<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wish-whep-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="whep">WebRTC-HTTP Egress Protocol (WHEP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wish-whep-02"/>
    <author initials="S." surname="Murillo" fullname="Sergio Garcia Murillo">
      <organization>Millicast</organization>
      <address>
        <email>sergio.garcia.murillo@cosmosoftware.io</email>
      </address>
    </author>
    <author initials="C." surname="Chen" fullname="Cheng Chen">
      <organization>ByteDance</organization>
      <address>
        <email>webrtc@bytedance.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="18"/>
    <area>ART</area>
    <workgroup>wish</workgroup>
    <keyword>WebRTC</keyword>
    <abstract>
      <?line 43?>

<t>This document describes a simple HTTP-based protocol that will allow WebRTC-based viewers to watch content from streaming services and/or Content Delivery Networks (CDNs) or WebRTC Transmission Network (WTNs).</t>
    </abstract>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IETF RTCWEB working group standardized JSEP (<xref target="RFC9429"/>), a mechanism used to control the setup, management, and teardown of a multimedia session. It also describes how to negotiate media flows using the Offer/Answer Model with the Session Description Protocol (SDP) <xref target="RFC3264"/> including the formats for data sent over the wire (e.g., media types, codec parameters, and encryption). WebRTC intentionally does not specify a signaling transport protocol at application level.</t>
      <t>While WebRTC can be integrated with standard signaling protocols like SIP <xref target="RFC3261"/> or XMPP <xref target="RFC6120"/>, they are not designed to be used in broadcasting/streaming services, and there also is no sign of adoption in that industry. RTSP <xref target="RFC7826"/>, which is based on RTP, does not support the SDP offer/answer model <xref target="RFC3264"/> for negotiating the characteristics of the media session.</t>
      <t>There are many situations in which the lack of a standard protocol for consuming media from streaming service using WebRTC has become a problem:</t>
      <ul spacing="normal">
        <li>
          <t>Interoperability between WebRTC services and products.</t>
        </li>
        <li>
          <t>Reusing player software which can be integrated easily.</t>
        </li>
        <li>
          <t>Integration with Dynamic Adaptive Streaming over HTTP (DASH) for offering live streams via WebRTC while offering a time-shifted version via DASH.</t>
        </li>
        <li>
          <t>Playing WebRTC streams on devices that don't support custom javascript to be run (like TVs).</t>
        </li>
      </ul>
      <t>This document mimics what has been done in the WebRTC HTTP Ingest Protocol (WHIP) <xref target="I-D.draft-ietf-wish-whip"/> for ingestion and specifies a simple HTTP-based protocol that can be used for consuming media from a streaming service using WebRTC.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The WebRTC-HTTP Ingest Protocol (WHIP) is designed to facilitate a one-time exchange of Session Description Protocol (SDP) offers and answers using HTTP POST requests. This exchange is a fundamental step in establishing an Interactive Connectivity Establishment (ICE) and Datagram Transport Layer Security (DTLS) session between WHEP player and the streaming service endpoint (Media Server).</t>
      <t>Upon successful establishment of the ICE/DTLS session, unidirectional media data transmission commences from the media server to the WHEP player. It is important to note that SDP renegotiations are not supported in WHEP, meaning that no modifications to the "m=" sections can be made after the initial SDP offer/answer exchange via HTTP POST is completed and only ICE related information can be updated via HTTP PATCH requests as defined in <xref target="ice-support"/>.</t>
      <t>The following diagram illustrates the core operation of the WHEP protocol for initiating and terminating a viewing session:</t>
      <figure anchor="whep-protocol-operation">
        <name>WHEP session setup and teardown</name>
        <artwork><![CDATA[
                                                                               
 +-------------+    +---------------+ +--------------+ +---------------+
 | WHEP player |    | WHEP endpoint | | Media Server | | WHEP session |
 +--+----------+    +---------+-----+ +------+-------+ +--------|------+
    |                         |              |                  |       
    |                         |              |                  |       
    |HTTP POST (SDP Offer)    |              |                  |       
    +------------------------>+              |                  |       
    |201 Created (SDP answer) |              |                  |       
    +<------------------------+              |                  |       
    |          ICE REQUEST                   |                  |       
    +--------------------------------------->+                  |       
    |          ICE RESPONSE                  |                  |       
    |<---------------------------------------+                  |       
    |          DTLS SETUP                    |                  |       
    |<======================================>|                  |       
    |          RTP/RTCP FLOW                 |                  |       
    +<-------------------------------------->+                  |       
    | HTTP DELETE                                               |       
    +---------------------------------------------------------->+       
    | 200 OK                                                    |       
    <-----------------------------------------------------------x       
                                                                               
]]></artwork>
      </figure>
      <t>The elements in <xref target="whep-protocol-operation"/> are described as follows:</t>
      <ul spacing="normal">
        <li>
          <t>WHEP player: This represents the WebRTC media player, which functions as a client of the WHEP protocol by receiving and decoding the media from a remote media server.</t>
        </li>
        <li>
          <t>WHEP endpoint: This denotes the egress server that receives the initial WHEP request.</t>
        </li>
        <li>
          <t>WHEP endpoint URL: Refers to the URL of the WHEP endpoint responsible for creating the WHEP session.</t>
        </li>
        <li>
          <t>Media server: This is the WebRTC Media Server that establishes the media session with the WHEP player and delivers the media to it.</t>
        </li>
        <li>
          <t>WHEP sesion: Indicates the allocated HTTP resource by the WHEP endpoint for an ongoing egress session.</t>
        </li>
        <li>
          <t>WHEP session URL: Refers to the URL of the WHEP resource allocated by the WHEP endpoint for a specific media session. The WHEP player can send requests to the WHEP session using this URL to modify the session, such as ICE operations or termination.</t>
        </li>
      </ul>
      <t>The <xref target="whep-protocol-operation"/> illustrates the communication flow between a WHEP player, WHEP endpoint, media server, and WHEP session. This flow outlines the process of setting up and tearing down an playback session using the WHEP protocol, involving negotiation, ICE for Network Address Translation (NAT) traversal, DTLS and Secure Real-time Transport Protocol (SRTP) for security, and RTP/RTCP for media transport:</t>
      <ul spacing="normal">
        <li>
          <t>WHEP player: Initiates the communication by sending an HTTP POST with an SDP Offer to the WHEP endpoint.</t>
        </li>
        <li>
          <t>WHEP endpoint: Responds with a "201 Created" message containing an SDP answer.</t>
        </li>
        <li>
          <t>WHEP player and media server: Establish an ICE and DTLS sessions for NAT traversal and secure communication.</t>
        </li>
        <li>
          <t>RTP/RTCP Flow: Real-time Transport Protocol and Real-time Transport Control Protocol flows are established for media transmission from the media server to the WHEP player, secured by the SRTP profile.</t>
        </li>
        <li>
          <t>WHEP player: Sends an HTTP DELETE to terminate the WHIP session.</t>
        </li>
        <li>
          <t>WHEP session: Responds with a "200 OK" to confirm the session termination.</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="http-usage">
        <name>HTTP usage</name>
        <t>Following <xref target="BCP56"/> guidelines, WHEP palyers <bcp14>MUST NOT</bcp14> match error codes returned by the WHRP endpoints and resources to a specific error cause indicated in this specification. WHEP players <bcp14>MUST</bcp14> be able to handle all applicable status codes gracefully falling back to the generic n00 semantics of a given status code on unknown error codes. WHEP endpoints and resources could convey finer-grained error information by a problem statement json object in the response message body of the failed request as per <xref target="RFC9457"/>.</t>
        <t>The WHIP endpoints and sessions are origin servers as defined in <xref section="3.6." sectionFormat="of" target="RFC9110"/> handling the requests and providing responses for the underlying HTTP resources. Those HTTP resources do not have any representation defined in this specification, so the WHIP endpoints and sessions <bcp14>MUST</bcp14> return a 2XX sucessfull response with no content when a GET request is received.</t>
      </section>
      <section anchor="playback-session-setup">
        <name>Playback session set up</name>
        <t>In order to set up a streaming session, the WHEP player <bcp14>MUST</bcp14> generate an SDP offer according to the JSEP rules for an initial offer as in <xref section="5.2.1" sectionFormat="of" target="RFC9429"/> and perform an HTTP POST request as per <xref section="9.3.3" sectionFormat="of" target="RFC9110"/> to the configured WHEP endpoint URL.</t>
        <t>The HTTP POST request <bcp14>MUST</bcp14> have a content type of "application/sdp" and contain the SDP offer as the body. The WHEP endpoint <bcp14>MUST</bcp14> generate an SDP answer according to the JSEP rules for an initial answer as in <xref section="5.3.1" sectionFormat="of" target="RFC9429"/> and return a "201 Created" response with a content type of "application/sdp", the SDP answer as the body, and a Location header field pointing to the newly created WHEP session. If the HTTP POST to the WHEP endpoint has a content type different than "application/sdp" or the SDP is malformed, the WHEP endpoint <bcp14>MUST</bcp14> reject the HTTP POST request with an appropiate 4XX error response.</t>
        <t>As the WHEP protocol only supports the playback use case with unidirectional media, the WHEP player <bcp14>SHOULD</bcp14> use "recvonly" attribute in the SDP offer but <bcp14>MAY</bcp14> use the "sendrecv" attribute instead, "inactive" and "sendonly" attributes <bcp14>MUST NOT</bcp14> be used. The WHEP endpoint <bcp14>MUST</bcp14> use "sendonly" attribute in the SDP answer.</t>
        <t>Following <xref target="sdp-exchange-example"/> is an example of an HTTP POST sent from a WHEP player to a WHEP endpoint and the "201 Created" response from the WHIP endpoint containing the Location header pointing to the newly created WHEP session:</t>
        <figure anchor="sdp-exchange-example">
          <name>Example of SDP offer/answer exchange done via an HTTP POST</name>
          <artwork><![CDATA[
POST /whep/endpoint HTTP/1.1
Host: whep.example.com
Content-Type: application/sdp
Content-Length: 1326

v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-options:trickle ice2
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:0
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=recvonly
a=rtcp-mux
a=rtcp-mux-only
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 0 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=recvonly
a=rtcp-mux
a=rtcp-mux-only
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

