This task uses the end-to-end encryption techniques of SaltyRTC to set up a secure WebRTC peer-to-peer connection. It also adds another security layer for data channels that are available to users. The signalling channel will persist and should be handed over to a dedicated data channel once the peer-to-peer connection has been set up. Therefore, further signalling communication between the peers may not require a dedicated WebSocket connection over a SaltyRTC server.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
All terms from the SaltyRTC protocol specification are valid in this document. Furthermore, this document will reference API parts of the WebRTC specification.
The SaltyRTC chunking specification makes it possible to split a message into chunks and reassemble the message on the receiver's side while allowing any combination of ordered/unordered and reliable/unreliable transport channel underneath.
This protocol adds another security layer for WebRTC data channels as we want our protocol to sustain broken (D)TLS environments. A data channel that uses this security layer will be called Secure Data Channel. Note that the user MAY or MAY NOT choose to use secure data channels for its purpose. However, the handed over signalling channel MUST use a secure data channel.
The following protocol name SHALL be used for task negotiation:
v1.webrtc.tasks.saltyrtc.org
This task makes use of the data field of the 'auth' messages described in the SaltyRTC protocol specification. The Outgoing section describes what the data of this task SHALL contain and how it MUST be generated. Whereas the Incoming section describes how the task's data from the other client's 'auth' message MUST be validated and potentially stored.
The task's data SHALL be a Map
containing the following items:
- The exclude field MUST contain an
Array
of WebRTC data channel ids (non-negative integers less than65535
) that SHALL not be used for the signalling channel. ThisArray
MUST be available to be set from user applications that use pre-negotiated data channel ids. - The handover field SHALL be set to
true
unless the user application explicitly requested to turn off the handover feature in which case it SHALL be set tofalse
.
A client who receives the task's data from the remote peer MUST do the following checks:
- The exclude field MUST contain an
Array
of WebRTC data channel IDs (non-negative integers less than65535
) that SHALL not be used for the signalling channel. The client SHALL store this list for usage during handover. - The handover field MUST be either
true
orfalse
. If both client's values aretrue
, the negotiated value istrue
. In any other case, the negotiated value isfalse
and a handover requested by the user application SHALL be rejected (see the Signalling Channel Handover section for details).
This protocol adds another security layer to WebRTC's data channels which the handed over signalling channel SHALL use. It MUST be possible for the user application to utilise this security layer for further data channels. The secure data channel MUST use NaCl for encryption/decryption of messages.
Outgoing messages MUST be processed and encrypted by following the Sending a Secure Data Channel Message section.
Incoming messages MUST be processed and decrypted by following the Receiving a Secure Data Channel Message section.
As described in the Sending a Secure Data Channel Message and the Receiving a Secure Data Channel Message section, each new secure data channel instance is being treated as a distinct remote peer from the nonce's perspective and independent of the underlying data channel id. To prevent nonce reuse, it is absolutely vital that each secure data channel instance has its own cookie, sequence number and overflow number, each for incoming and outgoing messages. Both clients SHALL use cryptographically secure random numbers for generating the cookie and the sequence number.
If the negotiated handover parameter is true
, the user application
SHOULD initiate the handover process:
- The client creates a new data channel on the
RTCPeerConnection
instance with theRTCDataChannelInit
object containing only the following values:- ordered SHALL be set to
true
, - protocol SHALL be set to the same subprotocol that has been negotiated with the server,
- negotiated MUST be set to
true
, and - id SHALL be set to the lowest possible number, starting from
0
, that is not excluded by both clients as negotiated.
- ordered SHALL be set to
- The newly created
RTCDataChannel
instance SHALL be secured by following the Secure Data Channel section. - As soon as the data channel is
open
, the client SHALL send a 'handover' message on the WebSocket-based signalling channel (WS channel) to the other client. Subsequent outgoing messages MUST be sent over the data channel based signalling channel (DC channel). Incoming messages on the DC channel MUST be buffered. Incoming messages on the WS channel SHALL be accepted until a 'handover' message has been received on the WS channel. Once that message has been received, the client SHALL process the buffered messages from the DC channel. Subsequent signalling messages SHALL ONLY be accepted over the DC channel. - After both clients have sent each other 'handover' messages, the
client closes the connection to the server with a close code of
3003
(Handover of the Signalling Channel).
