0x7fff are optional, which means that the message can be processed by the client or server even though the attribute is not understood. Attributes with values less than or equal to 0x7fff are mandatory to understand, which means that the client or server cannot successfully process the message unless it understands the attribute.The MESSAGE-INTEGRITY attribute MUST beIn order to align attributes on word boundaries, thelast attribute within a message. Anylength of the all message attributesthat are known, but are not supposed tovalues MUST bepresent in0 or a multiple of 4 bytes. Extensions to this specification MUST also follow this requirement. The values of the message(MAPPED-ADDRESSattributes are enumerated ina request, for example) MUST be ignored. Figure 9Section 15. The following figure indicates which attributes are present in which messages. An M indicates that inclusion of the attribute in the message is mandatory, O means its optional, C means it's conditional based on some other aspect of the message, andN/A- means that the attribute is not applicable to that message type.Binding Shared Shared Shared Binding Binding Error Secret Secret Secret Att. Req. Resp. Resp. Req. Resp.ErrorResp. _____________________________________________________________________Attribute Request Response Response ______________________________________________ MAPPED-ADDRESSN/A M N/A N/A N/A N/A RESPONSE-ADDRESS O N/A N/A N/A N/A N/A CHANGE-REQUEST O N/A N/A N/A N/A N/A SOURCE-ADDRESS N/A M N/A N/A N/A N/A CHANGED-ADDRESS N/A M N/A N/A N/A N/A- C - USERNAME ON/A N/A N/A M N/A- - PASSWORDN/A N/A N/A N/A M N/A- - - MESSAGE-INTEGRITY O ON/A N/A N/A N/AO ERROR-CODEN/A N/A M N/A N/A- - MUNKNOWN-ATTRIBUTES N/A N/AALTERNATE-SERVER - - CN/A N/AREALM CREFLECTED-FROM N/ACN/A N/A N/A N/AC NONCE C - C UNKNOWN-ATTRIBUTES - - C XOR-MAPPED-ADDRESSN/A- MN/A N/A N/A N/A- XOR-ONLY ON/A N/A N/A N/A N/A- - SERVERN/A O- ON/AO BINDING-LIFETIME - O - Figure9 The length refers to the length of the value element, expressed as an unsigned integral number of bytes. 10.2.14: Mandatory Attributes and Message Types 11.1. MAPPED-ADDRESS The MAPPED-ADDRESS attribute indicates the mapped IP address and port. It consists of an eight bit address family, and a sixteen bit port, followed by a fixed length value representing the IP address. If the address family is IPv4, the address is 32 bits. If the address family is IPv6, the address is 128 bits. For backwards compatibility with RFC3489-compliant STUN clients, if the magic cookie was not present in the associated Binding Request, this attribute MUST be present in the associated response. Discussion: Some NATs rewrite the 32-bit binary payloads containing the NAT's public IP address, such as STUN's MAPPED- ADDRESS attribute. Such behavior interferes with the operation of STUN and also causes failure of STUN's message integrity checking. Presence of the magic cookie in the STUN Request indicates the client is compatible with this specification and is capable of processing XOR-MAPPED-ADDRESS. The format of the MAPPED-ADDRESS attribute is: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |x x x x x x x x| Family | Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Address (variable) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+The port is a network byte ordered representationFigure 5: Format ofthe mapped port.MAPPED-ADDRESS attribute The address family can take on the following values: 0x01: IPv4 0x02: IPv6 The port is a network byte ordered representation of the port the Binding Request arrived from. The first 8 bits of the MAPPED-ADDRESS areignored,ignored for the purposes of aligning parameters on natural boundaries.10.2.211.2. RESPONSE-ADDRESS The RESPONSE-ADDRESS attribute indicates where the response to a Binding Request should be sent. Its syntax is identical to MAPPED- ADDRESS.10.2.3This attribute is not used by any STUN usages defined in this document except for backwards compatibility with RFC3489 clients when using the Binding Discovery usage (Section 12.2). Section 12.2.8 describes when this attribute must be included in a binding response. Issue: should this attribute be made specific to Binding Discovery or moved to another document entirely. 11.3. CHANGED-ADDRESS The CHANGED-ADDRESS attribute indicates the IP address and port where responses would have been sent from if the "change IP" and "change port" flags had been set in the CHANGE-REQUEST attribute of the Binding Request.The attribute is always present in a Binding Response, independent of the value of the flags.Its syntax is identical to MAPPED-ADDRESS.10.2.4This attribute is not used by any STUN usages defined in this document except for backwards compatibility with RFC3489 clients when using the Binding Discovery usage (Section 12.2). Section 12.2.8 describes when this attribute must be included in a binding response. Issue: should this attribute be made specific to Binding Discovery or moved to another document entirely. 11.4. CHANGE-REQUEST The CHANGE-REQUEST attribute is used by the client to request that the server use a different address and/or port when sending the response. The attribute is 32 bits long, although only two bits (A and B) are used: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 A B 0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The meaning of the flagsis:are: A: This is the "change IP" flag. If true, it requests the server to send the Binding Response with a different IP address than the one the Binding Request was received on. B: This is the "change port" flag. If true, it requests the server to send the Binding Response with a different port than the one the Binding Request was received on.10.2.5This attribute is not used by any STUN usages defined in this document. Issue: should this attribute be made specific to Binding Discovery or moved to another document entirely. 11.5. SOURCE-ADDRESS The SOURCE-ADDRESS attribute is present in Binding Responses. It indicates the source IP address and port that the server is sending the response from. Its syntax is identical to that of MAPPED- ADDRESS.10.2.6This attribute is not used by any STUN usages defined in this document except for backwards compatibility with RFC3489 clients when using the Binding Discovery usage (Section 12.2). Section 12.2.8 describes when this attribute must be included in a binding response. Issue: should this attribute be made specific to Binding Discovery or moved to another document entirely. 11.6. USERNAME The USERNAME attribute is used for message integrity. Itserves as a means to identifyidentifies the shared secret used in the message integrity check. The USERNAME is always present in a Shared Secret Response, along with the PASSWORD.It is optionally present in a Binding Request whenWhen message integrity isused.used with Binding Request messages, the USERNAME attribute MUST be included. The value of USERNAME is a variable length opaque value.Its length MUST be a multiple of 4 (measured in bytes) in order to guarantee alignment of attributes on word boundaries. 10.2.7 PASSWORD The11.7. PASSWORDattribute is used in Shared Secret Responses. ItIf the message type isalways present in aShared SecretResponse, along withResponse it MUST include theUSERNAME.PASSWORD attribute. The value of PASSWORD is a variable lengthvalue thatopaque value. The password returned in the Shared Secret Response isto beused asa shared secret. Its length MUST be a multiple of 4 (measured in bytes)the HMAC inorder to guarantee alignmentthe MESSAGE-INTEGRITY attribute ofattributes on word boundaries. 10.2.8a subsequent STUN transaction. 11.8. MESSAGE-INTEGRITY The MESSAGE-INTEGRITY attribute contains an HMAC-SHA1[13][9] of the STUN message.ItThe MESSAGE-INTEGRITY attribute can be present inBinding Requests or Binding Responses.any STUN message type. Since it uses the SHA1 hash, the HMAC will be 20 bytes. The text used as input to HMAC is the STUN message, including the header, up to and including the attribute preceding the MESSAGE- INTEGRITY attribute. That text is then padded with zeroes so as to be a multiple of 64 bytes. As a result, the MESSAGE-INTEGRITY attributeMUST beis the last attribute in any STUN message. However, STUN clients MUST be able to successfully parse and process STUN messages which have additional attributes after the MESSAGE-INTEGRITY attribute. STUN clients that are compliant with this specification SHOULD ignore attributes that are after the MESSAGE-INTEGRITY attribute. The key used as input to HMAC depends on thecontext. 