HTTP/1.1 201 Created
ETag: "xyzzy"
Content-Type: application/sdp
Content-Length: 1400
Location: https://whep.example.org/sessions/id

v=0
o=- 1657793490019 1 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-lite
a=ice-options:trickle ice2
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=sendonly
a=rtcp-mux
a=rtcp-mux-only
a=rtcp-rsize
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
m=video 0 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=sendonly
a=rtcp-mux
a=rtcp-mux-only
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
]]></artwork>
        </figure>
        <t>The WHEP endpoint COULD require a live publishing to be happening in order to allow a WHEP players to start viewing a stream.
In that case, the WHEP endpoint <bcp14>SHALL</bcp14> return a "409 Conflict" response to the POST request issued by the WHEP player with a "Retry-After" header indicating the number of seconds before sending a new request.
WHEP players <bcp14>MAY</bcp14> periodically try to connect to the WHEP session with exponential backoff period with an initial value of the "Retry-After" header value in the "409 Conflict" response.</t>
        <t>Once a session is setup, consent freshness as per <xref target="RFC7675"/> <bcp14>SHALL</bcp14> be used to detect non-graceful disconnection by full ICE implementations and DTLS teardown for session termination by either side.</t>
      </section>
      <section anchor="playback-session-termination">
        <name>Playback session termination</name>
        <t>To explicitly terminate a WHIP session, the WHEP player <bcp14>MUST</bcp14> perform an HTTP DELETE request to the WHEP session URL returned in the Location header field of the initial HTTP POST. Upon receiving the HTTP DELETE request, the WHIP session will be removed and the resources freed on the media server, terminating the ICE and DTLS sessions.</t>
        <t>A media server terminating a session <bcp14>MUST</bcp14> follow the procedures in <xref section="5.2" sectionFormat="of" target="RFC7675"/>  for immediate revocation of consent.</t>
        <t>The WHEP endpoints <bcp14>MUST</bcp14> support OPTIONS requests for Cross-Origin Resource Sharing (CORS) as defined in <xref target="FETCH"/>. The "200 OK" response to any OPTIONS request <bcp14>SHOULD</bcp14> include an "Accept-Post" header with a media type value of "application/sdp" as per <xref target="W3C.REC-ldp-20150226"/>.</t>
      </section>
      <section anchor="ice-support">
        <name>ICE support</name>
        <t>ICE <xref target="RFC8845"/> is a protocol addressing the complexities of NAT traversal, commonly encountered in Internet communication. NATs hinder direct communication between devices on different local networks, posing challenges for real-time applications. ICE facilitates seamless connectivity by employing techniques to discover and negotiate efficient communication paths.</t>
        <t>Trickle ICE <xref target="RFC8838"/> optimizes the connectivity process by incrementally sharing potential communication paths, reducing latency, and facilitating quicker establishment.</t>
        <t>ICE Restarts are crucial for maintaining connectivity in dynamic network conditions or disruptions, allowing devices to re-establish communication paths without complete renegotiation. This ensures minimal latency and reliable real-time communication.</t>
        <t>Trickle ICE and ICE restart support are <bcp14>RECOMMENDED</bcp14> for both WHEP sessions and clients.</t>
        <section anchor="http-patch-usage">
          <name>HTTP PATCH request usage</name>
          <t>The WHEP player <bcp14>MAY</bcp14> perform trickle ICE or ICE restarts by sending an HTTP PATCH request as per <xref target="RFC5789"/> to the WHEP session URL, with a body containing a SDP fragment with media type "application/trickle-ice-sdpfrag" as specified in <xref target="RFC8840"/> carrying the relevant ICE information. If the HTTP PATCH to the WHIP session has a content type different than "application/trickle-ice-sdpfrag" or the SDP fragment is malformed, the WHIP session <bcp14>MUST</bcp14> reject the HTTP PATCH with an appropiate 4XX error response.</t>
          <t>If the WHEP session supports either Trickle ICE or ICE restarts, but not both, it <bcp14>MUST</bcp14> return a "422 Unprocessable Content" error response for the HTTP PATCH requests that are not supported as per <xref section="15.5.21" sectionFormat="of" target="RFC9110"/>.</t>
          <t>The WHEP player <bcp14>MAY</bcp14> send overlapping HTTP PATCH requests to one WHEP session. Consequently, as those HTTP PATCH requests may be received out-of-order by the WHEP session, if WHEP session supports ICE restarts, it <bcp14>MUST</bcp14> generate a unique strong entity-tag identifying the ICE session as per <xref section="8.8.3" sectionFormat="of" target="RFC9110"/>, being <bcp14>OPTIONAL</bcp14> otherwise. The initial value of the entity-tag identifying the initial ICE session <bcp14>MUST</bcp14> be returned in an ETag header field in the "201 Created" response to the initial POST request to the WHEP endpoint.</t>
          <t>WHEP players <bcp14>SHOULD NOT</bcp14> use entity-tag validation when matching a specific ICE session is not required, such as for example when initiating a DELETE request to terminate a session. WHEP sessions <bcp14>MUST</bcp14> ignore any entity-tag value sent by the WHEP player when ICE session matching is not required, as in the HTTP DELETE request.</t>
          <t>Missing or outdated ETags in the PATCH requests from WHEP players  will be answered by WHEP sessions as per <xref section="13.1.1" sectionFormat="of" target="RFC9110"/> and <xref section="3" sectionFormat="of" target="RFC6585"/>, with a "428 Precondition Required" response for a missing entity tag, and a "412 Precondition Failed" response for a non-matching entity tag.</t>
        </section>
        <section anchor="trickle-ice">
          <name>Trickle ICE</name>
          <t>Depending on the Trickle ICE support on the WHEP player, the initial offer by the WHEP player <bcp14>MAY</bcp14> be sent after the full ICE gathering is complete with the full list of ICE candidates, or it <bcp14>MAY</bcp14> only contain local candidates (or even an empty list of candidates) as per <xref target="RFC8845"/>. For the purpose of reducing setup times, when using Trickle ICE the WHEP player <bcp14>SHOULD</bcp14> send the SDP offer as soon as possible, containing either locally gathered ICE candidates or an empty list of candidates.</t>
          <t>In order to simplify the protocol, the WHEP session cannot signal additional ICE candidates to the WHEP player after the SDP answer has been sent. The WHEP endpoint <bcp14>SHALL</bcp14> gather all the ICE candidates for the media server before responding to the client request and the SDP answer <bcp14>SHALL</bcp14> contain the full list of ICE candidates of the media server.</t>
          <t>As the WHEP player needs to know the WHEP session URL associated with the ICE session in order to send a PATCH request containing new ICE candidates, it <bcp14>MUST</bcp14> wait and buffer any gathered candidates until the "201 Created" HTTP response to the initial POST request is received.
In order to lower the HTTP traffic and processing time required the WHEP player <bcp14>SHOULD</bcp14> send a single aggregated HTTP PATCH request with all the buffered ICE candidates once the response is received.
Additionally, if ICE restarts are supported by the WHEP session, the WHEP player needs to know the entity-tag associated with the ICE session in order to send a PATCH request containing new ICE candidates, so it <bcp14>MUST</bcp14> also wait and buffer any gathered candidates until it receives the HTTP response with the new entity-tag value to the last PATCH request performing an ICE restart.</t>
          <t>WHEP players generating the HTTP PATCH body with the SDP fragment and its subsequent processing by WHEP sessions <bcp14>MUST</bcp14> follow to the guidelines defined in <xref section="4.4" sectionFormat="of" target="RFC8840"/> with the following considerations:</t>
          <ul spacing="normal">
            <li>
              <t>As per <xref target="RFC9429"/>, only m-sections not marked as bundle-only can gather ICE candidates, so given that the "max-bundle" policy is being used, the SDP fragment will contain only the offerer-tagged m-line of the bundle group.</t>
            </li>
            <li>
              <t>The WHEP player <bcp14>MAY</bcp14> exclude ICE candidates from the HTTP PATCH body if they have already been confirmed by the WHEP session with a successful HTTP response to a previous HTTP PATCH request.</t>
            </li>
          </ul>
          <t>WHIP sessions and players that support Trickle ICE <bcp14>MUST</bcp14> make use of entity-tags and conditional requests as explained in <xref target="http-patch-usage"/>.</t>
          <t>When a WHEP session receives a PATCH request that adds new ICE candidates without performing an ICE restart, it <bcp14>MUST</bcp14> return a "204 No Content" response without a body and <bcp14>MUST NOT</bcp14> include an ETag header in the response. If the WHEP session does not support a candidate transport or is not able to resolve the connection address, it <bcp14>MUST</bcp14> silently discard the candidate and continue processing the rest of the request normally.</t>
          <figure anchor="trickle-ice-example">
            <name>Example of a Trickle ICE request and response</name>
            <artwork><![CDATA[
PATCH /session/id HTTP/1.1
Host: whep.example.com
If-Match: "xyzzy"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 576

a=group:BUNDLE 0 1
m=audio 9 UDP/TLS/RTP/SAVPF 111
a=mid:0
a=ice-ufrag:EsAw
a=ice-pwd:P2uYro0UCOQ4zxjKXaWCBui1
a=candidate:1387637174 1 udp 2122260223 192.0.2.1 61764 typ host generation 0 ufrag EsAw network-id 1
a=candidate:3471623853 1 udp 2122194687 198.51.100.2 61765 typ host generation 0 ufrag EsAw network-id 2
a=candidate:473322822 1 tcp 1518280447 192.0.2.1 9 typ host tcptype active generation 0 ufrag EsAw network-id 1
a=candidate:2154773085 1 tcp 1518214911 198.51.100.2 9 typ host tcptype active generation 0 ufrag EsAw network-id 2
a=end-of-candidates

