summaryrefslogtreecommitdiff
path: root/rfc/rfc5389.txt
diff options
context:
space:
mode:
Diffstat (limited to 'rfc/rfc5389.txt')
-rw-r--r--rfc/rfc5389.txt2859
1 files changed, 2859 insertions, 0 deletions
diff --git a/rfc/rfc5389.txt b/rfc/rfc5389.txt
new file mode 100644
index 0000000..d2ea7e6
--- /dev/null
+++ b/rfc/rfc5389.txt
@@ -0,0 +1,2859 @@
+
+
+
+
+
+
+Network Working Group J. Rosenberg
+Request for Comments: 5389 Cisco
+Obsoletes: 3489 R. Mahy
+Category: Standards Track P. Matthews
+ Unaffiliated
+ D. Wing
+ Cisco
+ October 2008
+
+
+ Session Traversal Utilities for NAT (STUN)
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Abstract
+
+ Session Traversal Utilities for NAT (STUN) is a protocol that serves
+ as a tool for other protocols in dealing with Network Address
+ Translator (NAT) traversal. It can be used by an endpoint to
+ determine the IP address and port allocated to it by a NAT. It can
+ also be used to check connectivity between two endpoints, and as a
+ keep-alive protocol to maintain NAT bindings. STUN works with many
+ existing NATs, and does not require any special behavior from them.
+
+ STUN is not a NAT traversal solution by itself. Rather, it is a tool
+ to be used in the context of a NAT traversal solution. This is an
+ important change from the previous version of this specification (RFC
+ 3489), which presented STUN as a complete solution.
+
+ This document obsoletes RFC 3489.
+
+Table of Contents
+
+1. Introduction ....................................................4
+2. Evolution from RFC 3489 .........................................4
+3. Overview of Operation ...........................................5
+4. Terminology .....................................................8
+5. Definitions .....................................................8
+6. STUN Message Structure .........................................10
+7. Base Protocol Procedures .......................................12
+ 7.1. Forming a Request or an Indication ........................12
+ 7.2. Sending the Request or Indication .........................13
+
+
+
+Rosenberg, et al. Standards Track [Page 1]
+
+RFC 5389 STUN October 2008
+
+
+ 7.2.1. Sending over UDP ...................................13
+ 7.2.2. Sending over TCP or TLS-over-TCP ...................14
+ 7.3. Receiving a STUN Message ..................................16
+ 7.3.1. Processing a Request ...............................17
+ 7.3.1.1. Forming a Success or Error Response .......18
+ 7.3.1.2. Sending the Success or Error Response .....19
+ 7.3.2. Processing an Indication ...........................19
+ 7.3.3. Processing a Success Response ......................19
+ 7.3.4. Processing an Error Response .......................20
+8. FINGERPRINT Mechanism ..........................................20
+9. DNS Discovery of a Server ......................................21
+10. Authentication and Message-Integrity Mechanisms ...............22
+ 10.1. Short-Term Credential Mechanism ..........................22
+ 10.1.1. Forming a Request or Indication ...................23
+ 10.1.2. Receiving a Request or Indication .................23
+ 10.1.3. Receiving a Response ..............................24
+ 10.2. Long-Term Credential Mechanism ...........................24
+ 10.2.1. Forming a Request .................................25
+ 10.2.1.1. First Request ............................25
+ 10.2.1.2. Subsequent Requests ......................26
+ 10.2.2. Receiving a Request ...............................26
+ 10.2.3. Receiving a Response ..............................27
+11. ALTERNATE-SERVER Mechanism ....................................28
+12. Backwards Compatibility with RFC 3489 .........................28
+ 12.1. Changes to Client Processing .............................29
+ 12.2. Changes to Server Processing .............................29
+13. Basic Server Behavior .........................................30
+14. STUN Usages ...................................................30
+15. STUN Attributes ...............................................31
+ 15.1. MAPPED-ADDRESS ...........................................32
+ 15.2. XOR-MAPPED-ADDRESS .......................................33
+ 15.3. USERNAME .................................................34
+ 15.4. MESSAGE-INTEGRITY ........................................34
+ 15.5. FINGERPRINT ..............................................36
+ 15.6. ERROR-CODE ...............................................36
+ 15.7. REALM ....................................................38
