<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-murillo-whep-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="whep">WebRTC-HTTP egress protocol (WHEP)</title>
    <seriesInfo name="Internet-Draft" value="draft-murillo-whep-00"/>
    <author initials="S." surname="Murillo" fullname="Sergio Garcia Murillo">
      <organization>Millicast</organization>
      <address>
        <email>sergio.garcia.murillo@cosmosoftware.io</email>
      </address>
    </author>
    <author initials="C." surname="Chen" fullname="Cheng Chen">
      <organization>ByteDance</organization>
      <address>
        <email>webrtc@bytedance.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="25"/>
    <area>Security</area>
    <keyword>Internet-Draft WebRTC</keyword>
    <abstract>
      <t>This document describes a simple HTTP-based protocol that will allow WebRTC-based viewers to watch content from streaming services and/or Content Delivery Networks (CDNs) or WebRTC Transmission Network (WTNs).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The IETF RTCWEB working group standardized JSEP (<xref target="RFC8829"/>), a mechanism used to control the setup, management, and teardown of a multimedia session. It also describes how to negotiate media flows using the Offer/Answer Model with the Session Description Protocol (SDP) <xref target="RFC3264"/> as well as the formats for data sent over the wire (e.g., media types, codec parameters, and encryption). WebRTC intentionally does not specify a signaling transport protocol at application level. This flexibility has allowed the implementation of a wide range of services. However, those services are typically standalone silos which don't require interoperability with other services or leverage the existence of tools that can communicate with them.</t>
      <t>While some standard signaling protocols are available that can be integrated with WebRTC, like SIP <xref target="RFC3261"/> or XMPP <xref target="RFC6120"/>, they are not designed to be used in broadcasting/streaming services, and there also is no sign of adoption in that industry. RTSP <xref target="RFC7826"/>, which is based on RTP and may be the closest in terms of features to WebRTC, is not compatible with the SDP offer/answer model <xref target="RFC3264"/>.</t>
      <t>So, currently, there is no standard protocol designed for consuming media from streaming service using WebRTC.</t>
      <t>There are many situations in which the lack of a standard protocol for consuming media from streaming service using WebRTC has become a problem:</t>
      <ul spacing="normal">
        <li>Interoperability between WebRTC services and products.</li>
        <li>Reusing player software which can be integrated easily.</li>
        <li>Integration with Dynamic Adaptive Streaming over HTTP (DASH) for offering live streams via WebRTC while offering a time-shifted version via DASH.</li>
        <li>Playing WebRTC streams on devices that don't support custom javascript to be run (like TVs).</li>
      </ul>
      <t>This document mimics what has been done  the WebRTC HTTP Ingest Protocol (WHIP) <xref target="I-D.draft-ietf-wish-whip"/> for ingestion and specifies a simple HTTP-based protocol that can be used for consuming media from a streaming service using WebRTC.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>WHEP Player: WebRTC media player that acts as a client of the WHEP protocol by receiving and decoding the media from a remote Media Server.</li>
        <li>WHEP Endpoint: Egress server receiving the initial WHEP request.</li>
        <li>WHEP Endpoint URL: URL of the WHEP endpoint that will create the WHEP resource.</li>
        <li>Media Server: WebRTC Media Server or consumer that establishes the media session with the WHEP player and delivers the media to it.</li>
        <li>WHEP Resource: Allocated resource by the WHEP endpoint for an ongoing egress session that the WHEP player can send requests for altering the session (ICE operations or termination, for example).</li>
        <li>WHEP Resource URL: URL allocated to a specific media session by the WHEP endpoint which can be used to perform operations such as terminating the session or ICE restarts.</li>
      </ul>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>The WebRTC-HTTP Egress Protocol (WHEP) uses an HTTP POST request to perform a single-shot SDP offer/answer so an ICE/DTLS session can be established between the WHEP Player and the streaming service endpoint (Media Server).</t>
      <t>Once the ICE/DTLS session is set up, the media will flow unidirectionally from Media Server to the WHEP Player. In order to reduce complexity, no SDP renegotiation is supported, so no tracks or streams can be added or removed once the initial SDP offer/answer over HTTP is completed.</t>
      <figure>
        <name>WHEP session setup and teardown</name>
        <artwork><![CDATA[
                                                                               
 +-------------+    +---------------+ +--------------+ +---------------+
 | WHEP Player |    | WHEP Endpoint | | Media Server | | WHEP Resource |
 +--+----------+    +---------+-----+ +------+-------+ +--------|------+
    |                         |              |                  |       
    |                         |              |                  |       
    |HTTP POST (SDP Offer)    |              |                  |       
    +------------------------>+              |                  |       
    |201 Created (SDP answer) |              |                  |       
    +<------------------------+              |                  |       
    |          ICE REQUEST                   |                  |       
    +--------------------------------------->+                  |       
    |          ICE RESPONSE                  |                  |       
    |<---------------------------------------+                  |       
    |          DTLS SETUP                    |                  |       
    |<======================================>|                  |       
    |          RTP/RTCP FLOW                 |                  |       
    +<-------------------------------------->+                  |       
    | HTTP DELETE                                               |       
    +---------------------------------------------------------->+       
    | 200 OK                                                    |       
    <-----------------------------------------------------------x       
                                                                               