10.2.9STUN usage and the shared secret mechanism. 11.9. ERROR-CODE The ERROR-CODE attribute is present in the Binding Error Response and Shared Secret Error Response. It is a numeric value in the range of 100 to 699 plus a textual reason phrase encoded in UTF-8, and is consistent in its code assignments and semantics with SIP [10] and HTTP[15].[11]. The reason phrase is meant for user consumption, and can be anything appropriate for the response code. Thelengthslength of the reasonphrasesphrase MUST be a multiple of 4 (measured inbytes). This can bebytes), accomplished by added spaces to the end of the text, if necessary. Recommended reason phrases for the defined response codes are presented below. To facilitate processing, the class of the error code (the hundreds digit) is encoded separately from the rest of the code. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 0 |Class| Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reason Phrase (variable) .. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The class represents the hundreds digit of the response code. The value MUST be between 1 and 6. The number represents the response code modulo 100, and its value MUST be between 0 and 99. The following response codes, along with their recommended reason phrases (in brackets) are defined at this time: 300 (Try Alternate): The client should contact an alternate server for this request. 400 (Bad Request): The request was malformed. The client should not retry the request without modification from the previous attempt. 401 (Unauthorized): The Binding Request did not contain a MESSAGE- INTEGRITY attribute. 420 (Unknown Attribute): The server did not understand a mandatory attribute in the request. 430 (Stale Credentials): The Binding Request did contain a MESSAGE- INTEGRITY attribute, but it used a shared secret that has expired. The client should obtain a new shared secret and try again. 431 (Integrity Check Failure): The Binding Request contained a MESSAGE-INTEGRITY attribute, but the HMAC failed verification. This could be a sign of a potential attack, or client implementation error. 432 (Missing Username): The Binding Request contained a MESSAGE- INTEGRITY attribute, but not a USERNAME attribute. Both USERNAME and MESSAGE-INTEGRITY must be present for integrity checks. 433 (Use TLS): The Shared Secret request has to be sent over TLS, but was not received over TLS. 434 (Missing Realm): The REALM attribute was not present in the request. 435 (Missing Nonce): The NONCE attribute was not present in the request. 436 (Unknown Username): The USERNAME supplied in the Request is not known or is not known in the given REALM. 437 (Stale Nonce): The NONCE attribute was present in the request but wasn't valid. 500 (Server Error): The server has suffered a temporary error. The client should try again. 600 (Global Failure): The server is refusing to fulfill the request. The client should not retry.10.2.10Issue: Do 300/500/600 mean that other STUN servers returned in the same SRV lookup should be retried / not retried? With same SRV Priority? 11.10. REFLECTED-FROM The REFLECTED-FROM attribute is present only in Binding Responses, when the Binding Request contained a RESPONSE-ADDRESS attribute. The attribute contains the identity (in terms of IP address) of the source where the request came from. Its purpose is to provide traceability, so that a STUN server cannot be used as a reflector for denial-of-service attacks. Its syntax is identical to the MAPPED- ADDRESS attribute. This attribute is not used by any STUN usages defined in this document. Issue: should this attribute be made specific to Binding Discovery or moved to another document entirely. 11.11. ALTERNATE-SERVER The alternate server represents an alternate IP address and port for a different TURN server to try. It is encoded in the same way as MAPPED-ADDRESS. 11.12. REALM The REALM attribute is present in Requests and Responses. It contains text which meets the grammar for "realm" as described in RFC3261 [10], and will thus contain a quoted string (including the quotes). Presence of the REALM attribute indicates that long-term credentials are used for the values of the USERNAME, PASSWORD, and MESSAGE- INTEGRITY attributes. 11.13. NONCE The NONCE attribute is present in Requests and in Error responses. It contains a sequence of qdtext or quoted-pair, which are defined in RFC3261 [10]. 11.14. UNKNOWN-ATTRIBUTES The UNKNOWN-ATTRIBUTES attribute is present only in a Binding Error Response or Shared Secret Error Response when the response code in the ERROR-CODE attribute is 420. The attribute contains a list of 16 bit values, each of which represents an attribute type that was not understood by the server. If the number of unknown attributes is an odd number, one of the attributes MUST be repeated in the list, so that the total length of the list is a multiple of 4 bytes. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Attribute 1 Type | Attribute 2 Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Attribute 3 Type | Attribute 4 Type ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+10.2.11 REFLECTED-FROM The REFLECTED-FROM attribute is present only in Binding Responses, when the Binding Request contained a RESPONSE-ADDRESS attribute. The attribute contains the identity (in terms of IP address)Figure 9: Format ofthe source where the request came from. Its purpose is to provide traceability, so that a STUN server cannot be used as a reflector for denial-of-service attacks. Its syntax is identical to the MAPPED-ADDRESS attribute. 10.2.12UNKNOWN-ATTRIBUTES attribute 11.15. XOR-MAPPED-ADDRESS The XOR-MAPPED-ADDRESS attribute is only present in Binding Responses. It provides the same information thatiswould present in the MAPPED-ADDRESSattribute. However, the information is encoded by performing an exclusive or (XOR) operation betweenattribute but because themappedNAT's public IP addressandis obfuscated through thetransaction ID. Unfortunately, some NAT devices have been found to rewrite binary encoded IP addresses and ports thatXOR function, STUN messages arepresent in protocol payloads. This behavior interferesable to pass through NATs which would otherwise interfere withthe operation ofSTUN.By providingSee themapped addressdiscussion inan obfuscated form, STUN can continueSection 11.1. This attribute MUST always be present in a Binding Response. Note: Version -02 of this Internet Draft used 0x8020 for this attribute, which was in the Optional range of attributes. This attribute has been moved back tooperate through these devices.0x0020 as a Mandatory attribute. [This paragraph should be removed prior to publication as an RFC.] The format of the XOR-MAPPED-ADDRESS is: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |x x x x x x x x| Family | X-Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | X-Address (Variable) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 10: Format of XOR-MAPPED-ADDRESS Attribute The Family represents the IP address family, and is encoded identically to the Family in MAPPED-ADDRESS. X-Port isequal totheport in MAPPED-ADDRESS,mapped port, exclusiveor'edor'd with most significant 16 bits of thetransaction ID.magic cookie. If the IP address family is IPv4, X-Address isequal to themapped IP addressin MAPPED- ADDRESS,exclusiveor'edor'd with themost significant 32 bits of the transaction ID.magic cookie. If the IP address family is IPv6, the X-Address isequal tothe mapped IP addressin MAPPED-ADDRESS, exclusiveexclusively or'ed with theentire 128 bitmagic cookie and the 96-bit transaction ID.10.2.13 XOR-ONLY This attribute is present in a Binding Request. ItIssue: The motivation for XORing the IP address isused by a client to request thatclear. Is there aserver compliantmotivation for XORing the port? For example, using the "^" character tothis specification omitindicate exclusive or, if theMAPPED-ADDRESS from a Binding Response,IP address is 192.168.1.1 (0xc0a80101) andinclude onlytheXOR- MAPPED-ADDRESS. This is necessary in cases where a Binding Response is failing integrity checks because a NATport isrewriting the contents of a MAPPED-ADDRESS in5555 (0x15B3), theBinding Response. This attribute has a length of zero,X-Port would be 0x15B3 ^ 0x2112 = 0x34A1, andtherefore contains no other information pastthecommon attribute header. 