+ 15.8. NONCE ....................................................38
+ 15.9. UNKNOWN-ATTRIBUTES .......................................38
+ 15.10. SOFTWARE ................................................39
+ 15.11. ALTERNATE-SERVER ........................................39
+16. Security Considerations .......................................39
+ 16.1. Attacks against the Protocol .............................39
+ 16.1.1. Outside Attacks ...................................39
+ 16.1.2. Inside Attacks ....................................40
+ 16.2. Attacks Affecting the Usage ..............................40
+ 16.2.1. Attack I: Distributed DoS (DDoS) against a
+ Target ............................................41
+ 16.2.2. Attack II: Silencing a Client .....................41
+
+
+
+Rosenberg, et al. Standards Track [Page 2]
+
+RFC 5389 STUN October 2008
+
+
+ 16.2.3. Attack III: Assuming the Identity of a Client .....42
+ 16.2.4. Attack IV: Eavesdropping ..........................42
+ 16.3. Hash Agility Plan ........................................42
+17. IAB Considerations ............................................42
+18. IANA Considerations ...........................................43
+ 18.1. STUN Methods Registry ....................................43
+ 18.2. STUN Attribute Registry ..................................43
+ 18.3. STUN Error Code Registry .................................44
+ 18.4. STUN UDP and TCP Port Numbers ............................45
+19. Changes since RFC 3489 ........................................45
+20. Contributors ..................................................47
+21. Acknowledgements ..............................................47
+22. References ....................................................47
+ 22.1. Normative References .....................................47
+ 22.2. Informative References ...................................48
+Appendix A. C Snippet to Determine STUN Message Types .............50
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 3]
+
+RFC 5389 STUN October 2008
+
+
+1. Introduction
+
+ The protocol defined in this specification, Session Traversal
+ Utilities for NAT, provides a tool for dealing with NATs. It
+ provides a means for an endpoint to determine the IP address and port
+ allocated by a NAT that corresponds to its private IP address and
+ port. It also provides a way for an endpoint to keep a NAT binding
+ alive. With some extensions, the protocol can be used to do
+ connectivity checks between two endpoints [MMUSIC-ICE], or to relay
+ packets between two endpoints [BEHAVE-TURN].
+
+ In keeping with its tool nature, this specification defines an
+ extensible packet format, defines operation over several transport
+ protocols, and provides for two forms of authentication.
+
+ STUN is intended to be used in context of one or more NAT traversal
+ solutions. These solutions are known as STUN usages. Each usage
+ describes how STUN is utilized to achieve the NAT traversal solution.
+ Typically, a usage indicates when STUN messages get sent, which
+ optional attributes to include, what server is used, and what
+ authentication mechanism is to be used. Interactive Connectivity
+ Establishment (ICE) [MMUSIC-ICE] is one usage of STUN. SIP Outbound
+ [SIP-OUTBOUND] is another usage of STUN. In some cases, a usage will
+ require extensions to STUN. A STUN extension can be in the form of
+ new methods, attributes, or error response codes. More information
+ on STUN usages can be found in Section 14.
+
+2. Evolution from RFC 3489
+
+ STUN was originally defined in RFC 3489 [RFC3489]. That
+ specification, sometimes referred to as "classic STUN", represented
+ itself as a complete solution to the NAT traversal problem. In that
+ solution, a client would discover whether it was behind a NAT,
+ determine its NAT type, discover its IP address and port on the
+ public side of the outermost NAT, and then utilize that IP address
+ and port within the body of protocols, such as the Session Initiation
+ Protocol (SIP) [RFC3261]. However, experience since the publication
+ of RFC 3489 has found that classic STUN simply does not work
+ sufficiently well to be a deployable solution. The address and port
+ learned through classic STUN are sometimes usable for communications
+ with a peer, and sometimes not. Classic STUN provided no way to
+ discover whether it would, in fact, work or not, and it provided no
+ remedy in cases where it did not. Furthermore, classic STUN's
+ algorithm for classification of NAT types was found to be faulty, as
+ many NATs did not fit cleanly into the types defined there.