]]></artwork>
      </figure>
      <t>Alternatively, there are cases in which the WHEP Player may wish the service to provide the SDP offer (for example to avoid setting up an audio and video session when only audio is supported), so in this case the initial HTTP POST request will not contain a body and the response will contain the SDP offer from the service instead. The WHEP Player will have to provide the SDP answer in a subsequent HTTP PATCH request to the WHEP resource.</t>
      <figure>
        <name>WHEP session setup and teardown</name>
        <artwork><![CDATA[
                                                                               
 +-------------+    +---------------+ +--------------+ +---------------+
 | WHEP Player |    | WHEP Endpoint | | Media Server | | WHEP Resource |
 +--+----------+    +---------+-----+ +------+-------+ +--------|------+
    |                         |              |                  |       
    |                         |              |                  |       
    |HTTP POST (empty)        |              |                  |       
    +------------------------>+              |                  |       
    |201 Created (SDP offer)  |              |                  |       
    +<------------------------+              |                  | 
    | HTTP PATCH (SDP answer)                |                  |       
    +---------------------------------------------------------->+       
    | 200 OK                                 |                  |       
    <-----------------------------------------------------------x           
    |          ICE REQUEST                   |                  |       
    +--------------------------------------->+                  |       
    |          ICE RESPONSE                  |                  |       
    |<---------------------------------------+                  |       
    |          DTLS SETUP                    |                  |       
    |<======================================>|                  |       
    |          RTP/RTCP FLOW                 |                  |       
    +<-------------------------------------->+                  |       
    | HTTP DELETE                                               |       
    +---------------------------------------------------------->+       
    | 200 OK                                                    |       
    <-----------------------------------------------------------x       
                                                                               
]]></artwork>
      </figure>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="sdp-offer-generated-by-the-whep-player">
        <name>SDP offer generated by the WHEP player</name>
        <t>In order to set up a streaming session, the WHEP Player will generate an SDP offer according to the JSEP rules and perform an HTTP POST request to the configured WHEP Endpoint URL.</t>
        <t>The HTTP POST request will have a content type of "application/sdp" and contain the SDP offer as the body. The WHEP Endpoint will generate an SDP answer and return a "201 Created" response with a content type of "application/sdp", the SDP answer as the body, and a Location header field pointing to the newly created resource.</t>
        <t>The SDP offer <bcp14>SHOULD</bcp14> use the "recvonly" attribute and the SDP answer <bcp14>MUST</bcp14> use "sendonly" the attribute.</t>
        <figure>
          <name>HTTP POST and PATCH doing SDP O/A example</name>
          <artwork><![CDATA[
POST /whep/endpoint HTTP/1.1
Host: whep.example.com
Content-Type: application/sdp
Content-Length: 1326

v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=msid-semantic: WMS
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=recvonly
a=rtcp-mux
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

HTTP/1.1 201 Created
ETag: "38sdf4fdsf54:EsAw"
Content-Type: application/sdp
Content-Length: 1400
Location: https://whep.example.org/resource/id

v=0
o=- 1657793490019 1 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-lite
a=msid-semantic: WMS *
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=sendonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=sendonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
]]></artwork>
        </figure>
      </section>
      <section anchor="sdp-offer-generated-by-the-whep-endpoint">
        <name>SDP offer generated by the WHEP endpoint</name>
        <t>If the WHEP player prefers the WHEP Endpoint to generate the SDP offer, the WHEP Player will send a POST request without HTTP BODY and an Accept HTTP header of "application/sdp" to the configured WHEP endpoint URL.</t>
        <t>The WHEP Endpoint will generate an SDP offer according to the JSEP rules and return a "201 Created" response with a content type of "application/sdp", the SDP offer as the body, a Location header field pointing to the newly created resource and an Expire header indicating the maximum time that the WHEP player is allowed to send the SDP answer to the WHEP Resource.</t>
        <t>The WHEP Player <bcp14>MUST</bcp14> generate an SDP answer to SDP offer provided by the WHEP Endpoint and send an HTTP PATCH request to the URL provided in the Location header for the WHEP Resource. The HTTP PATCH request will have a content type of "application/sdp" and contain the SDP answer as the body. If the SDP offer is not accepted by the WHEP player, it <bcp14>MUST</bcp14> perform an HTTP DELETE operation for terminating the session to the WHEP Resource URL.</t>
        <t>The SDP offer <bcp14>SHOULD</bcp14> use the "sendonly" attribute and the SDP answer <bcp14>MUST</bcp14> use "recvonly" attribute in this case.</t>
        <figure>
          <name>HTTP POST and PATCH doing SDP O/A example</name>
          <artwork><![CDATA[
POST /whep/endpoint HTTP/1.1
Host: whep.example.com
Content-Length: 0
Accept: application/sdp