10.2.14X-Address would be 0xc0a80101 ^ 0x2112A442 = 0xe1baa543. 11.16. SERVER The server attribute contains a textual description of the software being used by the server, including manufacturer and version number. The attribute has no impact on operation of the protocol, and serves only as a tool for diagnostic and debugging purposes. The length of the server attribute MUST be a multiple of 4 (measured in bytes), accomplished by added spaces to the end of the text, if necessary. The value of SERVER is variable length.Its length11.17. ALTERNATE-SERVER The alternate server represents an alternate IP address and port for a different STUN server to try. It is encoded in the same way as MAPPED-ADDRESS. This attribute is MUST only appear in an Error Response. This attribute MUST only appear when using the TURN usage. 11.18. BINDING-LIFETIME The binding lifetime indicates the number of seconds the NAT binding will be valid. This attribute MUST only be present in Response messages. This attribute MUST NOT be present unless the STUN server is aware of the minimum binding lifetime of all NATs on the path between the STUN client and the STUN server. 12. STUN Usages STUN is amultiplesimple request/response protocol that provides a useful capability in several situations. In this section, different usages of4 (measuredSTUN are described. Each usages may differ in how STUN servers are discovered, the message types, and the message attributes that are supported. This specification defines the STUN usages for binding discovery (Section 12.2), connectivity check (Section 12.3), NAT keepalives (Section 12.4) and short-term password (Section 12.5). New STUN usages may be defined by other standards-track documents. New STUN usages MUST describe their applicability, client discovery of the STUN server, how the server determines the usage, new message types (requests or indications), new message attributes, new error response codes, and new client and server procedures. 12.1. Defined STUN Usages 12.2. Binding Discovery The previous version of this specification, RFC3489 [13], described only this binding discovery usage. 12.2.1. Applicability Binding discovery is useful to learn reflexive addresses from servers on the network. That is, it is used to determine your dynamically- bound 'public' IP address and UDP port that is assigned by a NAT between a STUN client and a STUN server. This usage is used with ICE [12]. When short-term passwords are used with binding discovery, the username and password are valid for subsequent transactions for nine (9) minutes. 12.2.2. Client Discovery of Server The general client discovery of server behavior is sufficient for this usage. 12.2.3. Server Determination of Usage The general binding server behavior is sufficient for this usage. 12.2.4. New Requests or Indications This usage does not define any new message types. 12.2.5. New Attributes This usage does not define any new message attributes. 12.2.6. New Error Response Codes This usage does not define any new error response codes. 12.2.7. Client Procedures This usage does not define any new client procedures. 12.2.8. Server Procedures In this usage, the short-term password is valid for 30 seconds after its initial assignment. For backwards compatibility with RFC3489-compliant STUN servers, if the STUN server receives a Binding request without the magic cookie, the STUN server MUST include the following attributes in the Binding response; otherwise these attribute MUST NOT be included: MAPPED-ADDRESS SOURCE-ADDRESS Likewise if the STUN server receives a Binding Request containing the CHANGE-REQUEST attribute without the magic cookie, the STUN server MUST include the CHANGED-ADDRESS attribute in its Binding Response. 12.2.9. Security Considerations for Binding Discovery Issue: Currently, the security considerations applies to all the various usages. Split it up to talk about each one? Create subsections talking about each usage? 12.3. Connectivity Check 12.3.1. Applicability This STUN usage primarily provides a connectivity check to a peer discovered through rendezvous protocols and additionally allows learning reflexive address discovery to the peer. The username and password exchanged in the rendezvous protocol is valid for the duration of the connection being checked. 12.3.2. Client Discovery of Server The client does not follow the general procedure in Section 8.1.1. Instead, the client discovers the STUN server's IP address and port through a rendezvous protocol such as Session Description Protocol (SDP [19]). An example of such a discovery technique is ICE [12]. 12.3.3. Server Determination of Usage The server is aware of this usage because it signalsed this port through the rendezvous protocol. When operating in this usage, the STUN server is listening on an ephemeral port rather than the IANA-assigned STUN port. The server is typically multiplexing two protocols on this port, one protocol is STUN and the other protocol is the peer-to-peer protocol using that same port. When used with ICE, the two protocols multiplexed on the same port are STUN and RTP [14]. 12.3.4. New Requests or Indications This usage does not define any new message types. 12.3.5. New Attributes This usage does not define any new message attributes. 12.3.6. New Error Response Codes This usage does not define any new error response codes. 12.3.7. Client Procedures This usage does not define any new client procedures. 12.3.8. Server Procedures In this usage, the short-term password is valid as long as the UDP port is listening for STUN packets. For example when used with ICE, the short-term password would be valid as long as the RTP session (which multiplexes STUN and RTP) is active. 12.3.9. Security Considerations for Connectivity Check The username and password, which are used for STUN's message integrity, are exchanged in the rendezvous protocol. Failure to encrypt and integrity protect the rendezvous protocol is equivalent in risk to using STUN without message integrity. 12.4. NAT Keepalives 12.4.1. Applicability This usage is useful inbytes)two cases: keeping a NAT binding open in a client connection to a server and detecting server failure and NAT reboots. The username and password used for STUN integrity can be used for 24 hours. Issue: do we need message integrity for keepalives when doing STUN and SIP on the same port? Do we need message integrity for keepalives when doing STUN and RTP on the same port (recvonly, inactive) If yes, do we continue using same STUN username/password forever (days?) 12.4.2. Client Discovery of Server In this usage, the STUN server and the application protocol are using the same fixed port. While the multiplexing of two applications on the same port is similar to the connectivity check (Section 12.3) usage, this usage is differs as the server's port is fixed and the server's port isn't communicated using a rendezvous protocol. 12.4.3. Server Determination of Usage The server multiplexes both STUN and its application protocol on the same port. The server knows it is has this usage because the URI that gets resolved to this port indicates the server supports this multiplexing. 12.4.4. New Requests or Indications This usage does not define any new message types. 12.4.5. New Attributes This usage does not define any new message attributes. 12.4.6. New Error Response Codes This usage does not define any new error response codes. 12.4.7. Client Procedures If the STUN Response indicates the client's mapped address has changed from the client's expected mapped address, the client SHOULD inform other applications of its new mapped address. For example, a SIP client should send a new registration message indicating the new mapped address. 12.4.8. Server Procedures In this usage no authentication is used so there is no duration of the short-term password. 12.4.9. Security Considerations for NAT Keepalives Issue: Currently, the security considerations applies to all the various usages. Split it up to talk about each one? Create subsections talking about each usage? 12.5. Short-Term Password In order toguarantee alignmentensure interoperability, this usage describes a TLS-based mechanism to obtain a short-term username and short-term password. 