HTTP/1.1 204 No Content
]]></artwork>
          </figure>
          <t><xref target="trickle-ice-example"/> shows an example of the Trickle ICE procedure where the WHEP player sends a PATCH request with updated ICE candidate information and receives a successful response from the WHEP session.</t>
        </section>
        <section anchor="ice-restarts">
          <name>ICE Restarts</name>
          <t>As defined in <xref target="RFC8839"/>, when an ICE restart occurs, a new SDP offer/answer exchange is triggered. However, as WHEP does not support renegotiation of non-ICE related SDP information, a WHEP player will not send a new offer when an ICE restart occurs. Instead, the WHEP player and WHEP session will only exchange the relevant ICE information via an HTTP PATCH request as defined in <xref target="http-patch-usage"/> and <bcp14>MUST</bcp14> assume that the previously negotiated non-ICE related SDP information still apply after the ICE restart.</t>
          <t>When performing an ICE restart, the WHEP player <bcp14>MUST</bcp14> include the updated "ice-pwd" and "ice-ufrag" in the SDP fragment of the HTTP PATCH request body as well as the new set of gathered ICE candidates as defined in <xref target="RFC8840"/>.
Similar what is defined in <xref target="trickle-ice"/>, as per <xref target="RFC9429"/> only m-sections not marked as bundle-only can gather ICE candidates, so given that the "max-bundle" policy is being used, the SDP fragment will contain only the offerer-tagged m-line of the bundle group.
A WHEP player sending a PATCH request for performing ICE restart <bcp14>MUST</bcp14> contain an "If-Match" header field with a field-value "*" as per <xref section="13.1.1" sectionFormat="of" target="RFC9110"/>.</t>
          <t><xref target="RFC8840"/> states that an agent <bcp14>MUST</bcp14> discard any received requests containing "ice-pwd" and "ice-ufrag" attributes that do not match those of the current ICE Negotiation Session, however, any WHEP session receiving an updated "ice-pwd" and "ice-ufrag" attributes <bcp14>MUST</bcp14> consider the request as performing an ICE restart instead and, if supported, <bcp14>SHALL</bcp14> return a "200 OK" with an "application/trickle-ice-sdpfrag" body containing the new ICE username fragment and password and a new set of ICE candidates for the WHEP session. Also, the "200 OK" response for a successful ICE restart <bcp14>MUST</bcp14> contain the new entity-tag corresponding to the new ICE session in an ETag response header field and <bcp14>MAY</bcp14> contain a new set of ICE candidates for the media server.</t>
          <t>As defined in <xref section="4.4.1.1.1" sectionFormat="of" target="RFC8839"/> the set of candidates after an ICE restart may include some, none, or all of the previous candidates for that data stream and may include a totally new set of candidates. So after performing a successful ICE restart, both the WHEP player and the WHEP session <bcp14>MUST</bcp14> replace the previous set of remote candidates with the new set exchanged in the HTTP PATCH request and response, discarding any remote ICE candidate not present on the new set. Both the WHEP player and the WHEP session <bcp14>MUST</bcp14> ensure that the HTTP PATCH requests and response bodies include the same 'ice-options,' 'ice-pacing,' and 'ice-lite' attributes as those used in the SDP offer or answer.</t>
          <t>If the ICE restart request cannot be satisfied by the WHEP session, the resource <bcp14>MUST</bcp14> return an appropriate HTTP error code and <bcp14>MUST NOT</bcp14> terminate the session immediately and keep the existing ICE session. The WHEP player <bcp14>MAY</bcp14> retry performing a new ICE restart or terminate the session by issuing an HTTP DELETE request instead. In any case, the session <bcp14>MUST</bcp14> be terminated if the ICE consent expires as a consequence of the failed ICE restart as per <xref section="5.1" sectionFormat="of" target="RFC7675"/>.</t>
          <t>In case of unstable network conditions, the ICE restart HTTP PATCH requests and responses might be received out of order. In order to mitigate this scenario, when the client performs an ICE restart, it <bcp14>MUST</bcp14> discard any previous ICE username and passwords fragments and ignore any further HTTP PATCH response received from a pending HTTP PATCH request. WHEP players <bcp14>MUST</bcp14> apply only the ICE information received in the response to the last sent request. If there is a mismatch between the ICE information at the WHEP player and at the WHEP session (because of an out-of-order request), the STUN requests will contain invalid ICE information and will be dropped by the receiving side. If this situation is detected by the WHEP player, it <bcp14>MUST</bcp14> send a new ICE restart request to the server.</t>
          <figure anchor="trickle-restart-example">
            <name>Example of an ICE restart request and response</name>
            <artwork><![CDATA[
PATCH /session/id HTTP/1.1
Host: whep.example.com
If-Match: "*"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 82

a=ice-options:trickle ice2
a=group:BUNDLE 0 1
m=audio 9 UDP/TLS/RTP/SAVPF 111
a=mid:0
a=ice-ufrag:ysXw
a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k
a=candidate:1387637174 1 udp 2122260223 192.0.2.1 61764 typ host generation 0 ufrag EsAw network-id 1
a=candidate:3471623853 1 udp 2122194687 198.51.100.2 61765 typ host generation 0 ufrag EsAw network-id 2
a=candidate:473322822 1 tcp 1518280447 192.0.2.1 9 typ host tcptype active generation 0 ufrag EsAw network-id 1
a=candidate:2154773085 1 tcp 1518214911 198.51.100.2 9 typ host tcptype active generation 0 ufrag EsAw network-id 2

HTTP/1.1 200 OK
ETag: "abccd"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 252