HTTP/1.1 201 Created
Content-Type: application/sdp
Content-Length: 1400
Location: https://whep.example.com/resource/id
Expires: Wed, 27 Jul 2022 07:28:00 GMT

v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=msid-semantic: WMS
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:zjkk
a=ice-pwd:bP+XJMM09aR8AiX1jdukzR6Y
a=ice-options:trickle
a=fingerprint:sha-256 DA:7B:57:DC:28:CE:04:4F:31:79:85:C4:31:67:EB:27:58:29:ED:77:2A:0D:24:AE:ED:AD:30:BC:BD:F1:9C:02
a=setup:actpass
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=sendonly
a=msid:- d46fb922-d52a-4e9c-aa87-444eadc1521b
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

PATCH /resource/id HTTP/1.1
Host: whep.example.com
Content-Type: application/sdp
Content-Length: 1326

v=0
o=- 1657793490019 1 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE 0 1
a=extmap-allow-mixed
a=ice-lite
a=msid-semantic: WMS *
m=audio 9 UDP/TLS/RTP/SAVPF 111
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:0
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:111 opus/48000/2
a=fmtp:111 minptime=10;useinbandfec=1
m=video 9 UDP/TLS/RTP/SAVPF 96 97
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:526be20a538ee422
a=ice-pwd:2e13dde17c1cb009202f627fab90cbec358d766d049c9697
a=fingerprint:sha-256 F7:EB:F3:3E:AC:D2:EA:A7:C1:EC:79:D9:B3:8A:35:DA:70:86:4F:46:D9:2D:CC:D0:BC:81:9F:67:EF:34:2E:BD
a=candidate:1 1 UDP 2130706431 198.51.100.1 39132 typ host
a=setup:passive
a=mid:1
a=bundle-only
a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid
a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id
a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id
a=recvonly
a=rtcp-mux
a=rtcp-rsize
a=rtpmap:96 VP8/90000
a=rtcp-fb:96 ccm fir
a=rtcp-fb:96 nack
a=rtcp-fb:96 nack pli
a=rtpmap:97 rtx/90000
a=fmtp:97 apt=96

HTTP/1.1 204 No Content
ETag: "38sdf4fdsf54:EsAw"
]]></artwork>
        </figure>
        <t>If the WHEP Resource does not receive an HTTP PATCH request before the time indicated in the Expire header HTTP POST response, it <bcp14>SHOULD</bcp14> delete the resource and respond with a 404 Not Found response to any request on the WHEP Resource URL received afterwards.</t>
      </section>
      <section anchor="common-procedures">
        <name>Common procedures</name>
        <t>The WHEP Resource COULD require a live publishing to be happening in order to allow a WHEP Players to start viewing a stream.
In that case, the WHEP Resource <bcp14>SHALL</bcp14> return a 409 Conflict response to the POST request issued by the WHEP Client with a Retry-After header indicating the number of seconds before sending a new request.
WHEP Players <bcp14>MAY</bcp14> periodically try to connect to the WHEP Resource with exponential backoff period with an initial value of the Retry-After header value in the 409 Conflict response.</t>
        <t>Once a session is set up, ICE consent freshness <xref target="RFC7675"/> will be used to detect abrupt disconnection and DTLS teardown for session termination by either side.</t>
        <t>To explicitly terminate a session, the WHEP Player <bcp14>MUST</bcp14> perform an HTTP DELETE request to the resource URL returned in the Location header field of the initial HTTP POST. Upon receiving the HTTP DELETE request, the WHEP resource will be removed and the resources freed on the Media Server, terminating the ICE and DTLS sessions.</t>
        <t>A Media Server terminating a session <bcp14>MUST</bcp14> follow the procedures in <xref target="RFC7675"/> section 5.2 for immediate revocation of consent.</t>
        <t>The WHEP Endpoints <bcp14>MUST</bcp14> return an HTTP 405 response for any HTTP GET, HEAD or PUT requests on the resource URL in order to reserve its usage for future versions of this protocol specification.</t>
        <t>The WHEP Resources <bcp14>MUST</bcp14> return an HTTP 405 response for any HTTP GET, HEAD, POST or PUT requests on the resource URL in order to reserve its usage for future versions of this protocol specification.</t>
      </section>
      <section anchor="ice-and-nat-support">
        <name>ICE and NAT support</name>
        <t>The SDP provided by the WHEP Player <bcp14>MAY</bcp14> be sent after the full ICE gathering is complete with the full list of ICE candidates, or it <bcp14>MAY</bcp14> only contain local candidates (or even an empty list of candidates).</t>
        <t>In order to simplify the protocol, there is no support for exchanging gathered trickle candidates from Media Server ICE candidates once the SDP answer is sent. The WHEP Endpoint <bcp14>SHALL</bcp14> gather all the ICE candidates for the Media Server before responding to the client request and the SDP answer <bcp14>SHALL</bcp14> contain the full list of ICE candidates of the Media Server. The Media Server <bcp14>MAY</bcp14> use ICE lite, while the WHEP player <bcp14>MUST</bcp14> implement full ICE.</t>
        <t>The WHEP Player <bcp14>MAY</bcp14> perform trickle ICE or ICE restarts <xref target="RFC8863"/> by sending an HTTP PATCH request to the WHEP resource URL with a body containing a SDP fragment with MIME type "application/trickle-ice-sdpfrag" as specified in <xref target="RFC8840"/>. When used for trickle ICE, the body of this PATCH message will contain the new ICE candidate; when used for ICE restarts, it will contain a new ICE ufrag/pwd pair.</t>
        <t>The WHEP Player <bcp14>MUST NOT</bcp14> send any ICE trickle or restart until the SDP O/A is completed. So, if the WHEP Player is not acting as offerer in the SDP O/A, it <bcp14>MUST NOT</bcp14> send any HTTP PATCH request for ICE trickle or restart until the 200 OK response to the HTTP PATCH request containing the SDP answer has been received.</t>
        <t>Trickle ICE and ICE restart support is <bcp14>OPTIONAL</bcp14> for a WHEP resource. If both Trickle ICE or ICE restarts are not supported by the WHEP resource, it <bcp14>MUST</bcp14> return a 405 Method Not Allowed response for any HTTP PATCH request. If the WHEP resource supports either Trickle ICE or ICE restarts, but not both, it <bcp14>MUST</bcp14> return a 501 Not Implemented for the HTTP PATCH requests that are not supported.</t>
        <t>As the HTTP PATCH request sent by a WHEP player may be received out-of-order by the WHEP Resource, the WHEP Resource <bcp14>MUST</bcp14> generate a
unique strong entity-tag identifying the ICE session as per <xref target="RFC9110"/> section 2.3. The initial value of the entity-tag identifying the initial ICE session <bcp14>MUST</bcp14> be returned in an ETag header field in the 201 response to the initial POST request to the WHEP Endpoint if the WHEP player is acting as SDP offerer, or in the HTTP PATCH response containing the SDP answer otherwise. It <bcp14>MUST</bcp14> also be returned in the 200 OK of any PATCH request that triggers an ICE restart.</t>
        <t>A WHEP Player sending a PATCH request for performing trickle ICE <bcp14>MUST</bcp14> include an "If-Match" header field with the latest known entity-tag as per <xref target="RFC9110"/> section 3.1. When the PATCH request is received by the WHEP resource, it <bcp14>MUST</bcp14> compare the indicated entity-tag value with the current entity-tag of the resource as per <xref target="RFC9110"/> section 3.1 and return a "412 Precondition Failed" response if they do not match.</t>
        <t>WHEP Players <bcp14>SHOULD NOT</bcp14> use entity-tag validation when matching a specific ICE session is not required, such as when initiating a DELETE request to terminate a session.</t>
        <t>A WHEP Resource receiving a PATCH request with new ICE candidates, but which does not perform an ICE restart, <bcp14>MUST</bcp14> return a "204 No Content" response without body. If the Media Server does not support a candidate transport or is not able to resolve the connection address, it <bcp14>MUST</bcp14> accept the HTTP request with the 204 response and silently discard the candidate.</t>
        <figure>
          <name>Trickle ICE request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whep.example.com
If-Match: "38sdf4fdsf54:EsAw"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 548