12.5.1. Applicability To thwart some on-path attacks described in Section 13, it is necessary for the STUN client and STUN server to integrity protect the information they exchange over UDP. In the absence of a long- term secret (password) that is shared between them, a short-term password can be obtained using the usage described in this section. The username and password returned in the STUN Shared Secret Response are valid for use in subsequent STUN transactions for nine (9) minutes with any hosts that have the same SRV Priority value as discovered via Section 12.5.2. The username and password obtained with this usage are used as the USERNAME and as the HMAC for the MESSAGE-ID in a subsequent STUN message, respectively. The duration of validity of the username and password obtained via this usage depends on the usage of the subsequent STUN messages that are protected with that username and password. 12.5.2. Client Discovery of Server The client follows the procedures in Section 8.1.1, except the SRV protocol is TCP rather than UDP and the service name "stun-tls". For example a client would look up "_stun-tls._tcp.example.com" in DNS. 12.5.3. Server Determination of Usage The server advertises this port in the DNS as capable of receiving TLS-protected STUN messages for this usage. The server MAY also advertise this same port in DNS for other TCP usages if the server is capable of multiplexing those different usages. For example, the server could advertise 12.5.4. New Requests or Indications The message type Shared Secret Request and its associated Shared Secret Response and Shared Secret Error Response are defined in this section. Their values are enumerated in Section 15. The following figure indicates which attributes are present in the Shared Secret Request, Response, and Error Response. An M indicates that inclusion of the attribute in the message is mandatory, O means its optional, C means it's conditional based onword boundaries. 11.some other aspect of the message, and N/A means that the attribute is not applicable to that message type. Attributes not listed are not applicable to Shared Secret Request, Response, or Error Response. Shared Shared Shared Secret Secret Secret Attribute Request Response Error Response ____________________________________________________________________ USERNAME - M - PASSWORD - M - ERROR-CODE - - M UNKNOWN-ATTRIBUTES - - C SERVER - O O REALM C - C Note: As this usage requires running over TLS, MESSAGE-INTEGRITY isn't necessary. 12.5.5. New Attributes No new attributes are defined by this usage. 12.5.6. New Error Response Codes This usage does not define any new error response codes. 12.5.7. Client Procedures The client opens up the connection to that address and port, and immediately begins TLS negotiation[6]. The client MUST verify the identity of the server. To do that, it follows the identification procedures defined in Section 3.1 of RFC2818 [5]. Those procedures assume the client is dereferencing a URI. For purposes of usage with this specification, the client treats the domain name or IP address used in Section 9.1 as the host portion of the URI that has been dereferenced. Once the connection is opened, the client sends a Shared Secret request. This request has no attributes, just the header. The transaction ID in the header MUST meet the requirements outlined for the transaction ID in a binding request, described in Section 9.3 below. If the response was a Shared Secret Error Response, the client checks the response code in the ERROR-CODE attribute. If the response was a Shared Secret Response, it will contain a short lived username and password, encoded in the USERNAME and PASSWORD attributes, respectively. 12.5.8. Server Procedures After a client has established a TLS session, the server should expect a STUN message containing a Shared Secret Request. The server will generates a response, which can either be a Shared Secret Response or a Shared Secret Error Response. 12.5.9. Security Considerations for Short-Term Password Issue: Currently, the security considerations applies to all the various usages. Split it up to talk about each one? Create subsections talking about each usage? 13. Security Considerations11.1Issue: This section has not been revised to properly consider the attacks on each of STUN's different usages. This needs to be done. 13.1. Attacks on STUN Generally speaking, attacks on STUN can be classified into denial of service attacks and eavesdropping attacks. Denial of service attacks can be launched against a STUN server itself, or against other elements using the STUN protocol. STUN servers create state through the Shared Secret Request mechanism. To prevent being swamped with traffic, a STUN server SHOULD limit the number of simultaneous TLS connections it will hold open by dropping an existing connection when a new connection request arrives (based on an Least Recently Used (LRU) policy, for example). Similarly, if the server is storing short-term passwords it SHOULD limit the number of shared secrets it willstore, in the event that the server is storing the shared secrets.store. The attacks of greater interest are those in which the STUN server and client are used to launchDOSdenial of service (DoS) attacks against other entities, including the client itself. Many of the attacks require the attacker to generate a response to a legitimate STUN request, in order to provide the client with a faked XOR-MAPPED-ADDRESS or MAPPED-ADDRESS. In the sections below, we refer to either the XOR-MAPPED-ADDRESS or MAPPED-ADDRESS as just the mapped address (note the lower case). The attacks that can be launched using such a technique include:11.1.113.1.1. Attack I:DDOSDDoS Against a Target In this case, the attacker provides a large number of clients with the same faked mapped address that points to the intended target. This will trick all the STUN clients into thinking that their addresses are equal to that of the target. The clients then hand out that address in order to receive traffic on it (for example, in SIP or H.323 messages). However, all of that traffic becomes focused at the intended target. The attack can provide substantial amplification, especially when used with clients that are using STUN to enable multimedia applications.11.1.213.1.2. Attack II: Silencing a Client In this attack, the attacker seeks to deny a client access to services enabled by STUN (for example, a client using STUN to enable SIP-based multimedia traffic). To do that, the attacker provides that client with a faked mapped address. The mapped address it provides is an IP address that routes to nowhere. As a result, the client won't receive any of the packets it expects to receive when it hands out the mapped address. This exploitation is not very interesting for the attacker. It impacts a single client, which is frequently not the desired target. Moreover, any attacker that can mount the attack could also deny service to the client by other means, such as preventing the client from receiving any response from the STUN server, or even a DHCP server.11.1.313.1.3. Attack III: Assuming the Identity of a Client This attack is similar to attack II. However, the faked mapped address points to the attacker themself. This allows the attacker to receive traffic which was destined for the client.11.1.413.1.4. Attack IV: Eavesdropping In this attack, the attacker forces the client to use a mapped address that routes to itself. It then forwards any packets it receives to the client. This attack would allow the attacker to observe all packets sent to the client. However, in order to launch the attack, the attacker must have already been able to observe packets from the client to the STUN server. In most cases (such as when the attack is launched from an access network), this means that the attacker could already observe packets sent to the client. This attack is, as a result, only useful for observing traffic by attackers on the path from the client to the STUN server, but not generally on the path of packets being routed towards the client.11.213.2. Launching the Attacks It is important to note that attacks of this nature (injecting responses with fake mapped addresses) require that the attacker be capable of eavesdropping