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 4]
+
+RFC 5389 STUN October 2008
+
+
+ Classic STUN also had a security vulnerability -- attackers could
+ provide the client with incorrect mapped addresses under certain
+ topologies and constraints, and this was fundamentally not solvable
+ through any cryptographic means. Though this problem remains with
+ this specification, those attacks are now mitigated through the use
+ of more complete solutions that make use of STUN.
+
+ For these reasons, this specification obsoletes RFC 3489, and instead
+ describes STUN as a tool that is utilized as part of a complete NAT
+ traversal solution. ICE [MMUSIC-ICE] is a complete NAT traversal
+ solution for protocols based on the offer/answer [RFC3264]
+ methodology, such as SIP. SIP Outbound [SIP-OUTBOUND] is a complete
+ solution for traversal of SIP signaling, and it uses STUN in a very
+ different way. Though it is possible that a protocol may be able to
+ use STUN by itself (classic STUN) as a traversal solution, such usage
+ is not described here and is strongly discouraged for the reasons
+ described above.
+
+ The on-the-wire protocol described here is changed only slightly from
+ classic STUN. The protocol now runs over TCP in addition to UDP.
+ Extensibility was added to the protocol in a more structured way. A
+ magic cookie mechanism for demultiplexing STUN with application
+ protocols was added by stealing 32 bits from the 128-bit transaction
+ ID defined in RFC 3489, allowing the change to be backwards
+ compatible. Mapped addresses are encoded using a new exclusive-or
+ format. There are other, more minor changes. See Section 19 for a
+ more complete listing.
+
+ Due to the change in scope, STUN has also been renamed from "Simple
+ Traversal of UDP through NAT" to "Session Traversal Utilities for
+ NAT". The acronym remains STUN, which is all anyone ever remembers
+ anyway.
+
+3. Overview of Operation
+
+ This section is descriptive only.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 5]
+
+RFC 5389 STUN October 2008
+
+
+ /-----\
+ // STUN \\
+ | Server |
+ \\ //
+ \-----/
+
+
+
+
+ +--------------+ Public Internet
+ ................| NAT 2 |.......................
+ +--------------+
+
+
+
+ +--------------+ Private NET 2
+ ................| NAT 1 |.......................
+ +--------------+
+
+
+
+
+ /-----\
+ // STUN \\
+ | Client |
+ \\ // Private NET 1
+ \-----/
+
+
+ Figure 1: One Possible STUN Configuration
+
+ One possible STUN configuration is shown in Figure 1. In this
+ configuration, there are two entities (called STUN agents) that
+ implement the STUN protocol. The lower agent in the figure is the
+ client, and is connected to private network 1. This network connects
+ to private network 2 through NAT 1. Private network 2 connects to
+ the public Internet through NAT 2. The upper agent in the figure is
+ the server, and resides on the public Internet.
+
+ STUN is a client-server protocol. It supports two types of
+ transactions. One is a request/response transaction in which a
+ client sends a request to a server, and the server returns a
+ response. The second is an indication transaction in which either
+ agent -- client or server -- sends an indication that generates no
+ response. Both types of transactions include a transaction ID, which
+ is a randomly selected 96-bit number. For request/response
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 6]
+
+RFC 5389 STUN October 2008
+
+
+ transactions, this transaction ID allows the client to associate the
+ response with the request that generated it; for indications, the
+ transaction ID serves as a debugging aid.
+
+ All STUN messages start with a fixed header that includes a method, a
+ class, and the transaction ID. The method indicates which of the
+ various requests or indications this is; this specification defines
+ just one method, Binding, but other methods are expected to be
+ defined in other documents. The class indicates whether this is a
+ request, a success response, an error response, or an indication.
+ Following the fixed header comes zero or more attributes, which are
+ Type-Length-Value extensions that convey additional information for
+ the specific message.
+
+ This document defines a single method called Binding. The Binding
+ method can be used either in request/response transactions or in
+ indication transactions. When used in request/response transactions,
+ the Binding method can be used to determine the particular "binding"
+ a NAT has allocated to a STUN client. When used in either request/
+ response or in indication transactions, the Binding method can also
+ be used to keep these "bindings" alive.