a=ice-ufrag:EsAw
a=ice-pwd:P2uYro0UCOQ4zxjKXaWCBui1
m=audio RTP/AVP 0
a=mid:0
a=candidate:1387637174 1 udp 2122260223 192.0.2.1 61764 typ host generation 0 ufrag EsAw network-id 1
a=candidate:3471623853 1 udp 2122194687 198.51.100.1 61765 typ host generation 0 ufrag EsAw network-id 2
a=candidate:473322822 1 tcp 1518280447 192.0.2.1 9 typ host tcptype active generation 0 ufrag EsAw network-id 1
a=candidate:2154773085 1 tcp 1518214911 198.51.100.2 9 typ host tcptype active generation 0 ufrag EsAw network-id 2
a=end-of-candidates

HTTP/1.1 204 No Content
]]></artwork>
        </figure>
        <t>A WHEP Player sending a PATCH request for performing ICE restart <bcp14>MUST</bcp14> contain an "If-Match" header field with a field-value "*" as per <xref target="RFC9110"/> section 3.1.</t>
        <t>If the HTTP PATCH request results in an ICE restart, the WHEP resource <bcp14>SHALL</bcp14> return a "200 OK" with an "application/trickle-ice-sdpfrag" body containing the new ICE username fragment and password. The response may optionally contain the new set of ICE candidates for the Media Server and the new entity-tag correspond to the new ICE session in an ETag response header field.</t>
        <t>If the ICE request cannot be satisfied by the WHEP Resource, the WHEP Resource <bcp14>MUST</bcp14> return an appropriate HTTP error code and <bcp14>MUST NOT</bcp14> terminate the session immediately. The WHEP Player <bcp14>MAY</bcp14> retry performing a new ICE restart or terminate the session by issuing an HTTP DELETE request instead. In either case, the session <bcp14>MUST</bcp14> be terminated if the ICE consent expires as a consequence of the failed ICE restart as per <xref target="RFC7675"/> section 5.1.</t>
        <figure>
          <name>ICE restart request</name>
          <artwork><![CDATA[
PATCH /resource/id HTTP/1.1
Host: whep.example.com
If-Match: "*"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 54