requests sent from the client to the server (or to act as aMITMman in the middle for such attacks). This is because STUN requests contain a transaction identifier, selected by the client, which is random with12896 bits of entropy. The server echoes this value in the response, and the client ignores any responses that don't have a matching transaction ID. Therefore, in order for an attacker to provide a faked response that is accepted by the client, the attacker needs to knowwhatthe transaction IDinof therequest was.request. The large amount of randomness, combined with the need to know when the client sends a request and the IP address and UDP ports used for that request, precludes attacks that involve guessing the transaction ID. Since all of the above attacks rely on this one primitive - injecting a response with a faked mapped address - preventing the attacks is accomplished by preventing this one operation. To prevent it, we need to consider the various ways in which it can be accomplished. There are several:11.2.113.2.1. Approach I: Compromise a Legitimate STUN Server In this attack, the attacker compromises a legitimate STUN server through a virus or Trojan horse. Presumably, this would allow the attacker to take over the STUN server, and control the types of responses it generates. Compromise of a STUN server can also lead to discovery of open ports. Knowledge of an open port creates an opportunity for DoS attacks on those ports (or DDoS attacks if the traversed NAT is a full cone NAT). Discovering open ports is already fairly trivial using port probing, so this does not represent a major threat.11.2.213.2.2. Approach II: DNS Attacks STUN servers are discovered using DNS SRV records. If an attacker can compromise the DNS, it can inject fake records which map a domain name to the IP address of a STUN server run by the attacker. This will allow it to inject fake responses to launch any of the attacks above.11.2.313.2.3. Approach III: Rogue Router or NAT Rather than compromise the STUN server, an attacker can cause a STUN server to generate responses with the wrong mapped address by compromising a router or NAT on the path from the client to the STUN server. When the STUN request passes through the rogue router or NAT, it rewrites the source address of the packet to be that of the desired mapped address. This address cannot be arbitrary. If the attacker is on the public Internet (that is, there are no NATs between it and the STUN server), and the attacker doesn't modify the STUN request, the address has to have the property that packets sent from the STUN server to that address would route through the compromised router. This is because the STUN server will send the responses back to the source address of the request. With a modified source address, the only way they can reach the client is if the compromised router directs them there. If the attacker is on the public Internet, but they can modify the STUN request, they can insert a RESPONSE-ADDRESS attribute into the request, containing the actual source address of the STUN request. This will cause the server to send the response to the client, independent of the source address the STUN server sees. This gives the attacker the ability to forge an arbitrary source address when it forwards the STUN request. Todo: RESPONSE-ADDRESS has been removed from this version of the specification. Reword or remove above paragraph accordingly. If the attacker is on a private network (that is, there are NATs between it and the STUN server), the attacker will not be able to force the server to generate arbitrary mapped addresses in responses. They will only be able force the STUN server to generate mapped addresses which route to the private network. This is because the NAT between the attacker and the STUN server will rewrite the source address of the STUN request, mapping it to a public address that routes to the private network. Because of this, the attacker can only force the server to generate faked mapped addresses that route to the private network. Unfortunately, it is possible that a low quality NAT would be willing to map an allocated public address to another public address (as opposed to an internal private address), in which case the attacker could forge the source address in a STUN request to be an arbitrary public address. This kind of behavior from NATs does appear to be rare.11.2.413.2.4. Approach IV:MITMMan in the Middle As an alternative to approachIII,III (Section 13.2.3), if the attacker can place an element on the path from the client to the server, the element can act as a man-in-the-middle. In that case, it can intercept a STUN request, and generate a STUN response directly with any desired value of the mapped address field. Alternatively, it can forward the STUN request to the server (after potential modification), receive the response, and forward it to the client. When forwarding the request and response, this attack is subject to the same limitations on the mapped address described inSection 11.2.3. 11.2.5Approach III (Section 13.2.3). 13.2.5. Approach V: Response Injection Plus DoS In this approach, the attacker does not need to be aMITMMitM (as in approaches III and IV). Rather, it only needs to be able to eavesdrop onto a network segment that carries STUN requests. This is easily done in multiple access networks such as ethernet or unprotected 802.11. To inject the fake response, the attacker listens on the network for a STUN request. When it sees one, it simultaneously launches a DoS attack on the STUN server, and generates its own STUN response with the desired mapped address value. The STUN response generated by the attacker will reach the client, and the DoS attack against the server is aimed at preventing the legitimate response from the server from reaching the client. Arguably, the attacker can do without the DoS attack on the server, so long as the faked response beats the real response back to the client, and the client uses the first response, and ignores the second (even though it's different).11.2.613.2.6. Approach VI: Duplication This approach is similar to approachV.V (Section 13.2.5). The attacker listens on the network for a STUN request. When it sees it, it generates its own STUN request towards the server. This STUN request is identical to the one it saw, but with a spoofed source IP address. The spoofed address is equal to the one that the attacker desires to have placed in the mapped address of the STUN response. In fact, the attacker generates a flood of such packets. The STUN server will receive the one original request, plus a flood of duplicate fake ones. It generates responses to all of them. If the flood is sufficiently large for the responses to congest routers or some other equipment, there is a reasonable probability that the one real response is lost (along with many of the faked ones), but the net result is that only the faked responses are received by the STUN client. These responses are all identical and all contain the mapped address that the attacker wanted the client to use. The flood of duplicate packets is not needed (that is, only one faked request is sent), so long as the faked response beats the real response back to the client, and the client uses the first response, and ignores the second (even though it's different). Note that, in this approach, launching a DoS attack against the STUN server or the IP network, to prevent the valid response from being sent or received, is problematic. The attacker needs the STUN server to be available to handle its own request. Due to the periodic retransmissions of the request from the client, this leaves a very tiny window of opportunity. The attacker must start the DoS attack immediately after the actual request from the client, causing the correct response to be discarded, and then cease the DoS attack in order to send its own request, all before the next retransmission from the client. Due to the close spacing of the retransmits (100ms to a few seconds), this is very difficult to do. Besides DoS attacks, there may be other ways to prevent the actual request from the client from reaching the server. Layer 2 manipulations, for example, might be able to accomplish it. Fortunately,Approach IVthis approach is subject to the same limitations documented inSection 11.2.3,Approach III (Section 13.2.3), which limit the range of mapped addresses the attacker can cause the STUN server to generate.11.313.3. Countermeasures STUN provides mechanisms to counter the approaches described above, and additional, non-STUN techniques can be used as well. First off, it is RECOMMENDED that networks with STUN clients implement ingress source filtering(RFC 2827 [7]).