You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is this consideration that makes an automatic, public key-based key exchange mechanism imperative for WebRTC (this is a good idea for any communications security system), and this mechanism SHOULD provide Forward Secrecy (FS). The signaling channel/calling service can be used to authenticate this mechanism.
Implementations MUST favor cipher suites which support Forward Secrecy (FS) over non-FS cipher suites and SHOULD favor Authenticated Encryption with Associated Data (AEAD) over non-AEAD cipher suites. .
The text was updated successfully, but these errors were encountered:
Spinoff of #2215.
Is there any need for cryptographic requirements for WebRTC channels?
Possible topics:
I would not expect much verification would be needed in practice. Maybe when a backend server acts as a WebRTC peer?
References
WebRTC requires Perfect Forward Secrecy (PFS) starting in Firefox 38 indicates that forward secrecy was not always enabled.
WebRTC Security: What You Need to Know in 2021 seems to imply that it is (was) not always automatic.
RFC8826:
RFC8827:
The text was updated successfully, but these errors were encountered: