Skip to content

Latest commit

 

History

History
447 lines (361 loc) · 18 KB

Task-WebRTC.md

File metadata and controls

447 lines (361 loc) · 18 KB

SaltyRTC WebRTC Task

This task uses the end-to-end encryption techniques of SaltyRTC to set up a secure WebRTC peer-to-peer connection. It also adds another security layer for data channels that are available to users. The signalling channel will persist and should be handed over to a dedicated data channel once the peer-to-peer connection has been set up. Therefore, further signalling communication between the peers may not require a dedicated WebSocket connection over a SaltyRTC server.

Conventions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.

Terminology

All terms from the SaltyRTC protocol specification are valid in this document. Furthermore, this document will reference API parts of the WebRTC specification.

Message Chunking

The SaltyRTC chunking specification makes it possible to split a message into chunks and reassemble the message on the receiver's side while allowing any combination of ordered/unordered and reliable/unreliable transport channel underneath.

Secure Data Channel

This protocol adds another security layer for WebRTC data channels as we want our protocol to sustain broken (D)TLS environments. A data channel that uses this security layer will be called Secure Data Channel. Note that the user MAY or MAY NOT choose to use secure data channels for its purpose. However, the handed over signalling channel MUST use a secure data channel.

Task Protocol Name

The following protocol name SHALL be used for task negotiation:

v1.webrtc.tasks.saltyrtc.org

Task Data

This task makes use of the data field of the 'auth' messages described in the SaltyRTC protocol specification. The Outgoing section describes what the data of this task SHALL contain and how it MUST be generated. Whereas the Incoming section describes how the task's data from the other client's 'auth' message MUST be validated and potentially stored.

Outgoing

The task's data SHALL be a Map containing the following items:

  • The exclude field MUST contain an Array of WebRTC data channel ids (non-negative integers less than 65535) that SHALL not be used for the signalling channel. This Array MUST be available to be set from user applications that use pre-negotiated data channel ids.
  • The handover field SHALL be set to true unless the user application explicitly requested to turn off the handover feature in which case it SHALL be set to false.

Incoming

A client who receives the task's data from the remote peer MUST do the following checks:

  • The exclude field MUST contain an Array of WebRTC data channel IDs (non-negative integers less than 65535) that SHALL not be used for the signalling channel. The client SHALL store this list for usage during handover.
  • The handover field MUST be either true or false. If both client's values are true, the negotiated value is true. In any other case, the negotiated value is false and a handover requested by the user application SHALL be rejected (see the Signalling Channel Handover section for details).

Secure Data Channel

This protocol adds another security layer to WebRTC's data channels which the handed over signalling channel SHALL use. It MUST be possible for the user application to utilise this security layer for further data channels. The secure data channel MUST use NaCl for encryption/decryption of messages.

Outgoing messages MUST be processed and encrypted by following the Sending a Secure Data Channel Message section.

Incoming messages MUST be processed and decrypted by following the Receiving a Secure Data Channel Message section.

As described in the Sending a Secure Data Channel Message and the Receiving a Secure Data Channel Message section, each new secure data channel instance is being treated as a distinct remote peer from the nonce's perspective and independent of the underlying data channel id. To prevent nonce reuse, it is absolutely vital that each secure data channel instance has its own cookie, sequence number and overflow number, each for incoming and outgoing messages. Both clients SHALL use cryptographically secure random numbers for generating the cookie and the sequence number.

Signalling Channel Handover

If the negotiated handover parameter is true, the user application SHOULD initiate the handover process:

  1. The client creates a new data channel on the RTCPeerConnection instance with the RTCDataChannelInit object containing only the following values:
    • ordered SHALL be set to true,
    • protocol SHALL be set to the same subprotocol that has been negotiated with the server,
    • negotiated MUST be set to true, and
    • id SHALL be set to the lowest possible number, starting from 0, that is not excluded by both clients as negotiated.
  2. The newly created RTCDataChannel instance SHALL be secured by following the Secure Data Channel section.
  3. As soon as the data channel is open, the client SHALL send a 'handover' message on the WebSocket-based signalling channel (WS channel) to the other client. Subsequent outgoing messages MUST be sent over the data channel based signalling channel (DC channel). Incoming messages on the DC channel MUST be buffered. Incoming messages on the WS channel SHALL be accepted until a 'handover' message has been received on the WS channel. Once that message has been received, the client SHALL process the buffered messages from the DC channel. Subsequent signalling messages SHALL ONLY be accepted over the DC channel.
  4. After both clients have sent each other 'handover' messages, the client closes the connection to the server with a close code of 3003 (Handover of the Signalling Channel).