[7]. This is particularly important for the NATs themselves. As Section11.2.313.2.3 explains, NATs which do not perform this check can be used as "reflectors" in DDoS attacks. Most NATs do perform this check as a default mode of operation. We strongly advise people that purchase NATs to ensure that this capability is present and enabled. Secondly, it is RECOMMENDED that STUN servers be run on hosts dedicated to STUN, with all UDP and TCP ports disabled except for the STUN ports. This is to prevent viruses and Trojan horses from infecting STUN servers, in order to prevent their compromise. This helps mitigate Approach I (Section11.2.1).13.2.1). Thirdly, to prevent the DNS attack of Section11.2.2,13.2.2, Section9.28.1.2 recommends that the client verify the credentials provided by the server with the name used in the DNS lookup. Finally, all of the attacks above rely on the client taking the mapped address it learned from STUN, and using it in application layer protocols. If encryption and message integrity are provided within those protocols, the eavesdropping and identity assumption attacks can be prevented. As such, applications that make use of STUN addresses in application protocols SHOULD use integrity and encryption, even if a SHOULD level strength is not specified for that protocol. For example, multimedia applications using STUN addresses to receive RTP traffic would use secure RTP[16].[20]. The above three techniques are non-STUN mechanisms. STUN itself provides several countermeasures. Approaches IV (Section11.2.4),13.2.4), when generating the response locally, and V (Section11.2.5)13.2.5) require an attacker to generate a faked response.ThisA faked response must match the 96-bit transaction ID of the request. The attackisfurther prevented by using the message integrity mechanism provided in STUN, described in Section8.1.11.8. Approaches III (Section11.2.3)13.2.3), IV (Section11.2.4),13.2.4), when using the relaying technique, and VI (Section11.2.6),13.2.6), however, are not preventable through server signatures.BothAll three approaches are most potent when the attacker can modify the request, inserting a RESPONSE-ADDRESS that routes to the client. Fortunately, such modifications are preventable using the message integrity techniques described in Section9.3.11.8. However, these three approaches are still functional when the attacker modifies nothing but the source address of the STUN request. Sadly, this is the one thing that cannot be protected through cryptographic means, as this is the change that STUN itself is seeking to detect and report. It is therefore an inherent weakness in NAT, and not fixable in STUN.To help mitigate these attacks, Section 9.4 provides several heuristics for the client to follow. The client looks for inconsistent or extra responses, both of which are signs of the attacks described above. However, these heuristics are just that - heuristics, and cannot be guaranteed to prevent attacks. The heuristics appear to prevent the attacks as we know how to launch them today. Implementors should stay posted for information on new heuristics that might be required in the future. Such information will be distributed on the IETF MIDCOM mailing list, midcom@ietf.org. 11.413.4. Residual Threats None of the countermeasures listed above can prevent the attacks described in Section11.2.313.2.3 if the attacker is in the appropriate network paths. Specifically, consider the case in which the attacker wishes to convince client C that it has address V. The attacker needs to have a network element on the path between A and the server (in order to modify the request) and on the path between the server and V so that it can forward the response to C. Furthermore, if there is a NAT between the attacker and the server, V must also be behind the same NAT. In such a situation, the attacker can either gain access to all the application-layer traffic or mount the DDOS attack described in Section11.1.1.13.1.1. Note that any host which exists in the correct topological relationship can be DDOSed. It need not be using STUN.12. IANA14. IAB ConsiderationsSTUN cannot be extended. Changes toTodo: The diagnostic usages have been removed from this document, which reduces theprotocol are made through a standards track revisionbrittleness ofthis specification. As a result, no IANA registries are needed. Any future extensions will establish any needed registries. 13. IAB ConsiderationsSTUN. This section should be updated accordingly. The IAB has studied the problem of "Unilateral Self AddressFixing",Fixing" (UNSAF), which is the general process by which a client attempts to determine its address in another realm on the other side of a NAT through a collaborative protocol reflection mechanism(RFC 3424 [17]).(RFC3424 [21]). STUN is an example of a protocol that performs this type of function. The IAB has mandated that any protocols developed for this purpose document a specific set of considerations. This section meets those requirements.13.114.1. Problem Definition FromRFC 3424 [17],RFC3424 [21], any UNSAF proposal must provide: Precise definition of a specific, limited-scope problem that is to be solved with the UNSAF proposal. A short term fix should not be generalized to solve other problems; this is why "short term fixes usually aren't". The specific problem being solved by STUN is to provide a means for a client to obtain an address on the public Internet from a non- symmetric NAT, for the express purpose of receiving incoming UDP traffic from another host, targeted to that address. STUN does not address traversal of NATs using TCP, either incoming or outgoing, and does not address outgoing UDP communications.13.214.2. Exit Strategy From[17],RFC3424 [21], any UNSAF proposal must provide: Description of an exit strategy/transition plan. The better short term fixes are the ones that will naturally see less and less use as the appropriate technology is deployed. STUN by itself does not provide an exit strategy. This is provided by techniques, such as Interactive Connectivity Establishment(ICE) [21],(ICE [12]), which allow a client to determine whether addresses learned from STUN are needed, or whether other addresses, such as the one on the local interface, will work when communicating with another host. With such a detection technique, as a client finds that the addresses provided by STUN are never used, STUN queries can cease to be made, thus allowing them to phase out. STUN can also help facilitate the introduction ofmidcom.other NAT traversal techniques such as MIDCOM [22]. Asmidcom- capablemidcom-capable NATs are deployed, applications will, instead of using STUN (which also resides at the application layer), first allocate an address binding using midcom. However, it is a well-known limitation ofmidcomMIDCOM that it only works when the agent knows the middleboxes through which its traffic will flow. Once bindings have been allocated from those middleboxes, a STUN detection procedure can validate that there are no additional middleboxes on the path from the public Internet to the client. If this is the case, the application can continue operation using the address bindings allocated frommidcom.MIDCOM. If it is not the case, STUN provides a mechanism for self-address fixing through the remainingmidcom- unawareMIDCOM-unaware middleboxes. Thus, STUN provides a way to help transition to fullmidcom-awareMIDCOM-aware networks.13.314.3. Brittleness Introduced by STUN From[17],RFC3424 [21], any UNSAF proposal must provide: Discussion of specific issues that may render systems more "brittle". For example, approaches that involve using data at multiple network layers create more dependencies, increase debugging challenges, and make it harder to transition. STUN introduces brittleness into the system in several ways: o The binding acquisition usageof STUN does not work for all NAT types. It will work for any application for full cone NATs only. For