a=ice-ufrag:ysXw
a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k

HTTP/1.1 200 OK
ETag: "289b31b754eaa438:ysXw"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 102

a=ice-lite
a=ice-ufrag:289b31b754eaa438
a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
]]></artwork>
        </figure>
        <t>Because the WHEP Player needs to know the entity-tag associated with the ICE session in order to send new ICE candidates, it <bcp14>MUST</bcp14> buffer any gathered candidates before it receives the HTTP response to the initial POST request or the PATCH request with the new entity-tag value. Once it knows the entity-tag value, the WHEP Player <bcp14>SHOULD</bcp14> send a single aggregated HTTP PATCH request with all the ICE candidates it has buffered so far.</t>
        <t>In case of unstable network conditions, the ICE restart HTTP PATCH requests and responses might be received out of order. In order to mitigate this scenario, when the client performs an ICE restart, it <bcp14>MUST</bcp14> discard any previous ice username/pwd frags and ignore any further HTTP PATCH response received from a pending HTTP PATCH request. Clients <bcp14>MUST</bcp14> apply only the ICE information received in the response to the last sent request. If there is a mismatch between the ICE information at the client and at the server (because of an out-of-order request), the STUN requests will contain invalid ICE information and will be rejected by the server. When this situation is detected by the WHEP Player, it <bcp14>SHOULD</bcp14> send a new ICE restart request to the server.</t>
      </section>
      <section anchor="webrtc-constraints">
        <name>WebRTC constraints</name>
        <t>In the specific case of media consumption from a streaming service, some assumptions can be made about the server-side which simplifies the WebRTC compliance burden, as detailed in WebRTC-gateway document <xref target="I-D.draft-ietf-rtcweb-gateways"/>.</t>
        <t>In order to reduce the complexity of implementing WHEP in both players and Media Servers, WHEP imposes the following restrictions regarding WebRTC usage:</t>
        <t>Both the WHEP Player and the WHEP Endpoint <bcp14>SHALL</bcp14> use SDP bundle <xref target="RFC9143"/>. Each "m=" section <bcp14>MUST</bcp14> be part of a single BUNDLE group. Hence, when a WHEP Player or a  WHEP Endpoints sends an SDP offer, it <bcp14>MUST</bcp14> include a "bundle-only" attribute in each bundled "m=" section. The WHEP player and the Media Server <bcp14>MUST</bcp14> support multiplexed media associated with the BUNDLE group as per <xref target="RFC9143"/> section 9. In addition, per <xref target="RFC9143"/> the WHEP Player and Media Server will use RTP/RTCP multiplexing for all bundled media. The WHEP Player and Media Server <bcp14>SHOULD</bcp14> include the "rtcp-mux-only" attribute in each bundled "m=" section.</t>
        <t>As the codecs for a given stream may not be known by the Media Server when the WHEP Player starts watching a stream, if the WHEP Endpoint is acting as SDP answerer, it <bcp14>MUST</bcp14> include all the offered codecs that it supports in the SDP answer and not make any assumption about which will be the codec that will be actually sent.</t>
        <t>Trickle ICE and ICE restarts support is <bcp14>OPTIONAL</bcp14> for both the WHEP Players and Media Servers as explained in section 4.1.</t>
      </section>
      <section anchor="load-balancing-and-redirections">
        <name>Load balancing and redirections</name>
        <t>WHEP Endpoints and Media Servers might not be co-located on the same server, so it is possible to load balance incoming requests to different Media Servers. WHEP Players <bcp14>SHALL</bcp14> support HTTP redirection via the "307 Temporary Redirect response code" as described in <xref target="RFC9110"/> section 6.4.7. The WHEP Resource URL <bcp14>MUST</bcp14> be a final one, and redirections are not required to be supported for the PATCH and DELETE requests sent to it.</t>
        <t>In case of high load, the WHEP endpoints <bcp14>MAY</bcp14> return a 503 (Service Unavailable) status code indicating that the server is currently unable to handle the request due to a temporary overload or scheduled maintenance, which will likely be alleviated after some delay. The WHEP Endpoint might send a Retry-After header field indicating the minimum time that the user agent ought to wait before making a follow-up request.</t>
      </section>
      <section anchor="stunturn-server-configuration">
        <name>STUN/TURN server configuration</name>
        <t>The WHEP Endpoint <bcp14>MAY</bcp14> return STUN/TURN server configuration URLs and credentials usable by the client in the "201 Created" response to the HTTP POST request to the WHEP Endpoint URL.</t>
        <t>Each STUN/TURN server will be returned using the "Link" header field <xref target="RFC8288"/> with a "rel" attribute value of "ice-server" as specified in <xref target="I-D.draft-ietf-wish-whip"/></t>
        <t>It might be also possible to configure the STUN/TURN server URLs with long-term credentials provided by either the broadcasting service or an external TURN provider on the WHEP Player, overriding the values provided by the WHEP Endpoint.</t>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and authorization</name>