If the RTCDataChannel does not change its state to open, the client SHALL continue using the WebSocket-based signalling channel.

Message Structure

Before the signalling channel handover takes place, the same message structure as defined in the SaltyRTC protocol specification SHALL be used.

For all messages that are being exchanged over secure data channels (such as the handed over signalling channel), the nonce/header MUST be slightly changed:

 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            Cookie                             |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Data Channel ID        |        Overflow Number        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Sequence Number                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Data Channel ID: 2 byte

Contains the data channel id of the data channel that is being used for a message.

The cookie field remains the same as in the SaltyRTC protocol specification. Each new secure data channel SHALL have a new cryptographically secure random cookie, one for incoming messages and one for outgoing messages.

Overflow Number and Sequence Number SHALL remain the same as in the SaltyRTC protocol specification. Each new secure data channel instance SHALL have its own overflow number and sequence number, each for outgoing and incoming messages.

Note that the Source and Destination fields have been replaced by the Data Channel ID field. As there can be only communication between the peers that set up the peer-to-peer connection, dedicated addresses are no longer required.

Sending a Secure Data Channel Message

The same procedure as described in the SaltyRTC protocol specification SHALL be followed. However, for all messages that are being exchanged over secure data channels, the following changes MUST be applied:

  • Each data channel instance SHALL have its own cookie, overflow number and sequence number for outgoing messages.
  • Source and destination addresses SHALL NOT be set, instead
  • The data channel id MUST be set to the id of the data channel the message will be sent on.

For the handed over signalling channel, the encrypted message MUST be fragmented into chunks using SaltyRTC chunking in unreliable/unordered mode (for legacy reasons) after encryption. The chunk size MUST be less or equal to the maxMessageSize value of the RTCPeerConnection's RTCSctpTransport.

Receiving a Secure Data Channel Message

For the handed over signalling channel, the encrypted message MUST be reassembled into a complete signalling message using SaltyRTC chunking in unreliable/unordered mode (for legacy reasons) before decryption.

The same procedure as described in the SaltyRTC protocol specification SHALL be followed. However, for all messages that are being exchanged over secure data channels, the following changes MUST be applied:

  • Each data channel instance SHALL have its own cookie, overflow number and sequence number for incoming messages.
  • Source and destination addresses are not present in the secure data channel's nonce/header.
  • Overflow number and sequence number SHALL NOT be validated to ensure unordered and unreliable secure data channels can function properly. However, a client SHOULD check that two consecutive incoming messages of the same data channel do not have the exact same overflow and sequence number.
  • A client MUST check that the data channel id field matches the data channel's id the message has been received on.

Client-to-Client Messages

The following messages are new messages that will be exchanged between two clients (initiator and responder) over the signalling channel. Note that the signalling channel may be handed over to a data channel any time which is RECOMMENDED to be supported by the implementation. Furthermore, the handed over signalling channel MUST support all existing client-to-client message types.

Other messages, general behaviour and error handling for client-to-client messages is described in the SaltyRTC protocol specification.

Message States (Beyond 'auth')

         +----------+    +------------------------------+
         |          v    |                              |
    +----+----------+----+-----+                        v
    |      offer / answer      |    +----------+    +---+---+
--->+ candidates / application +--->+ handover +--->+ close |
    +--------------------------+    +-----+----+    +---+---+
                                          |             ^
                                          v             |
                     +--------------------+-----+       |
                     |      offer / answer      +-------+
                     | candidates / application |
                     +-----+--------------+-----+
                           |              ^
                           +--------------+

Message Flow Example (Beyond 'auth')

Initiator                 Responder
 |                               |
 |             offer             |
 |------------------------------>|
 |             answer            |
 |<------------------------------|
 |      candidates (n times)     |
 |<----------------------------->|
 |            handover           |
 |------------------------------>|
 |            handover           |
 |<------------------------------|
 |      candidates (m times)     |
 |<----------------------------->|
 |             close             |
 |<----------------------------->|
 |                               |

'offer' Message

At any time, the initiator MAY send an 'offer' message to the responder.