restricted cone and port restricted cone NAT, it will work for some applications dependingis dependant on NAT's behavior when forwarding UDP packets from arbitrary hosts on theapplication.public side of the NAT. Application specific processing will generally be needed. For symmetric NATs, the binding acquisition will not yield a usable address. The tight dependency on the specific type of NAT makes the protocol brittle. o STUN assumes that the server exists on the public Internet. If the server is located in another private address realm, the user may or may not be able to use its discovered address to communicate with other users. There is no way to detect such a condition. o The bindings allocated from the NAT need to be continuously refreshed. Since the timeouts for these bindings is very implementation specific, the refresh interval cannot easily be determined. When the binding is not being actively used to receive traffic, but to wait for an incoming message, the binding refresh will needlessly consume network bandwidth. o The use of the STUN server as an additional network element introduces another point of potential security attack. These attacks are largely prevented by the security measures provided by STUN, but not entirely. o The use of the STUN server as an additional network element introduces another point of failure. If the client cannot locate a STUN server, or if the server should be unavailable due to failure, the application cannot function. o The use of STUN to discover address bindings will result in an increase in latency for applications. For example, a Voice over IP application will see an increase of call setup delays equal to at least one RTT to the STUN server. o STUN imposes some restrictions on the network topologies for proper operation. If client A obtains an address from STUN server X, and sends it to client B, B may not be able to send to A using that IP address. The address will not work if any of the following is true: * The STUN server is not in an address realm that is a common ancestor (topologically) of both clients A and B. For example, consider client A and B, both of which have residential NAT devices. Both devices connect them to their cable operators, but both clients have different providers. Each provider has a NAT in front of their entire network, connecting it to the public Internet. If the STUN server used by A is in A's cable operator's network, an address obtained by it will not be usable by B. The STUN server must be in the network which is a common ancestor to both - in this case, the public Internet. * The STUN server is in an address realm that is a common ancestor to both clients, but both clients are behind the same NAT connecting to that address realm. For example, if the two clients in the previous example had the same cable operator, that cable operator had a single NAT connecting their network to the public Internet, and the STUN server was on the public Internet, the address obtained by A would not be usable by B. That is because some NATs will not accept an internal packet sent to a public IP address which is mapped back to an internal address. To deal with this, additional protocol mechanisms or configuration parameters need to be introduced which detect this case. o Most significantly, STUN introduces potential security threats which cannot be eliminated. This specification describes heuristics that can be used to mitigate the problem, but it is provably unsolvable given what STUN is trying to accomplish. These security problems are described fully in Section11. 13.413. 14.4. Requirements for a Long Term Solution From[17],RFC3424 [21], any UNSAF proposal must provide: Identify requirements for longer term, sound technical solutions -- contribute to the process of finding the right longer term solution. Our experience with STUN has led to the following requirements for a long term solution to the NAT problem: o Requests for bindings and control of other resources in a NAT need to be explicit. Much of the brittleness in STUN derives from its guessing at the parameters of the NAT, rather than telling the NAT what parameters to use. o Control needs to be in-band. There are far too many scenarios in which the client will not know about the location of middleboxes ahead of time. Instead, control of such boxes needs to occur in- band, traveling along the same path as the data will itself travel. This guarantees that the right set of middleboxes are controlled. This is only true for first-party controls; third- party controls are best handled using themidcomMIDCOM framework. o Control needs to be limited. Users will need to communicate through NATs which are outside of their administrative control. In order for providers to be willing to deploy NATs which can be controlled by users in different domains, the scope of such controls needs to be extremely limited - typically, allocating a binding to reach the address where the control packets are coming from. o Simplicity is Paramount. The control protocol will need to be implement in very simple clients. The servers will need to support extremely high loads. The protocol will need to be extremely robust, being the precursor to a host of application protocols. As such, simplicity is key.13.514.5. Issues with Existing NAPT Boxes From[17],RFC3424 [21], any UNSAF proposal must provide: Discussion of the impact of the noted practical issues with existing, deployed NA[P]Ts and experience reports. Several of the practical issues with STUN involve future proofing - breaking the protocol when new NAT types get deployed. Fortunately, this is not an issue at the current time, since most of the deployed NATs are of the types assumed by STUN. The primary usage STUN has found is in the area of VoIP, to facilitate allocation of addresses for receiving RTP[12][14] traffic. In that application, the periodic keepalives are usually (but not always) provided by the RTP traffic itself. However, several practical problems arise for RTP. First, in the absence of [23], RTP assumes that RTCP traffic is on a port one higher than the RTP traffic. This pairing property cannot be guaranteed through NATs that are not directly controllable. As a result, RTCP traffic may not be properly received.Protocol extensions to SDP have been proposed which mitigate[23] mitigates this by allowing the client to signal a different port for RTCP[18]. However,but there will be interoperability problems for some time. For VoIP, silence suppression can cause a gap in the transmission of RTP packets.ThisIf that silence period exceeds the NAT binding timeout, this could result in the loss of a NAT binding in the middle of acall, if that silence period exceeds the binding timeout.call. This can be mitigated by sending occasionalsilencepackets to keep the binding alive. However, the result is additionalbrittleness; proper operation depends on the silence suppression algorithm in use, the usage of a comfort noise codec, the duration of the silence period, and the binding lifetime in the NAT. 13.6brittleness. 14.6. In Closing The problems with STUN are not design flaws in STUN. The problems in STUN have to do with the lack of standardized behaviors and controls in NATs. The result of this lack of standardization has been a proliferation of devices whose behavior is highly unpredictable, extremely variable, and uncontrollable. STUN does the best it can in such a hostile environment. Ultimately, the solution is to make the environment less hostile, and to introduce controls and standardized behaviors into NAT. However, until such time as that happens, STUN provides a good short term solution given the terrible conditions under which it is forced to operate.14.15. IANA Considerations IANA is hereby requsted to create two new registries STUN Message Types and STUN Attributes. IANA must assign the following values to both registeries before publication of this document as an RFC. New values for both STUN Message Type and STUN Attributes are assigned through the IETF consensus process via RFCs approved by the IESG. 15.1. STUN Message Type Registry For STUN Message Types that are request message types, they MUST be registered including associated Response message types and Error Response message types, and those responses must have values that are 0x100 and 0x110 higher