a=ice-lite
a=ice-options:trickle ice2
a=group:BUNDLE 0 1
m=audio 9 UDP/TLS/RTP/SAVPF 111
a=mid:0
a=ice-ufrag:289b31b754eaa438
a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
a=candidate:1 1 udp 2130706431 198.51.100.1 39132 typ host
a=end-of-candidates
]]></artwork>
          </figure>
          <t><xref target="trickle-ice-example"/> demonstrates a Trickle ICE restart procedure example. The WHEP player sends a PATCH request containing updated ICE information, including a new ufrag and password, along with newly gathered ICE candidates. In response, the WHEP session provides ICE information for the session after the ICE restart, including the updated ufrag and password, as well as the previous ICE candidate.</t>
        </section>
      </section>
      <section anchor="webrtc-constraints">
        <name>WebRTC constraints</name>
        <t>To simplify the implementation of WHEP in both players and media servers, WHEP introduces specific restrictions on WebRTC usage. The following subsections will explain these restrictions in detail:</t>
        <section anchor="sdp-bundle">
          <name>SDP Bundle</name>
          <t>Both the WHEP player and the WHEP endpoint <bcp14>SHALL</bcp14> support <xref target="RFC9143"/> and use "max-bundle" policy as defined in <xref target="RFC9429"/>. The WHEP player and the media server <bcp14>MUST</bcp14> support multiplexed media associated with the BUNDLE group as per <xref section="9" sectionFormat="of" target="RFC9143"/>. In addition, per <xref target="RFC9143"/> the WHEP player and media server <bcp14>SHALL</bcp14> use RTP/RTCP multiplexing for all bundled media. In order to reduce the network resources required at the media server, both The WHEP player and WHEP endpoints <bcp14>MUST</bcp14> include the "rtcp-mux-only" attribute in each bundled "m=" sections as per <xref section="3" sectionFormat="of" target="RFC8858"/>.</t>
        </section>
        <section anchor="single-mediastream">
          <name>Single MediaStream</name>
          <t>WHEP only supports a single MediaStream as defined in <xref target="RFC8830"/> and therefore all "m=" sections <bcp14>MUST</bcp14> contain an "msid" attribute with the same value. The MediaStream <bcp14>MUST</bcp14> contain at least one MediaStreamTrack of any media kind and it <bcp14>MUST NOT</bcp14> have two or more than MediaStreamTracks for the same media (audio or video).</t>
        </section>
        <section anchor="trickle-ice-and-ice-restarts">
          <name>Trickle ICE and ICE restarts</name>
          <t>The media server <bcp14>SHOULD</bcp14> support full ICE, unless it is connected to the Internet with an IP address that is accessible by each WHEP player that is authorized to use it, in which case it <bcp14>MAY</bcp14> support only ICE lite. The WHEP player <bcp14>MUST</bcp14> implement and use full ICE.</t>
          <t>Trickle ICE and ICE restarts support is <bcp14>OPTIONAL</bcp14> for both the WHEP players and media servers as explained in <xref target="ice-support"/>.</t>
        </section>
      </section>
      <section anchor="load-balancing-and-redirections">
        <name>Load balancing and redirections</name>
        <t>WHEP endpoints and media servers might not be colocated on the same server, so it is possible to load balance incoming requests to different media servers.</t>
        <t>WHEP players <bcp14>SHALL</bcp14> support HTTP redirections as per <xref section="15.4" sectionFormat="of" target="RFC9110"/>. In order to avoid POST requests to be redirected as GET requests, status codes 301 and 302 <bcp14>MUST NOT</bcp14> be used and the preferred method for performing load balancing is via the "307 Temporary Redirect" response status code as described in <xref section="15.4.8" sectionFormat="of" target="RFC9110"/>. Redirections are not required to be supported for the PATCH and DELETE requests.</t>
        <t>In case of high load, the WHEP endpoints <bcp14>MAY</bcp14> return a "503 Service Unavailable" response indicating that the server is currently unable to handle the request due to a temporary overload or scheduled maintenance as described in <xref section="15.6.4" sectionFormat="of" target="RFC9110"/>, which will likely be alleviated after some delay. The WHEP endpoint might send a Retry-After header field indicating the minimum time that the user agent ought to wait before making a follow-up request as described in <xref section="10.2.3" sectionFormat="of" target="RFC9110"/>.</t>
      </section>
      <section anchor="stunturn-server-configuration">
        <name>STUN/TURN server configuration</name>
        <t>The WHEP Endpoint <bcp14>MAY</bcp14> return STUN/TURN server configuration URLs and credentials usable by the client in the "201 Created" response to the HTTP POST request to the WHEP Endpoint URL.</t>
        <t>Each STUN/TURN server will be returned using the "Link" header field <xref target="RFC8288"/> with a "rel" attribute value of "ice-server" as specified in <xref target="I-D.draft-ietf-wish-whip"/></t>
        <t>It might be also possible to configure the STUN/TURN server URLs with long-term credentials provided by either the broadcasting service or an external TURN provider on the WHEP player, overriding the values provided by the WHEP Endpoint.</t>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and authorization</name>
        <t>All WHEP endpoints, sessions and clients <bcp14>MUST</bcp14> support HTTP Authentication as per <xref section="11" sectionFormat="of" target="RFC9110"/> and in order to ensure interoperability, bearer token authentication as defined in the next section <bcp14>MUST</bcp14> be supported by all WHEP entities. However this does not preclude the support of additional HTTP authentication schemes as defined in <xref section="11.6" sectionFormat="of" target="RFC9110"/>.</t>
        <section anchor="bearer-token-authentication">
          <name>Bearer token authentication</name>
          <t>WHEP endpoints and sessions <bcp14>MAY</bcp14> require the HTTP request to be authenticated using an HTTP Authorization header field with a Bearer token as specified in <xref section="2.1" sectionFormat="of" target="RFC6750"/>. WHEP players <bcp14>MUST</bcp14> implement this authentication and authorization mechanism and send the HTTP Authorization header field in all HTTP requests sent to either the WHEP endpoint or session except the preflight OPTIONS requests for CORS.</t>
          <t>The nature, syntax, and semantics of the bearer token, as well as how to distribute it to the client, is outside the scope of this document. Some examples of the kind of tokens that could be used are, but are not limited to, JWT tokens as per <xref target="RFC6750"/> and <xref target="RFC8725"/> or a shared secret stored on a database. The tokens are typically made available to the end user alongside the WHEP endpoint URL and configured on the WHEP players.</t>
          <t>WHEP endpoints and sessions could perform the authentication and authorization by encoding an authentication token within the URLs for the WHEP endpoints or sessions instead. In case the WHEP player is not configured to use a bearer token, the HTTP Authorization header field <bcp14>MUST NOT</bcp14> be sent in any request.</t>
        </section>
      </section>
      <section anchor="protocol-extensions">
        <name>Protocol extensions</name>
        <t>In order to support future extensions to be defined for the WHEP protocol, a common procedure for registering and announcing the new extensions is defined.</t>
        <t>Protocol extensions supported by the WHEP server <bcp14>MUST</bcp14> be advertised to the WHEP player in the "201 Created" response to the initial HTTP POST request sent to the WHEP Endpoint.
The WHEP Endpoint <bcp14>MUST</bcp14> return one "Link" header field for each extension that it supports, with the extension "rel" attribute value containing the extension URN and the URL for the HTTP resource that will be available for receiving requests related to that extension.</t>
        <t>Protocol extensions are optional for both WHEP players and WHEP Endpoints and sessions. WHEP players <bcp14>MUST</bcp14> ignore any Link attribute with an unknown "rel" attribute value and WHEP Endpoints and sessions <bcp14>MUST NOT</bcp14> require the usage of any of the extensions.</t>
        <t>Each protocol extension <bcp14>MUST</bcp14> register a unique "rel" attribute value at IANA starting with the prefix: "urn:ietf:params:whep:ext" as specified in <xref target="urn-whep-subspace"/>.</t>
        <t>In the first version of the WHEP specification, two optional extensions are defined: the Server Sent Events and the Video Layer Selection.</t>
        <section anchor="server-sent-events-extension">
          <name>Server Sent Events extension</name>
          <t>This optional extension provides support for server-to-client communication using WHATWG server sent events protocol as specified in https://html.spec.whatwg.org/multipage/server-sent-events.html#server-sent-events. When supported by the WHEP resource, a "Link" header field with a "rel" attribute of "urn:ietf:params:whep:ext:core:server-sent-events" <bcp14>MUST</bcp14> be returned in the initial HTTP "201 Created" response, with the Url of the Server Sent Events REST API entrypoint. The "Link" header field <bcp14>MAY</bcp14> also contain an "events" attribute with a coma separated list of supported event types.</t>
          <figure>
            <name>HTTP 201 response example containing the Server Sent Events extension</name>
            <artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/sdp
Location: https://whep.example.org/resource/213786HF
Link: <https://whep.ietf.org/resource/213786HF/sse>;
      rel="urn:ietf:params:whep:ext:core:server-sent-events"
      events="active,inactive,layers,reconnect,viewercount,scte35"
]]></artwork>
          </figure>
          <t>If the extension is also supported by the WHEP player, it <bcp14>MAY</bcp14> send a POST request to the Server Sent Events REST API entrypoint to create a server-to-client event stream using WHATWG server sent events protocol. The POST request <bcp14>MAY</bcp14> contain an "application/json" body with an JSON array indicating the subset of the event list announced by the WHEP Resource on the "events" atribute which COULD be sent by the server using the server-to-client communication channel. The WHEP Endpoint will return a "201 Created" response with a Location header field pointing to the newly created server-to-client event stream.</t>
          <figure>
            <name>HTTP POST request to create a server-to-client event stream</name>
            <artwork><![CDATA[
POST /resource/213786HF/sse HTTP/1.1
Host: whep.example.com
Content-Type: application/json

["active","inactive","layers","reconnect","viewercount"]