If the RTCDataChannel
does not change its state to open
, the client
SHALL continue using the WebSocket-based signalling channel.
Before the signalling channel handover takes place, the same message structure as defined in the SaltyRTC protocol specification SHALL be used.
For all messages that are being exchanged over secure data channels (such as the handed over signalling channel), the nonce/header MUST be slightly changed:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Cookie |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Channel ID | Overflow Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Data Channel ID: 2 byte
Contains the data channel id of the data channel that is being used for a message.
The cookie field remains the same as in the SaltyRTC protocol specification. Each new secure data channel SHALL have a new cryptographically secure random cookie, one for incoming messages and one for outgoing messages.
Overflow Number and Sequence Number SHALL remain the same as in the SaltyRTC protocol specification. Each new secure data channel instance SHALL have its own overflow number and sequence number, each for outgoing and incoming messages.
Note that the Source and Destination fields have been replaced by the Data Channel ID field. As there can be only communication between the peers that set up the peer-to-peer connection, dedicated addresses are no longer required.
The same procedure as described in the SaltyRTC protocol specification SHALL be followed. However, for all messages that are being exchanged over secure data channels, the following changes MUST be applied:
- Each data channel instance SHALL have its own cookie, overflow number and sequence number for outgoing messages.
- Source and destination addresses SHALL NOT be set, instead
- The data channel id MUST be set to the id of the data channel the message will be sent on.
For the handed over
signalling channel, the encrypted message MUST be fragmented into
chunks using
SaltyRTC chunking
in unreliable/unordered mode (for legacy reasons) after encryption.
The chunk size MUST be less or equal to the maxMessageSize
value of the
RTCPeerConnection
's RTCSctpTransport
.
For the handed over signalling channel, the encrypted message MUST be reassembled into a complete signalling message using SaltyRTC chunking in unreliable/unordered mode (for legacy reasons) before decryption.
The same procedure as described in the SaltyRTC protocol specification SHALL be followed. However, for all messages that are being exchanged over secure data channels, the following changes MUST be applied:
- Each data channel instance SHALL have its own cookie, overflow number and sequence number for incoming messages.
- Source and destination addresses are not present in the secure data channel's nonce/header.
- Overflow number and sequence number SHALL NOT be validated to ensure unordered and unreliable secure data channels can function properly. However, a client SHOULD check that two consecutive incoming messages of the same data channel do not have the exact same overflow and sequence number.
- A client MUST check that the data channel id field matches the data channel's id the message has been received on.
The following messages are new messages that will be exchanged between two clients (initiator and responder) over the signalling channel. Note that the signalling channel may be handed over to a data channel any time which is RECOMMENDED to be supported by the implementation. Furthermore, the handed over signalling channel MUST support all existing client-to-client message types.
Other messages, general behaviour and error handling for client-to-client messages is described in the SaltyRTC protocol specification.
+----------+ +------------------------------+
| v | |
+----+----------+----+-----+ v
| offer / answer | +----------+ +---+---+
--->+ candidates / application +--->+ handover +--->+ close |
+--------------------------+ +-----+----+ +---+---+
| ^
v |
+--------------------+-----+ |
| offer / answer +-------+
| candidates / application |
+-----+--------------+-----+
| ^
+--------------+
Initiator Responder
| |
| offer |
|------------------------------>|
| answer |
|<------------------------------|
| candidates (n times) |
|<----------------------------->|
| handover |
|------------------------------>|
| handover |
|<------------------------------|
| candidates (m times) |
|<----------------------------->|
| close |
|<----------------------------->|
| |
At any time, the initiator MAY send an 'offer' message to the responder.
The initiator MUST set the offer field to the Map
of its WebRTC
RTCPeerConnection
's local description the user application has
generated with calling createOffer
on the RTCPeerConnection
instance. The offer field SHALL be a Map
and MUST contain:
- The type field containing a valid
RTCSdpType
in string representation. - The sdp field containing a blob of SDP data in string
representation. If the type field is
rollback
, the field MAY be omitted.