than their respective Request values. For STUN Message Types that are Indication message types, no associated restriction applies. As the message type field is only 14 bits the range of valid values is 0x001 through 0x3FFF. The initial STUN Message Types are: 0x0001 : Binding Request 0x0101 : Binding Response 0x0111 : Binding Error Response 0x0002 : Shared Secret Request 0x0102 : Shared Secret Response 0x0112 : Shared Secret Error Response 0x0002 : Shared Secret Request 0x0102 : Shared Secret Responsed 0x0112 : Shared Secret Error Response 15.2. STUN Attribute Registry STUN attributes values above 0x7FFF are considered optional attributes; attributes equal to 0x7FFF or below are considered mandatory attributes. The STUN client and STUN server process optional and mandatory attributes differently. IANA should assign values based on the RFC consensus process. The initial STUN Attributes are: 0x0001: MAPPED-ADDRESS 0x0002: RESPONSE-ADDRESS 0x0003: CHANGE-REQUEST 0x0004: SOURCE-ADDRESS 0X0005: CHANGED-ADDRESS 0x0006: USERNAME 0x0007: PASSWORD 0x0008: MESSAGE-INTEGRITY 0x0009: ERROR-CODE 0x000A: UNKNOWN-ATTRIBUTES 0x000B: REFLECTED-FROM 0x000E: ALTERNATE-SERVER 0x0014: REALM 0x0015: NONCE 0x0020: XOR-MAPPED-ADDRESS 0x8022: SERVER 0x8023: ALTERNATE-SERVER 0x8024: BINDING-LIFETIME 16. Changes Since RFC 3489 This specification updatesRFC 3489 [19].RFC3489 [13]. This specification differs fromRFC 3489RFC3489 in the following ways: o Removed the usage of STUN for NAT type detection and binding lifetime discovery. These techniques have proven overly brittle due to wider variations in the types of NAT devices than described in this document.The protocol semantics used for NAT type detection remain, however, to provide backwards compatibility, and to allow forRemoved theNAT type detection to occur in purely diagnostic applications.RESPONSE-ADDRESS, CHANGED-ADDRESS, CHANGE-REQUEST, SOURCE-ADDRESS, and REFLECTED-FROM attributes. o Removed the STUN example that centered around the separation of the control and media planes. Instead, provided more information on using STUN with protocols. o Addedthe XOR-MAPPED-ADDRESS attribute, which clients prefer to the MAPPED-ADDRESS when both are present inaBinding Response. XOR-MAPPED-ADDRESS is obfuscated so that NATs which try to "help"fixed 32-bit magic cookie and reduced length of transaction ID byrewriting binary IP addresses they find in protocols will not interfere with32 bits. The magic cookie begins at theoperation of STUN.same offset as the original transaction ID. o Added theXOR-ONLYXOR-MAPPED-ADDRESS attribute, whichclients can use to request that the server send a response with onlyis included in Binding Responses if theXOR-MAPPED-ADDRESS. Thismagic cookie isnecessarypresent incase athe request. Otherwise the RFC3489 behavior is retained (that is, Binding Responsefails integrity checks due to a NAT that rewrites the MAPPED-ADDRESS.includes MAPPED-ADDRESS). See discussion in XOR-MAPPED- ADDRESS regarding this change. o Explicitly point out that the most significant two bits of STUN are 0b00, allowing easy differentiation with RTP packets when used with ICE. o Added support for IPv6. Made it clear that an IPv4 client could get a v6 mapped address, and vice-a-versa. o Added theSERVER attribute. 15. AcknowledgmentsSERVER, REALM, NONCE, and ALTERNATE-SERVER attributes. o Removed recommendation to continue listening for STUN Responses for 10 seconds in an attempt to recognize an attack. 17. Acknowledgements The authors would like to thank Cedric Aoun, Pete Cordell, Cullen Jennings, Bob Penfield and Chris Sullivan for their comments, and Baruch Sterman and Alan Hawrylyshen for initial implementations. Thanks for Leslie Daigle, Allison Mankin, Eric Rescorla, and Henning Schulzrinne for IESG and IAB input on this work.16.18. References16.118.1. Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [2]Dierks, T. and C. Allen, "The TLS Protocol Version 1.0",Postel, J., "Internet Protocol", STD 5, RFC2246, January 1999.791, September 1981. [3] Rosenberg, J., "Traversal Using Relay NAT (TURN)", draft-rosenberg-midcom-turn-08 (work in progress), September 2005. [4] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for specifying the location of services (DNS SRV)", RFC 2782, February 2000.[4] Chown, P., "Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)", RFC 3268, June 2002.[5] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000. [6]Postel, J., "Internet Protocol", STD 5,Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC791, September 1981.2246, January 1999. [7] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, May 2000.16.2 Informative References[8]Senie, D., "Network Address Translator (NAT)-Friendly Application Design Guidelines", RFC 3235, January 2002. [9] Srisuresh, P., Kuthan,Franks, J.,Rosenberg,Hallam-Baker, P., Hostetler, J.,Molitor,Lawrence, S., Leach, P., Luotonen, A., andA. Rayhan, "Middlebox communication architectureL. Stewart, "HTTP Authentication: Basic andframework",Digest Access Authentication", RFC3303, August 2002.2617, June 1999. 18.2. Informational References [9] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997. [10] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. [11]Holdrege, M.Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., andP. Srisuresh, "Protocol Complications with the IPT. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. [12] Rosenberg, J., "Interactive Connectivity Establishment (ICE): A Methodology for Network AddressTranslator",Translator (NAT) Traversal for Offer/Answer Protocols", draft-ietf-mmusic-ice-06 (work in progress), October 2005. [13] Rosenberg, J., Weinberger, J., Huitema, C., and R. Mahy, "STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)", RFC3027, January 2001. [12]3489, March 2003. [14] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", STD 64, RFC 3550, July 2003.[13] Krawczyk, H., Bellare, M.,[15] Jennings, C. and R.Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997. [14]Mahy, "Managing Client Initiated Connections in the Session Initiation Protocol (SIP)", draft-ietf-sip-outbound-01 (work in progress), October 2005. [16] Kohl, J. and B. Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510, September 1993.[15] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P.,[17] Senie, D., "Network Address Translator (NAT)-Friendly Application Design Guidelines", RFC 3235, January 2002. [18] Holdrege, M. andT. Berners-Lee, "Hypertext TransferP. Srisuresh, "Protocol Complications with the IP Network Address Translator", RFC 3027, January 2001. [19] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model with Session Description Protocol-- HTTP/1.1",(SDP)", RFC2616,3264, June1999. [16]2002. [20] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K. Norrman, "The Secure Real-time Transport Protocol (SRTP)", RFC 3711, March 2004.[17][21] Daigle, L. and IAB, "IAB Considerations for UNilateral Self- Address Fixing (UNSAF) Across Network Address Translation", RFC 3424, November 2002.[18][22] Srisuresh, P., Kuthan, J., Rosenberg, J., Molitor, A., and A. Rayhan, "Middlebox communication architecture and framework", RFC 3303, August 2002. [23] Huitema, C., "Real Time Control Protocol (RTCP) attribute in Session Description Protocol (SDP)", RFC 3605, October 2003.[19] Rosenberg, J., Weinberger, J., Huitema, C., and R. Mahy, "STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)", RFC 3489, March 2003. [20] Handley, M. and V. Jacobson, "SDP: Session Description Protocol", RFC 2327, April 1998. [21] Rosenberg, J., "Interactive Connectivity Establishment (ICE): A Methodology for Network Address Translator (NAT) Traversal for Multimedia Session Establishment Protocols", draft-ietf-mmusic-ice-04 (work in progress), February 2005.Authors' Addresses Jonathan Rosenberg Cisco Systems 600 Lanidex Plaza Parsippany, NJ 07054 US Phone: +1 973 952-5000 Email: jdrosen@cisco.com URI: http://www.jdrosen.net Christian Huitema Microsoft One Microsoft Way Redmond, WA 98052 US Email: huitema@microsoft.com Rohan MahyAirspacePlantronics 345 Encinal Street Santa Cruz, CA 95060 US Email: rohan@ekabal.com Dan Wing Cisco Systems 771 Alder Drive San Jose, CA 95035 US Email: dwing@cisco.com Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society(2005).(2006). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society.