The initiator MUST set the offer field to the Map of its WebRTC RTCPeerConnection's local description the user application has generated with calling createOffer on the RTCPeerConnection instance. The offer field SHALL be a Map and MUST contain:

  • The type field containing a valid RTCSdpType in string representation.
  • The sdp field containing a blob of SDP data in string representation. If the type field is rollback, the field MAY be omitted.

The responder SHALL validate that the offer field is a Map containing the above mentioned fields and value types. It SHALL continue by requesting the user application to set the value of that field as the WebRTC RTCPeerConnection's remote description and creating an answer.

The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.

{
  "type": "offer",
  "offer": {
    "type": "offer",
    "sdp": "..."
  }
}

'answer' Message

Once the user application of the responder has set the remote description on its WebRTC RTCPeerConnection instance and generated an answer by calling createAnswer on the instance, the user application SHALL request sending an 'answer' message. The answer field SHALL be a Map and MUST contain:

  • The type field containing a valid RTCSdpType in string representation.
  • The sdp field containing a blob of SDP data in string representation. If the type field is rollback, the field MAY be omitted.

The initiator SHALL validate that the answer field is a Map containing the above mentioned fields and value types. It SHALL continue by requesting the user application to set the value of that field as the WebRTC RTCPeerConnection's remote description.

The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.

{
  "type": "answer",
  "answer": {
    "type": "answer",
    "sdp": "..."
  }
}

'candidates' Message

Both clients MAY send ICE candidates at any time to each other. Clients SHOULD bundle available candidates.

A client who sends an ICE candidate SHALL set the candidates field to an Array. Elements of this array SHALL either be Nil or a Map containing the following fields:

  • The candidate field SHALL contain an SDP candidate-attribute or an empty string as defined in the WebRTC specification in string representation.
  • The sdpMid field SHALL contain the media stream identification as defined in the WebRTC specification in string representation or Nil.
  • The sdpMLineIndex field SHALL contain the index of the media description the candidate is associated with as described in the WebRTC specification. It's value SHALL be either an unsigned integer (16 bits) or Nil.
  • The usernameFragment field SHALL contain the ICE user fragment as defined in the WebRTC specification in string representation or Nil.

(Note: The naming is inconsistent with the rest of the protocol, since it uses camelCase keys instead of under_scores. The reason for this is ease of use in browser implementations: When using camelCase each candidates entry can be passed directly to the JavaScript WebRTC implementation.)

The receiving client SHALL validate that the candidates field is an Array containing one or more Maps. These Maps SHALL contain the above mentioned fields value types. It SHALL continue by requesting the user application to add the value of each item in the Array as a remote candidate to its WebRTC RTCPeerConnection instance.

The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.

{
  "type": "candidates",
  "candidates": [
    {
      "candidate": "...",
      "sdpMid": "data",
      "sdpMLineIndex": 0,
      "usernameFragment": "abcdefgh"
    }, {
      "candidate": "...",
      "sdpMid": "data",
      "sdpMLineIndex": null, // Nil
      "usernameFragment": null // Nil
    },
    null // Nil
  ]
}

'handover' Message

Both clients SHALL send this message once the secure data channel dedicated for the signalling is open. However, the message MUST be sent over the WebSocket-based signalling channel.

A client who sends a 'handover' message SHALL NOT include any additional fields. After sending this message, the client MUST send further signalling messages over the new data channel based signalling channel only.

After a client has received a 'handover' message, it SHALL:

  • Validate that the negotiated handover parameter is true and otherwise treat this incident as a protocol error,
  • Receive incoming signalling messages over the new signalling channel only, and
  • In case it receives further signalling messages over the old signalling channel, treat this incident as a protocol error.

The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.

{
  "type": "handover"
}

'close' Message

The message itself and the client's behaviour is described in the SaltyRTC protocol specification. Once the signalling channel has been handed over to a secure data channel, sent and received 'close' messages SHALL trigger closing the underlying data channel used for signalling. The user application MAY continue using the RTCPeerConnection instance and its data channels. However, secure data channels MAY or MAY NOT be available once the signalling's data channel has been closed, depending on the flexibility of the client's implementation.

'application' Message

The message itself and the client's behaviour is described in the SaltyRTC protocol specification.