        <t>WHEP Endpoints and Resources <bcp14>MAY</bcp14> require the HTTP request to be authenticated using an HTTP Authorization header field with a Bearer token as specified in <xref target="RFC6750"/> section 2.1. WHEP players <bcp14>MUST</bcp14> implement this authentication and authorization mechanism and send the HTTP Authorization header field in all HTTP requests sent to either the WHEP endpoint or resource except the preflight OPTIONS requests for CORS.</t>
        <t>The nature, syntax, and semantics of the bearer token, as well as how to distribute it to the client, is outside the scope of this document. Some examples of the kind of tokens that could be used are, but are not limited to, JWT tokens as per <xref target="RFC6750"/> and <xref target="RFC8725"/> or a shared secret stored on a database.</t>
        <t>WHEP Endpoints and Resources could perform the authentication and authorization by encoding an authentication token within the URLs for the WHEP Endpoints or Resources instead. In case the WHEP Player is not configured to use a bearer token, the HTTP Authorization header field must not be sent in any request.</t>
      </section>
      <section anchor="protocol-extensions">
        <name>Protocol extensions</name>
        <t>In order to support future extensions to be defined for the WHEP protocol, a common procedure for registering and announcing the new extensions is defined.</t>
        <t>Protocol extensions supported by the WHEP server <bcp14>MUST</bcp14> be advertised to the WHEP Player in the "201 Created" response to the initial HTTP POST request sent to the WHEP Endpoint. The WHEP Endpoint <bcp14>MUST</bcp14> return one "Link" header field for each extension, with the extension "rel" type attribute and the URI for the HTTP resource that will be available for receiving requests related to that extension.</t>
        <t>Protocol extensions are optional for both WHEP Players and WHEP Endpoints and Resources. WHEP Players <bcp14>MUST</bcp14> ignore any Link attribute with an unknown "rel" attribute value and WHEP Endpoints and Resources <bcp14>MUST NOT</bcp14> require the usage of any of the extensions.</t>
        <t>Each protocol extension <bcp14>MUST</bcp14> register a unique "rel" attribute value at IANA starting with the prefix: "urn:ietf:params:whep:ext" as specified in <xref target="urn-whep-subspace"/>.</t>
        <t>For example, considering a potential extension of server-to-client communication using server-sent events as specified in https://html.spec.whatwg.org/multipage/server-sent-events.html#server-sent-events, the URL for connecting to the server side event resource for the published stream could be returned in the initial HTTP "201 Created" response with a "Link" header field and a "rel" attribute of "urn:ietf:params:whep:ext:example:server-sent-events". (This document does not specify such an extension, and uses it only as an example.)</t>
        <t>In this theoretical case, the HTTP 201 response to the HTTP POST request would look like:</t>
        <artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/sdp
Location: https://whep.example.org/resource/id
Link: <https://whep.ietf.org/publications/213786HF/sse>;
      rel="urn:ietf:params:whep:ext:example:server-side-events"
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>HTTPS <bcp14>SHALL</bcp14> be used in order to preserve the WebRTC security model.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This specification adds a registry for URN sub-namespaces for WHEP protocol extensions.</t>
      <section anchor="registration-of-whep-urn-sub-namespace-and-whep-registry">
        <name>Registration of WHEP URN Sub-namespace and whep Registry</name>
        <t>IANA has added an entry to the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers" registry and created a sub-namespace for the Registered Parameter Identifier as per <xref target="RFC3553"/>: "urn:ietf:params:whep".</t>
        <t>To manage this sub-namespace, IANA has created the "System for Cross-domain Identity Management (WHEP) Schema URIs" registry, which is used to manage entries within the "urn:ietf:params:whep" namespace.  The registry description is as follows:</t>
        <ul spacing="normal">
          <li>Registry name: WHEP</li>
          <li>Specification: this document (RFC TBD)</li>
          <li>Repository: See Section <xref target="urn-whep-subspace"/></li>
          <li>Index value: See Section <xref target="urn-whep-subspace"/></li>
        </ul>
      </section>
      <section anchor="urn-whep-subspace">
        <name>URN Sub-namespace for whep</name>
        <t>whep Endpoint utilize URIs to identify the supported whep protocol extensions on the "rel" attribute of the Link header as defined in <xref target="protocol-extensions"/>.
This section creates and registers an IETF URN Sub-namespace for use in the whep specifications and future extensions.</t>
        <section anchor="specification-template">
          <name>Specification Template</name>
          <t>Namespace ID:</t>
          <artwork><![CDATA[
  The Namespace ID "whep" has been assigned.
]]></artwork>
          <t>Registration Information:</t>
          <artwork><![CDATA[
  Version: 1