HTTP/1.1 201 Created
Location: https://whep.example.org/resource/213786HF/sse/event-stream
]]></artwork>
          </figure>
          <t>Once the server-to-client communication channel has been created the WHEP player can perform a long pull using the Url returned on the location header as expecified in the WHATWG server sent events protocol.</t>
          <t>When an event is generated, the WHEP Resource <bcp14>MUST</bcp14> check for each event stream if the type is on the list provided by the WHEP player when the event stream was created, and if so enque it for delivering when an active long pull request is available.</t>
          <t>The events types supported by this specification are the following:</t>
          <ul spacing="normal">
            <li>
              <t>active: indicating that there is an active publication ongoing for this resource.</t>
            </li>
            <li>
              <t>inactive: indicating that there is no active publication ongoing for this resource.</t>
            </li>
            <li>
              <t>layers: provides information about the video layers being published for this resource.</t>
            </li>
            <li>
              <t>reconnect: trigger the WHEP player to reconnect to the WHEP resource by re-initiate a WHEP protocol process.</t>
            </li>
            <li>
              <t>viewercount: provides the number of viewers currently connected to this resource.</t>
            </li>
            <li>
              <t>scte35: used in the to signal a local ad insertion opportunity in the media streams.</t>
            </li>
          </ul>
          <t>The WHEP resource must indicate the event type in the "event" field and a JSON serialized string in the "data" field of the WHATWG server sent events message. In order to make the processing simpler on the WHEP player, the WHEP resource <bcp14>MUST</bcp14> encode the event data in a single "data" line.</t>
          <figure>
            <name>Example event</name>
            <artwork><![CDATA[
event: viewercount
data: {"viewercount":3}
]]></artwork>
          </figure>
          <t>The WHEP player <bcp14>MAY</bcp14> destroy the event stream at anytime by sending a HTTP DELETE request to the Url returned on the location header on the created request. The WHEP Resource <bcp14>MUST</bcp14> drop any pending queued event and return a "404 Not found" if any further long pull request is received for the event stream.</t>
          <t>All the event streams associated with a WHEP Resource <bcp14>MUST</bcp14> be destroyed when the WHEP Resource is terminated.</t>
          <section anchor="active-event">
            <name>active event</name>
            <t>The event is sent by the WHEP Resource when an active publication for the WHEP resource, either at the begining of the playback when the resource is created or later during the playback session.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "active"</t>
              </li>
              <li>
                <t>event data: Empty JSON object, could be be enhanced in future versions of the specification.</t>
              </li>
            </ul>
            <figure>
              <name>active example event</name>
              <artwork><![CDATA[
event: active
data: {}
]]></artwork>
            </figure>
          </section>
          <section anchor="inactive-event">
            <name>inactive event</name>
            <t>The event is sent by the WHEP Resource when an active publication is no longer available. The WHEP Resource <bcp14>MUST NOT</bcp14> send an initial "inactive" event if there is no active publication when the resource is created.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "inactive"</t>
              </li>
              <li>
                <t>event data:  Empty JSON object, could be be enhanced in future versions of the specification.</t>
              </li>
            </ul>
            <figure>
              <name>inactive example event</name>
              <artwork><![CDATA[
event: inactive
data: {}
]]></artwork>
            </figure>
          </section>
          <section anchor="layers-event">
            <name>layers event</name>
            <t>The event is sent by the WHEP Resource to provide information to the WHEP player about the avialable video layers or renditions to be used in conjuction with the Layer Selection extension defined in <xref target="video-layer-selection"/>.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "layers"</t>
              </li>
              <li>
                <t>event data: JSON object</t>
              </li>
            </ul>
            <t>The WHEP Resource <bcp14>MAY</bcp14> send the event periodically or just when the layer information has changed.</t>
            <t>The event data JSON object contains the video layers information available for each "m-line" indexed by the "m-line" order in the SDP. Each "m-line" value contains and array of layer" JSON objects, which each element contains the following information:</t>
            <ul spacing="normal">
              <li>
                <t>rid: (String) Restriction Identifiers (RID) or RtpStreamId value of the simulcast encoding of the layer as defined in <xref section="3.7" sectionFormat="of" target="RFC9429"/>.</t>
              </li>
              <li>
                <t>spatialLayerId: (Number) the spatial layer id.</t>
              </li>
              <li>
                <t>temporalLayerId: (Number) the temporal layer id .</t>
              </li>
              <li>
                <t>bitrate: (Number) the current bitrate.</t>
              </li>
              <li>
                <t>targetBitrate: (Number) the target encoding bitrate.</t>
              </li>
              <li>
                <t>width: (Number) the current video width.</t>
              </li>
              <li>
                <t>heigth: (Number) the current video height.</t>
              </li>
              <li>
                <t>targetBitrate: (Number) the target encoding bitrate.</t>
              </li>
            </ul>
            <t>The "layer" object <bcp14>MUST</bcp14> containt at least one of the rid, spatialLayerId or temporalLayerId attributes, the other attributes are <bcp14>OPTIONAL</bcp14>. A layer is considered inactive if the bitrate attribute is 0 or not set.</t>
            <figure>
              <name>Layer example JSON event data using simulcast and temporal scalability with highest encoding layer inactive</name>
              <artwork><![CDATA[
{
  "0": [
      { "rid": "2", "spatialLayerId": 0, "temporalLayerId": 1, "targetBitrate": 2000000, width: 1280, height: 720 },
      { "rid": "2", "spatialLayerId": 0, "temporalLayerId": 0, "targetBitrate": 1000000, width: 1280, height: 720 },
      { "rid": "1", "spatialLayerId": 0, "temporalLayerId": 1, "bitrate": 557112, "targetBitrate": 572000, width: 640, height: 360 },
      { "rid": "1", "spatialLayerId": 0, "temporalLayerId": 0, "bitrate": 343592, "targetBitrate": 380000, width: 640, height: 360 },
      { "rid": "0", "spatialLayerId": 0, "temporalLayerId": 1, "bitrate": 116352, "targetBitrate": 128000, width: 320, height: 180 },
      { "rid": "0", "spatialLayerId": 0, "temporalLayerId": 0, "bitrate": 67464 , "targetBitrate": 640000, width: 320, height: 180 }
    ]
}
]]></artwork>
            </figure>
            <figure>
              <name>Layer example JSON event data using SVC</name>
              <artwork><![CDATA[
{
  "0": [
      { "spatialLayerId": 1, "temporalLayerId": 1, "bitrate": 557112, width: 640, height: 360 },
      { "spatialLayerId": 1, "temporalLayerId": 0, "bitrate": 343592, width: 640, height: 360 },
      { "spatialLayerId": 0, "temporalLayerId": 1, "bitrate": 116352, width: 320, height: 180 },
      { "spatialLayerId": 0, "temporalLayerId": 0, "bitrate": 67464 , width: 320, height: 180 }
    ]
}
]]></artwork>
            </figure>
            <figure>
              <name>Layer example JSON event data using SVC</name>
              <artwork><![CDATA[
{
  "0": {
      { "spatialLayerId": 1, "temporalLayerId": 1, "bitrate": 557112, width: 640, height: 360 },
      { "spatialLayerId": 1, "temporalLayerId": 0, "bitrate": 343592, width: 640, height: 360 },
      { "spatialLayerId": 0, "temporalLayerId": 1, "bitrate": 116352, width: 320, height: 180 },
      { "spatialLayerId": 0, "temporalLayerId": 0, "bitrate": 67464 , width: 320, height: 180 }
    ]
}
]]></artwork>
            </figure>
          </section>
          <section anchor="reconnect-event">
            <name>reconnect event</name>
            <t>The reconnect event is sent by the WHEP Resource to notify the WHEP player that it should drop the current playback session and reconnect for starting a new one.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "reconnect"</t>
              </li>
              <li>
                <t>event data: JSON object optionally containing the WHEP Endpoint URL in an "url" to be used for the WHEP player to restart the WHEP protocol process.</t>
              </li>
            </ul>
            <t>It may be sent by the WHEP Resource when the following situation occurs:</t>
            <ul spacing="normal">
              <li>
                <t>The quality of service of the WHEP Resource declines which affects the quality of experience for end users.</t>
              </li>
              <li>
                <t>The connection between WHEP player and WHEP Resource is degraded which affects the quality of experience for end users.</t>
              </li>
              <li>
                <t>The WHEP resource is going to be terminated due to resource management policies.</t>
              </li>
            </ul>
            <t>Upon the receipt of the reconnect event, the WHEP player <bcp14>MUST</bcp14> restart the playbkack session as defined in <xref target="playback-session-setup"/> by sending the HTTP POST request to the WHEP endpoint URL provided inthe "url" attribute of the JSON object received in the event data or the original WHEP endpoint URL if the "url" attributue is not provided. The WHEP player <bcp14>MUST</bcp14> also terminate the current playback session as defined in <xref target="playback-session-termination"/>.</t>
            <figure>
              <name>reconnect example event</name>
              <artwork><![CDATA[
event: reconnect
data: {"url": "https://whep-backup.example.com/whep/endpoint/"}
]]></artwork>
            </figure>
          </section>
          <section anchor="viewercount-event">
            <name>viewercount event</name>
            <t>The event is sent by the WHEP Resource to provide the WHIP Player the information of number of viewers currently connected to this resource.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "viewercount"</t>
              </li>
              <li>
                <t>event data: JSON object containing a "viewercount" attribute with a Number value indicating the number of viewers currently watching the WHIP resource.</t>
              </li>
            </ul>
            <t>The viewer count provided by the WHEP Resource <bcp14>MAY</bcp14> be approximate and not updated in real time but periodically to avoid  overloading both the event stream and the Media Server.</t>
            <figure>
              <name>viewercount example event</name>
              <artwork><![CDATA[
event: viewercount
data: {"viewercount":3}
]]></artwork>
            </figure>
          </section>
          <section anchor="scte35-event">
            <name>scte35 event</name>
            <t>"Digital Program Insertion Cueing Message for Cable" <xref target="SCTE35"/>, is the core signaling standard for advertising, Program and distribution control (e.g., blackouts) of content for content providers and content distributors. SCTE 35 signals can be used to identify advertising breaks, advertising content, and programming content.</t>
            <t>This event is mainly sent by the WHEP resource to indicate ad insertion opportunities for the WHEP player.</t>
            <ul spacing="normal">
              <li>
                <t>event name: "scte35"</t>
              </li>
              <li>
                <t>event data: Base URL 64 serializaton of an SCTE35 message as defined in <xref target="SCTE35"/>.</t>
              </li>
            </ul>
            <figure>
              <name>scte35 example event</name>
              <artwork><![CDATA[
event: scte35
data: /DA8AAAAAAAAAP///wb+06ACpQAmAiRDVUVJAACcHX//AACky4AMEERJU0NZTVdGMDQ1MjAwMEgxAQEMm4c0
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="video-layer-selection">
          <name>Video Layer Selection extension</name>
          <t>The Layer Selection extensions allows the WHEP player to control which video layer or rendition is being delivered through the negotiated video MediaStreamTrack. When supported by the WHEP resource, a "Link" header field with a "rel" attribute of "urn:ietf:params:whep:ext:core:layer" <bcp14>MUST</bcp14> be returned in the initial HTTP "201 Created" response, with the Url of the Video Layer Selection REST API entrypoint. If this extension is supported by the WHEP Resource, the Server Sent Events extension <bcp14>MUST</bcp14> be supported as well and the "layers" event <bcp14>MUST</bcp14> be advertised as well.</t>
          <figure>
            <name>HTTP 201 response example containing the Video Layer Selection extension</name>
            <artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/sdp
Location: https://whep.example.org/resource/213786HF
Link: <https://whep.ietf.org/resource/213786HF/layer>;
      rel="urn:ietf:params:whep:ext:core:layer"
Link: <https://whep.ietf.org/resource/213786HF/layer>;
      rel="urn:ietf:params:whep:ext:core:server-sent-events"
      events="layers"
]]></artwork>
          </figure>
          <t>In case that Simulcast or Scalable Video Codecs are supported by the Media Server and used in the active publication to the WHEP Resource, by default, the Media Server will choose one of the available video layers to be sent to the WHEP player (based on bandwidth estimation or any other business logic). However, the WHEP player (or the person watching the stream) may decide that it whishes to receive a different one (to preserve bandwidth or to best fit in the UI). In this case the WHEP player <bcp14>MAY</bcp14> send a HTTP POST request to theVideo Layer Selection  API entrypoint containing an "application/json" body with an JSON object indicating the information of the video layer that wishes to be received. The WHEP Endpoint will return a "200 OK" if the switch to the new video layer can be performed or an appropiate HTTP error response if not.</t>
          <t>The information that can sent on the JSON object in the POST request for doing layer selection is as follows:</t>
          <ul spacing="normal">
            <li>
              <t>mediaId: (String) m-line index to apply the layer selection(default: first video m-line)</t>
            </li>
            <li>
              <t>rid: (String)  rid value of the simulcast encoding of the track (default: automatic selection)</t>
            </li>
            <li>
              <t>spatialLayerId: (Number) The spatial layer id to send to the outgoing stream (default: max layer available)</t>
            </li>
            <li>
              <t>temporalLayerId: (Number) The temporaral layer id to send to the outgoing stream (default: max layer available)</t>
            </li>
            <li>
              <t>maxSpatialLayerId: (Number) Max spatial layer id (default: unlimited)</t>
            </li>
            <li>
              <t>maxTemporalLayerId: (Number) Max temporal layer id (default: unlimited)</t>
            </li>
            <li>
              <t>maxWidth: (Number) Max width of the layer (default: unlimited)</t>
            </li>
            <li>
              <t>maxHeight: (Number) Max height of the layer (default: unlimited)</t>
            </li>
          </ul>
          <t>The information about the avialable encodings, spatial or temporal layers should be retrieverd from a "layers" event sent by the WHEP Resource using the Server Sent Events extension:</t>
          <artwork><![CDATA[
POST /resource/213786HF/layer HTTP/1.1
Host: whep.example.com
Content-Type: application/sjon

{mediaId:"0", "rid": "hd"}

HTTP/1.1 200 OK
]]></artwork>
          <t>If the WHEP player wishes to return to the default selection performed by the Media Server, it just need to send an JSON Object removing the constrains for the layer:</t>
          <artwork><![CDATA[
POST /resource/213786HF/layer HTTP/1.1
Host: whep.example.com
Content-Type: application/sjon