+
+ In the Binding request/response transaction, a Binding request is
+ sent from a STUN client to a STUN server. When the Binding request
+ arrives at the STUN server, it may have passed through one or more
+ NATs between the STUN client and the STUN server (in Figure 1, there
+ were two such NATs). As the Binding request message passes through a
+ NAT, the NAT will modify the source transport address (that is, the
+ source IP address and the source port) of the packet. As a result,
+ the source transport address of the request received by the server
+ will be the public IP address and port created by the NAT closest to
+ the server. This is called a reflexive transport address. The STUN
+ server copies that source transport address into an XOR-MAPPED-
+ ADDRESS attribute in the STUN Binding response and sends the Binding
+ response back to the STUN client. As this packet passes back through
+ a NAT, the NAT will modify the destination transport address in the
+ IP header, but the transport address in the XOR-MAPPED-ADDRESS
+ attribute within the body of the STUN response will remain untouched.
+ In this way, the client can learn its reflexive transport address
+ allocated by the outermost NAT with respect to the STUN server.
+
+ In some usages, STUN must be multiplexed with other protocols (e.g.,
+ [MMUSIC-ICE], [SIP-OUTBOUND]). In these usages, there must be a way
+ to inspect a packet and determine if it is a STUN packet or not.
+ STUN provides three fields in the STUN header with fixed values that
+ can be used for this purpose. If this is not sufficient, then STUN
+ packets can also contain a FINGERPRINT value, which can further be
+ used to distinguish the packets.
+
+
+
+Rosenberg, et al. Standards Track [Page 7]
+
+RFC 5389 STUN October 2008
+
+
+ STUN defines a set of optional procedures that a usage can decide to
+ use, called mechanisms. These mechanisms include DNS discovery, a
+ redirection technique to an alternate server, a fingerprint attribute
+ for demultiplexing, and two authentication and message-integrity
+ exchanges. The authentication mechanisms revolve around the use of a
+ username, password, and message-integrity value. Two authentication
+ mechanisms, the long-term credential mechanism and the short-term
+ credential mechanism, are defined in this specification. Each usage
+ specifies the mechanisms allowed with that usage.
+
+ In the long-term credential mechanism, the client and server share a
+ pre-provisioned username and password and perform a digest challenge/
+ response exchange inspired by (but differing in details) to the one
+ defined for HTTP [RFC2617]. In the short-term credential mechanism,
+ the client and the server exchange a username and password through
+ some out-of-band method prior to the STUN exchange. For example, in
+ the ICE usage [MMUSIC-ICE] the two endpoints use out-of-band
+ signaling to exchange a username and password. These are used to
+ integrity protect and authenticate the request and response. There
+ is no challenge or nonce used.
+
+4. Terminology
+
+ In this document, the key words "MUST", "MUST NOT", "REQUIRED",
+ "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
+ and "OPTIONAL" are to be interpreted as described in BCP 14, RFC 2119
+ [RFC2119] and indicate requirement levels for compliant STUN
+ implementations.
+
+5. Definitions
+
+ STUN Agent: A STUN agent is an entity that implements the STUN
+ protocol. The entity can be either a STUN client or a STUN
+ server.
+
+ STUN Client: A STUN client is an entity that sends STUN requests and
+ receives STUN responses. A STUN client can also send indications.
+ In this specification, the terms STUN client and client are
+ synonymous.
+
+ STUN Server: A STUN server is an entity that receives STUN requests
+ and sends STUN responses. A STUN server can also send
+ indications. In this specification, the terms STUN server and
+ server are synonymous.
+
+ Transport Address: The combination of an IP address and port number
+ (such as a UDP or TCP port number).
+
+
+
+
+Rosenberg, et al. Standards Track [Page 8]
+
+RFC 5389 STUN October 2008
+
+
+ Reflexive Transport Address: A transport address learned by a client
+ that identifies that client as seen by another host on an IP
+ network, typically a STUN server. When there is an intervening
+ NAT between the client and the other host, the reflexive transport
+ address represents the mapped address allocated to the client on
+ the public side of the NAT. Reflexive transport addresses are
+ learned from the mapped address attribute (MAPPED-ADDRESS or XOR-
+ MAPPED-ADDRESS) in STUN responses.