The responder SHALL validate that the offer field is a Map
containing the above mentioned fields and value types. It SHALL continue
by requesting the user application to set the value of that field as the
WebRTC RTCPeerConnection
's remote description and creating an answer.
The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.
{
"type": "offer",
"offer": {
"type": "offer",
"sdp": "..."
}
}
Once the user application of the responder has set the remote
description on its WebRTC RTCPeerConnection
instance and generated an
answer by calling createAnswer
on the instance, the user application
SHALL request sending an 'answer' message. The answer field SHALL be a
Map
and MUST contain:
- The type field containing a valid
RTCSdpType
in string representation. - The sdp field containing a blob of SDP data in string
representation. If the type field is
rollback
, the field MAY be omitted.
The initiator SHALL validate that the answer field is a Map
containing the above mentioned fields and value types. It SHALL continue
by requesting the user application to set the value of that field as the
WebRTC RTCPeerConnection
's remote description.
The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.
{
"type": "answer",
"answer": {
"type": "answer",
"sdp": "..."
}
}
Both clients MAY send ICE candidates at any time to each other. Clients SHOULD bundle available candidates.
A client who sends an ICE candidate SHALL set the candidates field to
an Array
. Elements of this array SHALL either be Nil
or a Map
containing the following fields:
- The candidate field SHALL contain an SDP
candidate-attribute
or an empty string as defined in the WebRTC specification in string representation. - The sdpMid field SHALL contain the media stream identification
as defined in the WebRTC specification in string representation or
Nil
. - The sdpMLineIndex field SHALL contain the index of the media
description the candidate is associated with as described in the
WebRTC specification. It's value SHALL be either an unsigned integer
(16 bits) or
Nil
. - The usernameFragment field SHALL contain the ICE user fragment as
defined in the WebRTC specification in string representation or
Nil
.
(Note: The naming is inconsistent with the rest of the protocol,
since it uses camelCase keys instead of under_scores. The reason for
this is ease of use in browser implementations: When using camelCase
each candidates
entry can be passed directly to the JavaScript WebRTC
implementation.)
The receiving client SHALL validate that the candidates field is an
Array
containing one or more Map
s. These Map
s SHALL contain the
above mentioned fields value types. It SHALL continue by requesting the
user application to add the value of each item in the Array
as a
remote candidate to its WebRTC RTCPeerConnection
instance.
The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.
{
"type": "candidates",
"candidates": [
{
"candidate": "...",
"sdpMid": "data",
"sdpMLineIndex": 0,
"usernameFragment": "abcdefgh"
}, {
"candidate": "...",
"sdpMid": "data",
"sdpMLineIndex": null, // Nil
"usernameFragment": null // Nil
},
null // Nil
]
}
Both clients SHALL send this message once the secure data channel
dedicated for the signalling is open
. However, the message MUST be
sent over the WebSocket-based signalling channel.
A client who sends a 'handover' message SHALL NOT include any additional fields. After sending this message, the client MUST send further signalling messages over the new data channel based signalling channel only.
After a client has received a 'handover' message, it SHALL:
- Validate that the negotiated handover parameter is
true
and otherwise treat this incident as a protocol error, - Receive incoming signalling messages over the new signalling channel only, and
- In case it receives further signalling messages over the old signalling channel, treat this incident as a protocol error.
The message SHALL be NaCl public-key encrypted by the client's session key pair and the other client's session key pair.
{
"type": "handover"
}
The message itself and the client's behaviour is described in the
SaltyRTC protocol specification. Once the
signalling channel has been handed over to a secure data channel, sent
and received 'close' messages SHALL trigger closing the underlying data
channel used for signalling. The user application MAY continue using the
RTCPeerConnection
instance and its data channels. However, secure
data channels MAY or MAY NOT be available once the signalling's data
channel has been closed, depending on the flexibility of the client's
implementation.
The message itself and the client's behaviour is described in the SaltyRTC protocol specification.