{mediaId:"0"}

HTTP/1.1 200 OK
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a new protocol on top of HTTP and WebRTC, thus, security protocols and considerations from related specifications apply to the WHEP specification. These include:</t>
      <ul spacing="normal">
        <li>
          <t>WebRTC security considerations: <xref target="RFC8826"/>. HTTPS <bcp14>SHALL</bcp14> be used in order to preserve the WebRTC security model.</t>
        </li>
        <li>
          <t>Transport Layer Security (TLS): <xref target="RFC8446"/> and <xref target="RFC9147"/>.</t>
        </li>
        <li>
          <t>HTTP security: <xref section="11" sectionFormat="of" target="RFC9112"/> and <xref section="17" sectionFormat="of" target="RFC9110"/>.</t>
        </li>
        <li>
          <t>URI security: <xref section="7" sectionFormat="of" target="RFC3986"/>.</t>
        </li>
      </ul>
      <t>On top of that, the WHEP protocol exposes a thin new attack surface specific of the REST API methods used within it:</t>
      <ul spacing="normal">
        <li>
          <t>HTTP POST flooding and resource exhaustion:
It would be possible for an attacker in possession of authentication credentials valid for watching a WHEP stream to make multiple HTTP POST to the WHEP endpoint.
This will force the WHEP endpoint to process the incoming SDP and allocate resources for being able to setup the DTLS/ICE connection.
While the malicious client does not need to initiate the DTLS/ICE connection at all, the WHIP session will have to wait for the DTLS/ICE connection timeout in order to release the associated resources.
If the connection rate is high enough, this could lead to resource exhaustion on the servers handling the requests and it will not be able to process legitimate incoming ingests.
In order to prevent this scenario, WHEP endpoints <bcp14>SHOULD</bcp14> implement a rate limit and avalanche control mechanism for incoming initial HTTP POST requests.</t>
        </li>
        <li>
          <t>Insecure direct object references (IDOR) on the WHEP session locations:
If the URLs returned by the WHIP endpoint for the WHEP sessions location are easy to guess, it would be possible for an attacker to send multiple HTTP DELETE requests and terminate all the WHEP sessions currently running.
In order to prevent this scenario, WHEP endpoints <bcp14>SHOULD</bcp14> generate URLs with enough randomness, using a cryptographically secure pseudorandom number generator following the best practices in Randomness Requirements for Security <xref target="RFC4086"/>, and implement a rate limit and avalanche control mechanism for HTTP DELETE requests.
The security considerations for Universally Unique IDentifier (UUID) <xref section="6" sectionFormat="comma" target="RFC9562"/> are applicable for generating the WHEP sessions location URL.</t>
        </li>
        <li>
          <t>HTTP PATCH flooding: 
Similar to the HTTP POST flooding, a malicious client could also create a resource exhaustion by sending multiple HTTP PATCH request to the WHEP session, although the WHEP sessions can limit the impact by not allocating new ICE candidates and reusing the existing ICE candidates when doing ICE restarts.
In order to prevent this scenario, WHEP endpoints <bcp14>SHOULD</bcp14> implement a rate limit and avalanche control mechanism for incoming HTTP PATCH requests.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification adds a registry for URN sub-namespaces for WHEP protocol extensions.</t>
      <section anchor="registration-of-whep-urn-sub-namespace-and-whep-registries">
        <name>Registration of WHEP URN Sub-namespace and WHEP registries</name>
        <t>IANA is asked to add an entry to the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers" registry and create a sub-namespace for the Registered Parameter Identifier as per <xref target="RFC3553"/>: "urn:ietf:params:whep".</t>
        <t>To manage this sub-namespace, IANA is asked to create the "WebRTC-HTTP egress protocol (WHEP) URNs" and "WebRTC-HTTP egress protocol (WHEP) extension URNs".</t>
        <section anchor="urn-whep-registry">
          <name>WebRTC-HTTP egress protocol (WHEP) URNs registry</name>
          <t>The "WebRTC-HTTP egress protocol (WHEP) URNs" registry is used to manage entries within the "urn:ietf:params:whep" namespace. The registry descriptions is as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Registry group: WebRTC-HTTP egress protocol (WHEP)</t>
            </li>
            <li>
              <t>Registry name: WebRTC-HTTP egress protocol (WHEP) URNs</t>
            </li>
            <li>
              <t>Specification: this document (RFC TBD)</t>
            </li>
            <li>
              <t>Registration procedure: Specification Required</t>
            </li>
            <li>
              <t>Field names: URI, description, change controller, reference and IANA registry reference</t>
            </li>
          </ul>
          <t>The registry contains a single initial value:</t>
          <ul spacing="normal">
            <li>
              <t>URI: urn:ietf:params:whep:ext</t>
            </li>
            <li>
              <t>Description: WebRTC-HTTP egress protocol (WHEP) extension URNs</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: this document (RFC TBD) Section <xref target="urn-whep-ext-registry"/></t>
            </li>
            <li>
              <t>IANA registry reference: WebRTC-HTTP egress protocol (WHEP) extension URNs registry.</t>
            </li>
          </ul>
        </section>
        <section anchor="urn-whep-ext-registry">
          <name>WebRTC-HTTP egress protocol (WHEP) extension URNs registry</name>
          <t>The "WebRTC-HTTP egress protocol (WHEP) Extension URNs" is used to manage entries within the "urn:ietf:params:whep:ext" namespace. The registry descriptions is as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Registry group: WebRTC-HTTP egress protocol (WHEP)</t>
            </li>
            <li>
              <t>Registry name: WebRTC-HTTP egress protocol (WHEP) Extension URNs</t>
            </li>
            <li>
              <t>Specification: this document (RFC TBD)</t>
            </li>
            <li>
              <t>Registration procedure: Specification Required</t>
            </li>
            <li>
              <t>Field names: URI, description, change controller, reference and IANA registry reference</t>
            </li>
          </ul>
          <t>Initial values for the WebRTC-HTTP egress protocol (WHEP) extension URNs registry are given below:</t>
          <ul spacing="normal">
            <li>
              <t>URN: urn:ietf:params:whep:ext:core:layer</t>
            </li>
            <li>
              <t>Reference: (RFC TBD)</t>
            </li>
            <li>
              <t>Description: Layer Selection protocol extension</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>URN: urn:ietf:params:whep:ext:core:server-sent-events</t>
            </li>
            <li>
              <t>Reference: (RFC TBD)</t>
            </li>
            <li>
              <t>Description: Server Sent Events protocol extension</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="urn-whep-subspace">
        <name>URN Sub-namespace for WHEP</name>
        <t>WHEP endpoint utilizes URNs to identify the supported WHEP protocol extensions on the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/>.</t>
        <t>This section creates and registers an IETF URN Sub-namespace for use in the WHEP specifications and future extensions.</t>
        <section anchor="specification-template">
          <name>Specification Template</name>
          <t>Namespace ID:</t>
          <ul spacing="normal">
            <li>
              <t>The Namespace ID "whep" has been assigned.</t>
            </li>
          </ul>
          <t>Registration Information:</t>
          <ul spacing="normal">
            <li>
              <t>Version: 1</t>
            </li>
            <li>
              <t>Date: TBD</t>
            </li>
          </ul>
          <t>Declared registrant of the namespace:</t>
          <ul spacing="normal">
            <li>
              <t>Registering organization: The Internet Engineering Task Force.</t>
            </li>
            <li>
              <t>Designated contact: A designated expert will monitor the WHEP public mailing list, "wish@ietf.org".</t>
            </li>
          </ul>
          <t>Declaration of Syntactic Structure:</t>
          <ul spacing="normal">
            <li>
              <t>The Namespace Specific String (NSS) of all URNs that use the "whep" Namespace ID shall have the following structure: urn:ietf:params:whep:{type}:{name}:{other}.</t>
            </li>
            <li>
              <t>The keywords have the following meaning:  </t>
              <ul spacing="normal">
                <li>
                  <t>type: The entity type. This specification only defines the "ext" type.</t>
                </li>
                <li>
                  <t>name: A required ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines a major namespace of a WHEP protocol extension. The value <bcp14>MAY</bcp14> also be an industry name or organization name.</t>
                </li>
                <li>
                  <t>other: Any ASCII string that conforms to the URN syntax requirements (see <xref target="RFC8141"/>) and defines the sub-namespace (which <bcp14>MAY</bcp14> be further broken down in namespaces delimited by colons) as needed to uniquely identify an WHEP protocol extension.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>Relevant Ancillary Documentation:</t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t>Identifier Uniqueness Considerations:</t>
          <ul spacing="normal">
            <li>
              <t>The designated contact shall be responsible for reviewing and enforcing uniqueness.</t>
            </li>
          </ul>
          <t>Identifier Persistence Considerations:</t>
          <ul spacing="normal">
            <li>
              <t>Once a name has been allocated, it <bcp14>MUST NOT</bcp14> be reallocated for a different purpose.</t>
            </li>
            <li>
              <t>The rules provided for assignments of values within a sub-namespace <bcp14>MUST</bcp14> be constructed so that the meanings of values cannot change.</t>
            </li>
            <li>
              <t>This registration mechanism is not appropriate for naming values whose meanings may change over time.</t>
            </li>
          </ul>
          <t>Process of Identifier Assignment:</t>
          <ul spacing="normal">
            <li>
              <t>Namespace with type "ext" (e.g., "urn:ietf:params:whep:ext") is reserved for IETF-approved WHEP specifications.</t>
            </li>
          </ul>
          <t>Process of Identifier Resolution:</t>
          <ul spacing="normal">
            <li>
              <t>None specified.</t>
            </li>
          </ul>
          <t>Rules for Lexical Equivalence:</t>
          <ul spacing="normal">
            <li>
              <t>No special considerations; the rules for lexical equivalence specified in <xref target="RFC8141"/> apply.</t>
            </li>
          </ul>
          <t>Conformance with URN Syntax:</t>
          <ul spacing="normal">
            <li>
              <t>No special considerations.</t>
            </li>
          </ul>
          <t>Validation Mechanism:</t>
          <ul spacing="normal">
            <li>
              <t>None specified.</t>
            </li>
          </ul>
          <t>Scope:</t>
          <ul spacing="normal">
            <li>
              <t>Global.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="registering-whep-protocol-extensions-urns">
        <name>Registering WHEP Protocol Extensions URNs</name>
        <t>This section defines the process for registering new WHEP protocol extensions URNs with IANA in the "WebRTC-HTTP egress protocol (WHEP) extension URNs" registry (see <xref target="urn-whep-subspace"/>).</t>
        <t>A WHEP Protocol Extension URNs is used as a value in the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/> for the purpose of signaling the WHEP protocol extensions supported by the WHEP endpoints.</t>
        <t>WHEP Protocol Extensions URNs have an "ext" type as defined in <xref target="urn-whep-subspace"/>.</t>
        <section anchor="registration-procedure">
          <name>Registration Procedure</name>
          <t>The IETF has created a mailing list, "wish@ietf.org", which can be used
   for public discussion of WHEP protocol extensions proposals prior to registration.
   Use of the mailing list is strongly encouraged. The IESG has
   appointed a designated expert as per <xref target="RFC8126"/> who will monitor the
   wish@ietf.org mailing list and review registrations.</t>
          <t>Registration of new "ext" type URNs (in the namespace "urn:ietf:params:whep:ext") belonging to a WHEP Protocol Extension <bcp14>MUST</bcp14> be documented in a permanent and readily available public specification, in sufficient detail so that interoperability between independent implementations is possible and reviewed by the designated expert as per Section 4.6 of <xref target="RFC8126"/>.
   An Standards Track RFC is <bcp14>REQUIRED</bcp14> for the registration of new value data types that modify existing properties.
   An Standards Track RFC is also <bcp14>REQUIRED</bcp14> for registration of WHEP Protocol Extensions URNs that modify WHEP Protocol Extensions previously documented in an existing RFC.</t>
          <t>The registration procedure begins when a completed registration template, defined in the sections below, is sent to iana@iana.org.
   Decisions made by the designated expert can be appealed to an Applications and Real Time (ART) Area Director, then to the IESG.
   The normal appeals procedure described in <xref target="BCP9"/> is to be followed.</t>
          <t>Once the registration procedure concludes successfully, IANA creates
   or modifies the corresponding record in the WHEP Protocol Extension registry.</t>
          <t>An RFC specifying one or more new WHEP Protocol Extension URNs <bcp14>MUST</bcp14> include the
   completed registration templates, which <bcp14>MAY</bcp14> be expanded with
   additional information. These completed templates are intended to go
   in the body of the document, not in the IANA Considerations section.
   The RFC <bcp14>MUST</bcp14> include the syntax and semantics of any extension-specific attributes that may be provided in a Link header