+
+ Mapped Address: Same meaning as reflexive address. This term is
+ retained only for historic reasons and due to the naming of the
+ MAPPED-ADDRESS and XOR-MAPPED-ADDRESS attributes.
+
+ Long-Term Credential: A username and associated password that
+ represent a shared secret between client and server. Long-term
+ credentials are generally granted to the client when a subscriber
+ enrolls in a service and persist until the subscriber leaves the
+ service or explicitly changes the credential.
+
+ Long-Term Password: The password from a long-term credential.
+
+ Short-Term Credential: A temporary username and associated password
+ that represent a shared secret between client and server. Short-
+ term credentials are obtained through some kind of protocol
+ mechanism between the client and server, preceding the STUN
+ exchange. A short-term credential has an explicit temporal scope,
+ which may be based on a specific amount of time (such as 5
+ minutes) or on an event (such as termination of a SIP dialog).
+ The specific scope of a short-term credential is defined by the
+ application usage.
+
+ Short-Term Password: The password component of a short-term
+ credential.
+
+ STUN Indication: A STUN message that does not receive a response.
+
+ Attribute: The STUN term for a Type-Length-Value (TLV) object that
+ can be added to a STUN message. Attributes are divided into two
+ types: comprehension-required and comprehension-optional. STUN
+ agents can safely ignore comprehension-optional attributes they
+ don't understand, but cannot successfully process a message if it
+ contains comprehension-required attributes that are not
+ understood.
+
+ RTO: Retransmission TimeOut, which defines the initial period of
+ time between transmission of a request and the first retransmit of
+ that request.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 9]
+
+RFC 5389 STUN October 2008
+
+
+6. STUN Message Structure
+
+ STUN messages are encoded in binary using network-oriented format
+ (most significant byte or octet first, also commonly known as big-
+ endian). The transmission order is described in detail in Appendix B
+ of RFC 791 [RFC0791]. Unless otherwise noted, numeric constants are
+ in decimal (base 10).
+
+ All STUN messages MUST start with a 20-byte header followed by zero
+ or more Attributes. The STUN header contains a STUN message type,
+ magic cookie, transaction ID, and message length.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |0 0| STUN Message Type | Message Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Magic Cookie |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ | Transaction ID (96 bits) |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 2: Format of STUN Message Header
+
+ The most significant 2 bits of every STUN message MUST be zeroes.
+ This can be used to differentiate STUN packets from other protocols
+ when STUN is multiplexed with other protocols on the same port.
+
+ The message type defines the message class (request, success
+ response, failure response, or indication) and the message method
+ (the primary function) of the STUN message. Although there are four
+ message classes, there are only two types of transactions in STUN:
+ request/response transactions (which consist of a request message and
+ a response message) and indication transactions (which consist of a
+ single indication message). Response classes are split into error
+ and success responses to aid in quickly processing the STUN message.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 10]
+
+RFC 5389 STUN October 2008
+
+
+ The message type field is decomposed further into the following
+ structure:
+
+ 0 1
+ 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+
+ +--+--+-+-+-+-+-+-+-+-+-+-+-+-+
+ |M |M |M|M|M|C|M|M|M|C|M|M|M|M|
+ |11|10|9|8|7|1|6|5|4|0|3|2|1|0|
+ +--+--+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 3: Format of STUN Message Type Field
+
+ Here the bits in the message type field are shown as most significant
+ (M11) through least significant (M0). M11 through M0 represent a 12-
+ bit encoding of the method. C1 and C0 represent a 2-bit encoding of
+ the class. A class of 0b00 is a request, a class of 0b01 is an
+ indication, a class of 0b10 is a success response, and a class of
+ 0b11 is an error response. This specification defines a single
+ method, Binding. The method and class are orthogonal, so that for
+ each method, a request, success response, error response, and
+ indication are possible for that method. Extensions defining new
+ methods MUST indicate which classes are permitted for that method.
+
+ For example, a Binding request has class=0b00 (request) and
+ method=0b000000000001 (Binding) and is encoded into the first 16 bits
+ as 0x0001. A Binding response has class=0b10 (success response) and
+ method=0b000000000001, and is encoded into the first 16 bits as
+ 0x0101.