  Date: TBD
]]></artwork>
          <t>Declared registrant of the namespace:</t>
          <artwork><![CDATA[
  The Internet Engineering Task Force.
]]></artwork>
          <t>Designated contact:</t>
          <artwork><![CDATA[
   A designated expert will monitor the whep public mailing list, "wish@ietf.org".
]]></artwork>
          <t>Declaration of Syntactic Structure:</t>
          <artwork><![CDATA[
  The Namespace Specific String (NSS) of all URNs that use the "whep" Namespace ID shall have the following structure: urn:ietf:params:whep:{type}:{name}:{other}

  The keywords have the following meaning:

  - type: The entity type. This specification only defines the "ext" type.

  - name: A required US-ASCII string that conforms to the URN syntax requirements (see {{RFC8141}}) and defines a major namespace of a whep protocol extension. The value MAY also be an industry name or organization name.

  - other: Any US-ASCII string that conforms to the URN syntax requirements (see {{RFC8141}}) and defines the sub-namespace (which MAY be further broken down in namespaces delimited by colons) as needed to uniquely identify an whep protocol extension.
]]></artwork>
          <t>Relevant Ancillary Documentation:</t>
          <artwork><![CDATA[
  None
]]></artwork>
          <t>Identifier Uniqueness Considerations:</t>
          <artwork><![CDATA[
  The designated contact shall be responsible for reviewing and enforcing uniqueness.
]]></artwork>
          <t>Identifier Persistence Considerations:</t>
          <artwork><![CDATA[
  Once a name has been allocated, it MUST NOT be reallocated for a different purpose.
  The rules provided for assignments of values within a sub-namespace MUST be constructed so that the meanings of values cannot change.
  This registration mechanism is not appropriate for naming values whose meanings may change over time.
]]></artwork>
          <t>Process of Identifier Assignment:</t>
          <artwork><![CDATA[
  Namespace with type "ext" (e.g., "urn:ietf:params:whep:ext") is reserved for IETF-approved whep specifications.
]]></artwork>
          <t>Process of Identifier Resolution:</t>
          <artwork><![CDATA[
  None specified.
]]></artwork>
          <t>Rules for Lexical Equivalence:</t>
          <artwork><![CDATA[
  No special considerations; the rules for lexical equivalence specified in {{RFC8141}} apply.
]]></artwork>
          <t>Conformance with URN Syntax:</t>
          <artwork><![CDATA[
  No special considerations.
]]></artwork>
          <t>Validation Mechanism:</t>
          <artwork><![CDATA[
  None specified.
]]></artwork>
          <t>Scope:</t>
          <artwork><![CDATA[
  Global.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8829" target="https://www.rfc-editor.org/info/rfc8829">
          <front>
            <title>JavaScript Session Establishment Protocol (JSEP)</title>
            <author fullname="J. Uberti" initials="J." surname="Uberti">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document describes the mechanisms for allowing a JavaScript application to control the signaling plane of a multimedia session via the interface specified in the W3C RTCPeerConnection API and discusses how this relates to existing signaling protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8829"/>
          <seriesInfo name="DOI" value="10.17487/RFC8829"/>
        </reference>
        <reference anchor="RFC3264" target="https://www.rfc-editor.org/info/rfc3264">
          <front>
            <title>An Offer/Answer Model with Session Description Protocol (SDP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
              <organization/>
            </author>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document defines a mechanism by which two entities can make use of the Session Description Protocol (SDP) to arrive at a common view of a multimedia session between them.  In the model, one participant offers the other a description of the desired session from their perspective, and the other participant answers with the desired session from their perspective.  This offer/answer model is most useful in unicast sessions where information from both participants is needed for the complete view of the session.  The offer/answer model is used by protocols like the Session Initiation Protocol (SIP).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3264"/>
          <seriesInfo name="DOI" value="10.17487/RFC3264"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7675" target="https://www.rfc-editor.org/info/rfc7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="RFC8863" target="https://www.rfc-editor.org/info/rfc8863">
          <front>
            <title>Interactive Connectivity Establishment Patiently Awaiting Connectivity (ICE PAC)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <author fullname="J. Uberti" initials="J." surname="Uberti">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>During the process of establishing peer-to-peer connectivity, Interactive Connectivity Establishment (ICE) agents can encounter situations where they have no candidate pairs to check, and, as a result, conclude that ICE processing has failed. However, because additional candidate pairs can be discovered during ICE processing, declaring failure at this point may be premature. This document discusses when these situations can occur. </t>
              <t>This document updates RFCs 8445 and 8838 by requiring that an ICE agent wait a minimum amount of time before declaring ICE failure, even if there are no candidate pairs left to check.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8863"/>
          <seriesInfo name="DOI" value="10.17487/RFC8863"/>
        </reference>
        <reference anchor="RFC8840" target="https://www.rfc-editor.org/info/rfc8840">
          <front>
            <title>A Session Initiation Protocol (SIP) Usage for Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (Trickle ICE)</title>
            <author fullname="E. Ivov" initials="E." surname="Ivov">
              <organization/>
            </author>
            <author fullname="T. Stach" initials="T." surname="Stach">
              <organization/>
            </author>
            <author fullname="E. Marocco" initials="E." surname="Marocco">
              <organization/>
            </author>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>The Interactive Connectivity Establishment (ICE) protocol describes a Network Address Translator (NAT) traversal mechanism for UDP-based multimedia sessions established with the Offer/Answer model. The ICE extension for Incremental Provisioning of Candidates (Trickle ICE) defines a mechanism that allows ICE Agents to shorten session establishment delays by making the candidate gathering and connectivity checking phases of ICE non-blocking and by executing them in parallel. </t>