   field advertising the extension.</t>
        </section>
        <section anchor="guidance-for-designated-experts">
          <name>Guidance for Designated Experts</name>
          <t>The Designated Expert (DE) is expected to ascertain the existence of suitable documentation (a specification) as described in <xref target="RFC8126"/> and to verify that the document is permanently and publicly available.</t>
          <t>The DE is also expected to check the clarity of purpose and use of the requested registration.</t>
          <t>Additionally, the DE must verify that any request for one of these registrations has been made available for review and comment by posting the request to the WebRTC Ingest Signaling over HTTPS (wish) Working Group mailing list.</t>
          <t>Specifications should be documented in an Internet-Draft. Lastly, the DE must ensure that any other request for a code point does not conflict with work that is active in or already published by the IETF.</t>
        </section>
        <section anchor="whep-protocol-extension-registration-template">
          <name>WHEP Protocol Extension Registration Template</name>
          <t>A WHEP Protocol Extension URNs is defined by completing the following template:</t>
          <ul spacing="normal">
            <li>
              <t>URN: A unique URN for the WHEP Protocol Extension.</t>
            </li>
            <li>
              <t>Reference: A formal reference to the publicly available specification</t>
            </li>
            <li>
              <t>Description: A brief description of the function of the extension, in a short paragraph or two</t>
            </li>
            <li>
              <t>Contact information: Contact information for the organization or person making the registration</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SCTE35" target="https://account.scte.org/standards/library/catalog/scte-35-digital-program-insertion-cueing-message">
          <front>
            <title>Digital Program Insertion Cueing Message</title>
            <author>
              <organization>ANSI</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9429">
          <front>
            <title>JavaScript Session Establishment Protocol (JSEP)</title>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>This document describes the mechanisms for allowing a JavaScript application to control the signaling plane of a multimedia session via the interface specified in the W3C RTCPeerConnection API and discusses how this relates to existing signaling protocols.</t>
              <t>This specification obsoletes RFC 8829.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9429"/>
          <seriesInfo name="DOI" value="10.17487/RFC9429"/>
        </reference>
        <reference anchor="RFC3264">
          <front>
            <title>An Offer/Answer Model with Session Description Protocol (SDP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document defines a mechanism by which two entities can make use of the Session Description Protocol (SDP) to arrive at a common view of a multimedia session between them. In the model, one participant offers the other a description of the desired session from their perspective, and the other participant answers with the desired session from their perspective. This offer/answer model is most useful in unicast sessions where information from both participants is needed for the complete view of the session. The offer/answer model is used by protocols like the Session Initiation Protocol (SIP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3264"/>
          <seriesInfo name="DOI" value="10.17487/RFC3264"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="W3C.REC-ldp-20150226" target="https://www.w3.org/TR/2015/REC-ldp-20150226/">
          <front>
            <title>Linked Data Platform 1.0</title>
            <author fullname="Ashok Malhotra" role="editor"/>
            <author fullname="John Arwe" role="editor"/>
            <author fullname="Steve Speicher" role="editor"/>
            <date day="26" month="February" year="2015"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-ldp-20150226"/>
          <seriesInfo name="W3C" value="REC-ldp-20150226"/>
        </reference>
        <reference anchor="RFC8845">
          <front>
            <title>Framework for Telepresence Multi-Streams</title>
            <author fullname="M. Duckworth" initials="M." role="editor" surname="Duckworth"/>
            <author fullname="A. Pepperell" initials="A." surname="Pepperell"/>
            <author fullname="S. Wenger" initials="S." surname="Wenger"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines a framework for a protocol to enable devices in a telepresence conference to interoperate. The protocol enables communication of information about multiple media streams so a sending system and receiving system can make reasonable decisions about transmitting, selecting, and rendering the media streams. This protocol is used in addition to SIP signaling and Session Description Protocol (SDP) negotiation for setting up a telepresence session.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8845"/>
          <seriesInfo name="DOI" value="10.17487/RFC8845"/>
        </reference>
        <reference anchor="RFC8838">
          <front>
            <title>Trickle ICE: Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (ICE) Protocol</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov"/>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes "Trickle ICE", an extension to the Interactive Connectivity Establishment (ICE) protocol that enables ICE agents to begin connectivity checks while they are still gathering candidates, by incrementally exchanging candidates over time instead of all at once. This method can considerably accelerate the process of establishing a communication session.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8838"/>
          <seriesInfo name="DOI" value="10.17487/RFC8838"/>
        </reference>
        <reference anchor="RFC5789">
          <front>
            <title>PATCH Method for HTTP</title>
            <author fullname="L. Dusseault" initials="L." surname="Dusseault"/>
            <author fullname="J. Snell" initials="J." surname="Snell"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>Several applications extending the Hypertext Transfer Protocol (HTTP) require a feature to do partial resource modification. The existing HTTP PUT method only allows a complete replacement of a document. This proposal adds a new HTTP method, PATCH, to modify an existing HTTP resource. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5789"/>
          <seriesInfo name="DOI" value="10.17487/RFC5789"/>
        </reference>
        <reference anchor="RFC8840">
          <front>
            <title>A Session Initiation Protocol (SIP) Usage for Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (Trickle ICE)</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov"/>
            <author fullname="T. Stach" initials="T." surname="Stach"/>
            <author fullname="E. Marocco" initials="E." surname="Marocco"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>The Interactive Connectivity Establishment (ICE) protocol describes a Network Address Translator (NAT) traversal mechanism for UDP-based multimedia sessions established with the Offer/Answer model. The ICE extension for Incremental Provisioning of Candidates (Trickle ICE) defines a mechanism that allows ICE Agents to shorten session establishment delays by making the candidate gathering and connectivity checking phases of ICE non-blocking and by executing them in parallel.</t>
              <t>This document defines usage semantics for Trickle ICE with the Session Initiation Protocol (SIP). The document also defines a new SIP Info Package to support this usage together with the corresponding media type. Additionally, a new Session Description Protocol (SDP) "end-of-candidates" attribute and a new SIP option tag "trickle-ice" are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8840"/>
          <seriesInfo name="DOI" value="10.17487/RFC8840"/>
        </reference>
        <reference anchor="RFC6585">
          <front>
            <title>Additional HTTP Status Codes</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document specifies additional HyperText Transfer Protocol (HTTP) status codes for a variety of common situations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6585"/>
          <seriesInfo name="DOI" value="10.17487/RFC6585"/>
        </reference>
        <reference anchor="RFC8839">
          <front>
            <title>Session Description Protocol (SDP) Offer/Answer Procedures for Interactive Connectivity Establishment (ICE)</title>
            <author fullname="M. Petit-Huguenin" initials="M." surname="Petit-Huguenin"/>
            <author fullname="S. Nandakumar" initials="S." surname="Nandakumar"/>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="R. Shpount" initials="R." surname="Shpount"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes Session Description Protocol (SDP) Offer/Answer procedures for carrying out Interactive Connectivity Establishment (ICE) between the agents.</t>
              <t>This document obsoletes RFCs 5245 and 6336.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8839"/>
          <seriesInfo name="DOI" value="10.17487/RFC8839"/>
        </reference>
        <reference anchor="RFC9143">
          <front>
            <title>Negotiating Media Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a "BUNDLE transport", and the media is referred to as "bundled media". The "m=" sections that use the BUNDLE transport form a BUNDLE group.</t>
              <t>This specification defines a new RTP Control Protocol (RTCP) Source Description (SDES) item and a new RTP header extension.</t>
              <t>This specification updates RFCs 3264, 5888, and 7941.</t>
              <t>This specification obsoletes RFC 8843.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9143"/>
          <seriesInfo name="DOI" value="10.17487/RFC9143"/>
        </reference>
        <reference anchor="RFC8858">
          <front>
            <title>Indicating Exclusive Support of RTP and RTP Control Protocol (RTCP) Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document defines a new Session Description Protocol (SDP) media-level attribute, 'rtcp-mux-only', that can be used by an endpoint to indicate exclusive support of RTP and RTP Control Protocol (RTCP) multiplexing. The document also updates RFC 5761 by clarifying that an offerer can use a mechanism to indicate that it is not able to send and receive RTCP on separate ports.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8858"/>
          <seriesInfo name="DOI" value="10.17487/RFC8858"/>
        </reference>
        <reference anchor="RFC8830">
          <front>
            <title>WebRTC MediaStream Identification in the Session Description Protocol</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document specifies a Session Description Protocol (SDP) grouping mechanism for RTP media streams that can be used to specify relations between media streams.</t>
              <t>This mechanism is used to signal the association between the SDP concept of "media description" and the Web Real-Time Communication (WebRTC) concept of MediaStream/MediaStreamTrack using SDP signaling.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8830"/>
          <seriesInfo name="DOI" value="10.17487/RFC8830"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8826">
          <front>
            <title>Security Considerations for WebRTC</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>WebRTC is a protocol suite for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web". This document defines the WebRTC threat model and analyzes the security threats of WebRTC in that model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8826"/>
          <seriesInfo name="DOI" value="10.17487/RFC8826"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="RFC3553">
          <front>
            <title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items. The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="73"/>
          <seriesInfo name="RFC" value="3553"/>
          <seriesInfo name="DOI" value="10.17487/RFC3553"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC6120">
          <front>
            <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities. This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions. This document obsoletes RFC 3920. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6120"/>
          <seriesInfo name="DOI" value="10.17487/RFC6120"/>
        </reference>
        <reference anchor="RFC7826">
          <front>
            <title>Real-Time Streaming Protocol Version 2.0</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="A. Rao" initials="A." surname="Rao"/>
            <author fullname="R. Lanphier" initials="R." surname="Lanphier"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="M. Stiemerling" initials="M." role="editor" surname="Stiemerling"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>This memorandum defines the Real-Time Streaming Protocol (RTSP) version 2.0, which obsoletes RTSP version 1.0 defined in RFC 2326.</t>
              <t>RTSP is an application-layer protocol for the setup and control of the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data feeds and stored clips. This protocol is intended to control multiple data delivery sessions; provide a means for choosing delivery channels such as UDP, multicast UDP, and TCP; and provide a means for choosing delivery mechanisms based upon RTP (RFC 3550).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7826"/>
          <seriesInfo name="DOI" value="10.17487/RFC7826"/>
        </reference>
        <reference anchor="I-D.draft-ietf-wish-whip">
          <front>
            <title>WebRTC-HTTP ingestion protocol (WHIP)</title>
            <author fullname="Sergio Garcia Murillo" initials="S. G." surname="Murillo">
              <organization>Millicast</organization>
            </author>
            <author fullname="Dr. Alex Gouaillard" initials="A." surname="Gouaillard">
              <organization>CoSMo Software</organization>
            </author>
            <date day="21" month="August" year="2024"/>
            <abstract>
              <t>   This document describes a simple HTTP-based protocol that will allow
   WebRTC-based ingestion of content into streaming services and/or
   CDNs.