+
+ Note: This unfortunate encoding is due to assignment of values in
+ [RFC3489] that did not consider encoding Indications, Success, and
+ Errors using bit fields.
+
+ The magic cookie field MUST contain the fixed value 0x2112A442 in
+ network byte order. In RFC 3489 [RFC3489], this field was part of
+ the transaction ID; placing the magic cookie in this location allows
+ a server to detect if the client will understand certain attributes
+ that were added in this revised specification. In addition, it aids
+ in distinguishing STUN packets from packets of other protocols when
+ STUN is multiplexed with those other protocols on the same port.
+
+ The transaction ID is a 96-bit identifier, used to uniquely identify
+ STUN transactions. For request/response transactions, the
+ transaction ID is chosen by the STUN client for the request and
+ echoed by the server in the response. For indications, it is chosen
+ by the agent sending the indication. It primarily serves to
+ correlate requests with responses, though it also plays a small role
+
+
+
+Rosenberg, et al. Standards Track [Page 11]
+
+RFC 5389 STUN October 2008
+
+
+ in helping to prevent certain types of attacks. The server also uses
+ the transaction ID as a key to identify each transaction uniquely
+ across all clients. As such, the transaction ID MUST be uniformly
+ and randomly chosen from the interval 0 .. 2**96-1, and SHOULD be
+ cryptographically random. Resends of the same request reuse the same
+ transaction ID, but the client MUST choose a new transaction ID for
+ new transactions unless the new request is bit-wise identical to the
+ previous request and sent from the same transport address to the same
+ IP address. Success and error responses MUST carry the same
+ transaction ID as their corresponding request. When an agent is
+ acting as a STUN server and STUN client on the same port, the
+ transaction IDs in requests sent by the agent have no relationship to
+ the transaction IDs in requests received by the agent.
+
+ The message length MUST contain the size, in bytes, of the message
+ not including the 20-byte STUN header. Since all STUN attributes are
+ padded to a multiple of 4 bytes, the last 2 bits of this field are
+ always zero. This provides another way to distinguish STUN packets
+ from packets of other protocols.
+
+ Following the STUN fixed portion of the header are zero or more
+ attributes. Each attribute is TLV (Type-Length-Value) encoded. The
+ details of the encoding, and of the attributes themselves are given
+ in Section 15.
+
+7. Base Protocol Procedures
+
+ This section defines the base procedures of the STUN protocol. It
+ describes how messages are formed, how they are sent, and how they
+ are processed when they are received. It also defines the detailed
+ processing of the Binding method. Other sections in this document
+ describe optional procedures that a usage may elect to use in certain
+ situations. Other documents may define other extensions to STUN, by
+ adding new methods, new attributes, or new error response codes.
+
+7.1. Forming a Request or an Indication
+
+ When formulating a request or indication message, the agent MUST
+ follow the rules in Section 6 when creating the header. In addition,
+ the message class MUST be either "Request" or "Indication" (as
+ appropriate), and the method must be either Binding or some method
+ defined in another document.
+
+ The agent then adds any attributes specified by the method or the
+ usage. For example, some usages may specify that the agent use an
+ authentication method (Section 10) or the FINGERPRINT attribute
+ (Section 8).
+
+
+
+
+Rosenberg, et al. Standards Track [Page 12]
+
+RFC 5389 STUN October 2008
+
+
+ If the agent is sending a request, it SHOULD add a SOFTWARE attribute
+ to the request. Agents MAY include a SOFTWARE attribute in
+ indications, depending on the method. Extensions to STUN should
+ discuss whether SOFTWARE is useful in new indications.
+
+ For the Binding method with no authentication, no attributes are
+ required unless the usage specifies otherwise.