              <t>This document defines usage semantics for Trickle ICE with the Session Initiation Protocol (SIP).  The document also defines a new SIP Info Package to support this usage together with the corresponding media type.  Additionally, a new Session Description Protocol (SDP) "end-of-candidates" attribute and a new SIP option tag "trickle-ice" are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8840"/>
          <seriesInfo name="DOI" value="10.17487/RFC8840"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9143" target="https://www.rfc-editor.org/info/rfc9143">
          <front>
            <title>Negotiating Media Multiplexing Using the Session Description Protocol (SDP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg">
              <organization/>
            </author>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
              <organization/>
            </author>
            <author fullname="C. Jennings" initials="C." surname="Jennings">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a "BUNDLE transport", and the media is referred to as "bundled media". The "m=" sections that use the BUNDLE transport form a BUNDLE group. </t>
              <t>This specification defines a new RTP Control Protocol (RTCP) Source Description (SDES) item and a new RTP header extension.</t>
              <t>This specification updates RFCs 3264, 5888, and 7941. </t>
              <t>This specification obsoletes RFC 8843.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9143"/>
          <seriesInfo name="DOI" value="10.17487/RFC9143"/>
        </reference>
        <reference anchor="RFC8288" target="https://www.rfc-editor.org/info/rfc8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC6750" target="https://www.rfc-editor.org/info/rfc6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources.  Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key).  To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Hardt" initials="D." surname="Hardt">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC3553" target="https://www.rfc-editor.org/info/rfc3553">
          <front>
            <title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="T. Hardie" initials="T." surname="Hardie">
              <organization/>
            </author>
            <author fullname="G. Klyne" initials="G." surname="Klyne">
              <organization/>
            </author>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items.  The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="73"/>
          <seriesInfo name="RFC" value="3553"/>
          <seriesInfo name="DOI" value="10.17487/RFC3553"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3261" target="https://www.rfc-editor.org/info/rfc3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg">
              <organization/>
            </author>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo">
              <organization/>
            </author>
            <author fullname="A. Johnston" initials="A." surname="Johnston">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="R. Sparks" initials="R." surname="Sparks">
              <organization/>
            </author>
            <author fullname="M. Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <author fullname="E. Schooler" initials="E." surname="Schooler">
              <organization/>
            </author>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC6120" target="https://www.rfc-editor.org/info/rfc6120">
          <front>
            <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6120"/>
          <seriesInfo name="DOI" value="10.17487/RFC6120"/>
        </reference>
        <reference anchor="RFC7826" target="https://www.rfc-editor.org/info/rfc7826">
          <front>
            <title>Real-Time Streaming Protocol Version 2.0</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne">
              <organization/>
            </author>
            <author fullname="A. Rao" initials="A." surname="Rao">
              <organization/>
            </author>
            <author fullname="R. Lanphier" initials="R." surname="Lanphier">
              <organization/>
            </author>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund">
              <organization/>
            </author>
            <author fullname="M. Stiemerling" initials="M." role="editor" surname="Stiemerling">
              <organization/>
            </author>
            <date month="December" year="2016"/>
            <abstract>
              <t>This memorandum defines the Real-Time Streaming Protocol (RTSP) version 2.0, which obsoletes RTSP version 1.0 defined in RFC 2326.</t>
              <t>RTSP is an application-layer protocol for the setup and control of the delivery of data with real-time properties.  RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video.  Sources of data can include both live data feeds and stored clips.  This protocol is intended to control multiple data delivery sessions; provide a means for choosing delivery channels such as UDP, multicast UDP, and TCP; and provide a means for choosing delivery mechanisms based upon RTP (RFC 3550).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7826"/>
          <seriesInfo name="DOI" value="10.17487/RFC7826"/>
        </reference>
        <reference anchor="I-D.draft-ietf-wish-whip" target="https://www.ietf.org/archive/id/draft-ietf-wish-whip-04.txt">
          <front>
            <title>WebRTC-HTTP ingestion protocol (WHIP)</title>
            <author fullname="Sergio Garcia Murillo">
              <organization>Millicast</organization>
            </author>
            <author fullname="Alexandre Gouaillard">
              <organization>CoSMo Software</organization>
            </author>
            <date day="25" month="July" year="2022"/>
            <abstract>
              <t>   This document describes a simple HTTP-based protocol that will allow
   WebRTC-based ingestion of content into streaming services and/or
   CDNs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wish-whip-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rtcweb-gateways" target="https://www.ietf.org/archive/id/draft-ietf-rtcweb-gateways-02.txt">
          <front>
            <title>WebRTC Gateways</title>
            <author fullname="Harald Alvestrand">
	 </author>
            <author fullname="Uwe Rauschenbach">
	 </author>
            <date day="21" month="January" year="2016"/>
            <abstract>
              <t>   This document describes interoperability considerations for a class
   of WebRTC-compatible endpoints called "WebRTC gateways", which
   interconnect between WebRTC endpoints and devices that are not WebRTC
   endpoints.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtcweb-gateways-02"/>
        </reference>
        <reference anchor="RFC8141" target="https://www.rfc-editor.org/info/rfc8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier.  With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance.  With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA).  This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