   This document updates RFC 8842 and RFC 8840.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wish-whip-16"/>
        </reference>
        <referencegroup anchor="BCP56" target="https://www.rfc-editor.org/info/bcp56">
          <reference anchor="RFC9205" target="https://www.rfc-editor.org/info/rfc9205">
            <front>
              <title>Building Protocols with HTTP</title>
              <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
                <t>This document obsoletes RFC 3205.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="56"/>
            <seriesInfo name="RFC" value="9205"/>
            <seriesInfo name="DOI" value="10.17487/RFC9205"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9457">
          <front>
            <title>Problem Details for HTTP APIs</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <author fullname="S. Dalal" initials="S." surname="Dalal"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document defines a "problem detail" to carry machine-readable details of errors in HTTP response content to avoid the need to define new error response formats for HTTP APIs.</t>
              <t>This document obsoletes RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9457"/>
          <seriesInfo name="DOI" value="10.17487/RFC9457"/>
        </reference>
        <reference anchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <referencegroup anchor="BCP9" target="https://www.rfc-editor.org/info/bcp9">
          <reference anchor="RFC2026" target="https://www.rfc-editor.org/info/rfc2026">
            <front>
              <title>The Internet Standards Process -- Revision 3</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="October" year="1996"/>
              <abstract>
                <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="2026"/>
            <seriesInfo name="DOI" value="10.17487/RFC2026"/>
          </reference>
          <reference anchor="RFC5657" target="https://www.rfc-editor.org/info/rfc5657">
            <front>
              <title>Guidance on Interoperation and Implementation Reports for Advancement to Draft Standard</title>
              <author fullname="L. Dusseault" initials="L." surname="Dusseault"/>
              <author fullname="R. Sparks" initials="R." surname="Sparks"/>
              <date month="September" year="2009"/>
              <abstract>
                <t>Advancing a protocol to Draft Standard requires documentation of the interoperation and implementation of the protocol. Historic reports have varied widely in form and level of content and there is little guidance available to new report preparers. This document updates the existing processes and provides more detail on what is appropriate in an interoperability and implementation report. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="5657"/>
            <seriesInfo name="DOI" value="10.17487/RFC5657"/>
          </reference>
          <reference anchor="RFC6410" target="https://www.rfc-editor.org/info/rfc6410">
            <front>
              <title>Reducing the Standards Track to Two Maturity Levels</title>
              <author fullname="R. Housley" initials="R." surname="Housley"/>
              <author fullname="D. Crocker" initials="D." surname="Crocker"/>
              <author fullname="E. Burger" initials="E." surname="Burger"/>
              <date month="October" year="2011"/>
              <abstract>
                <t>This document updates the Internet Engineering Task Force (IETF) Standards Process defined in RFC 2026. Primarily, it reduces the Standards Process from three Standards Track maturity levels to two. This memo documents an Internet Best Current Practice.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="6410"/>
            <seriesInfo name="DOI" value="10.17487/RFC6410"/>
          </reference>
          <reference anchor="RFC7100" target="https://www.rfc-editor.org/info/rfc7100">
            <front>
              <title>Retirement of the "Internet Official Protocol Standards" Summary Document</title>
              <author fullname="P. Resnick" initials="P." surname="Resnick"/>
              <date month="December" year="2013"/>
              <abstract>
                <t>This document updates RFC 2026 to no longer use STD 1 as a summary of "Internet Official Protocol Standards". It obsoletes RFC 5000 and requests the IESG to move RFC 5000 (and therefore STD 1) to Historic status.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7100"/>
            <seriesInfo name="DOI" value="10.17487/RFC7100"/>
          </reference>
          <reference anchor="RFC7127" target="https://www.rfc-editor.org/info/rfc7127">
            <front>
              <title>Characterization of Proposed Standards</title>
              <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <author fullname="S. Turner" initials="S." surname="Turner"/>
              <date month="January" year="2014"/>
              <abstract>
                <t>RFC 2026 describes the review performed by the Internet Engineering Steering Group (IESG) on IETF Proposed Standard RFCs and characterizes the maturity level of those documents. This document updates RFC 2026 by providing a current and more accurate characterization of Proposed Standards.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7127"/>
            <seriesInfo name="DOI" value="10.17487/RFC7127"/>
          </reference>
          <reference anchor="RFC7475" target="https://www.rfc-editor.org/info/rfc7475">
            <front>
              <title>Increasing the Number of Area Directors in an IETF Area</title>
              <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document removes a limit on the number of Area Directors who manage an Area in the definition of "IETF Area". This document updates RFC 2026 (BCP 9) and RFC 2418 (BCP 25).</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="7475"/>
            <seriesInfo name="DOI" value="10.17487/RFC7475"/>
          </reference>
          <reference anchor="RFC8789" target="https://www.rfc-editor.org/info/rfc8789">
            <front>
              <title>IETF Stream Documents Require IETF Rough Consensus</title>
              <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
              <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
              <date month="June" year="2020"/>
              <abstract>
                <t>This document requires that the IETF never publish any IETF Stream RFCs without IETF rough consensus. This updates RFC 2026.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="8789"/>
            <seriesInfo name="DOI" value="10.17487/RFC8789"/>
          </reference>
          <reference anchor="RFC9282" target="https://www.rfc-editor.org/info/rfc9282">
            <front>
              <title>Responsibility Change for the RFC Series</title>
              <author fullname="B. Rosen" initials="B." surname="Rosen"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>In RFC 9280, responsibility for the RFC Series moved to the RFC Series Working Group and the RFC Series Approval Board. It is no longer the responsibility of the RFC Editor, and the role of the IAB in the RFC Series is altered. Accordingly, in Section 2.1 of RFC 2026, the sentence "RFC publication is the direct responsibility of the RFC Editor, under the general direction of the IAB" is deleted.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="9"/>
            <seriesInfo name="RFC" value="9282"/>
            <seriesInfo name="DOI" value="10.17487/RFC9282"/>
          </reference>
        </referencegroup>
      </references>
    </references>
    <?line 915?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