+
+ All STUN messages sent over UDP SHOULD be less than the path MTU, if
+ known. If the path MTU is unknown, messages SHOULD be the smaller of
+ 576 bytes and the first-hop MTU for IPv4 [RFC1122] and 1280 bytes for
+ IPv6 [RFC2460]. This value corresponds to the overall size of the IP
+ packet. Consequently, for IPv4, the actual STUN message would need
+ to be less than 548 bytes (576 minus 20-byte IP header, minus 8-byte
+ UDP header, assuming no IP options are used). STUN provides no
+ ability to handle the case where the request is under the MTU but the
+ response would be larger than the MTU. It is not envisioned that
+ this limitation will be an issue for STUN. The MTU limitation is a
+ SHOULD, and not a MUST, to account for cases where STUN itself is
+ being used to probe for MTU characteristics [BEHAVE-NAT]. Outside of
+ this or similar applications, the MTU constraint MUST be followed.
+
+7.2. Sending the Request or Indication
+
+ The agent then sends the request or indication. This document
+ specifies how to send STUN messages over UDP, TCP, or TLS-over-TCP;
+ other transport protocols may be added in the future. The STUN usage
+ must specify which transport protocol is used, and how the agent
+ determines the IP address and port of the recipient. Section 9
+ describes a DNS-based method of determining the IP address and port
+ of a server that a usage may elect to use. STUN may be used with
+ anycast addresses, but only with UDP and in usages where
+ authentication is not used.
+
+ At any time, a client MAY have multiple outstanding STUN requests
+ with the same STUN server (that is, multiple transactions in
+ progress, with different transaction IDs). Absent other limits to
+ the rate of new transactions (such as those specified by ICE for
+ connectivity checks or when STUN is run over TCP), a client SHOULD
+ space new transactions to a server by RTO and SHOULD limit itself to
+ ten outstanding transactions to the same server.
+
+7.2.1. Sending over UDP
+
+ When running STUN over UDP, it is possible that the STUN message
+ might be dropped by the network. Reliability of STUN request/
+ response transactions is accomplished through retransmissions of the
+
+
+
+
+Rosenberg, et al. Standards Track [Page 13]
+
+RFC 5389 STUN October 2008
+
+
+ request message by the client application itself. STUN indications
+ are not retransmitted; thus, indication transactions over UDP are not
+ reliable.
+
+ A client SHOULD retransmit a STUN request message starting with an
+ interval of RTO ("Retransmission TimeOut"), doubling after each
+ retransmission. The RTO is an estimate of the round-trip time (RTT),
+ and is computed as described in RFC 2988 [RFC2988], with two
+ exceptions. First, the initial value for RTO SHOULD be configurable
+ (rather than the 3 s recommended in RFC 2988) and SHOULD be greater
+ than 500 ms. The exception cases for this "SHOULD" are when other
+ mechanisms are used to derive congestion thresholds (such as the ones
+ defined in ICE for fixed rate streams), or when STUN is used in non-
+ Internet environments with known network capacities. In fixed-line
+ access links, a value of 500 ms is RECOMMENDED. Second, the value of
+ RTO SHOULD NOT be rounded up to the nearest second. Rather, a 1 ms
+ accuracy SHOULD be maintained. As with TCP, the usage of Karn's
+ algorithm is RECOMMENDED [KARN87]. When applied to STUN, it means
+ that RTT estimates SHOULD NOT be computed from STUN transactions that
+ result in the retransmission of a request.
+
+ The value for RTO SHOULD be cached by a client after the completion
+ of the transaction, and used as the starting value for RTO for the
+ next transaction to the same server (based on equality of IP
+ address). The value SHOULD be considered stale and discarded after
+ 10 minutes.
+
+ Retransmissions continue until a response is received, or until a
+ total of Rc requests have been sent. Rc SHOULD be configurable and
+ SHOULD have a default of 7. If, after the last request, a duration
+ equal to Rm times the RTO has passed without a response (providing
+ ample time to get a response if only this final request actually
+ succeeds), the client SHOULD consider the transaction to have failed.
+ Rm SHOULD be configurable and SHOULD have a default of 16. A STUN
+ transaction over UDP is also considered failed if there has been a
+ hard ICMP error [RFC1122]. For example, assuming an RTO of 500 ms,
+ requests would be sent at times 0 ms, 500 ms, 1500 ms, 3500 ms, 7500
+ ms, 15500 ms, and 31500 ms. If the client has not received a
+ response after 39500 ms, the client will consider the transaction to
+ have timed out.
+
+7.2.2. Sending over TCP or TLS-over-TCP
+
+ For TCP and TLS-over-TCP, the client opens a TCP connection to the
+ server.
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 14]
+
+RFC 5389 STUN October 2008
+
+
+ In some usages of STUN, STUN is sent as the only protocol over the
+ TCP connection. In this case, it can be sent without the aid of any
+ additional framing or demultiplexing. In other usages, or with other
+ extensions, it may be multiplexed with other data over a TCP
+ connection. In that case, STUN MUST be run on top of some kind of
+ framing protocol, specified by the usage or extension, which allows
+ for the agent to extract complete STUN messages and complete
+ application layer messages. The STUN service running on the well-
+ known port or ports discovered through the DNS procedures in
+ Section 9 is for STUN alone, and not for STUN multiplexed with other
+ data. Consequently, no framing protocols are used in connections to
+ those servers. When additional framing is utilized, the usage will
+ specify how the client knows to apply it and what port to connect to.
+ For example, in the case of ICE connectivity checks, this information
+ is learned through out-of-band negotiation between client and server.
+
+ When STUN is run by itself over TLS-over-TCP, the
+ TLS_RSA_WITH_AES_128_CBC_SHA ciphersuite MUST be implemented at a
+ minimum. Implementations MAY also support any other ciphersuite.
+ When it receives the TLS Certificate message, the client SHOULD
+ verify the certificate and inspect the site identified by the
+ certificate. If the certificate is invalid or revoked, or if it does
+ not identify the appropriate party, the client MUST NOT send the STUN
+ message or otherwise proceed with the STUN transaction. The client
+ MUST verify the identity of the server. To do that, it follows the
+ identification procedures defined in Section 3.1 of RFC 2818
+ [RFC2818]. Those procedures assume the client is dereferencing a
+ URI. For purposes of usage with this specification, the client
+ treats the domain name or IP address used in Section 8.1 as the host
+ portion of the URI that has been dereferenced. Alternatively, a
+ client MAY be configured with a set of domains or IP addresses that
+ are trusted; if a certificate is received that identifies one of
+ those domains or IP addresses, the client considers the identity of
+ the server to be verified.
+
+ When STUN is run multiplexed with other protocols over a TLS-over-TCP
+ connection, the mandatory ciphersuites and TLS handling procedures
+ operate as defined by those protocols.
+
+ Reliability of STUN over TCP and TLS-over-TCP is handled by TCP
+ itself, and there are no retransmissions at the STUN protocol level.
+ However, for a request/response transaction, if the client has not
+ received a response by Ti seconds after it sent the SYN to establish
+ the connection, it considers the transaction to have timed out. Ti
+ SHOULD be configurable and SHOULD have a default of 39.5s. This
+ value has been chosen to equalize the TCP and UDP timeouts for the
+ default initial RTO.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 15]
+
+RFC 5389 STUN October 2008
+
+
+ In addition, if the client is unable to establish the TCP connection,
+ or the TCP connection is reset or fails before a response is
+ received, any request/response transaction in progress is considered
+ to have failed.
+
+ The client MAY send multiple transactions over a single TCP (or TLS-
+ over-TCP) connection, and it MAY send another request before
+ receiving a response to the previous. The client SHOULD keep the
+ connection open until it:
+
+ o has no further STUN requests or indications to send over that
+ connection, and
+
+ o has no plans to use any resources (such as a mapped address
+ (MAPPED-ADDRESS or XOR-MAPPED-ADDRESS) or relayed address
+ [BEHAVE-TURN]) that were learned though STUN requests sent over
+ that connection, and
+
+ o if multiplexing other application protocols over that port, has
+ finished using that other application, and
+
+ o if using that learned port with a remote peer, has established
+ communications with that remote peer, as is required by some TCP
+ NAT traversal techniques (e.g., [MMUSIC-ICE-TCP]).
+
+ At the server end, the server SHOULD keep the connection open, and
+ let the client close it, unless the server has determined that the
+ connection has timed out (for example, due to the client
+ disconnecting from the network). Bindings learned by the client will
+ remain valid in intervening NATs only while the connection remains
+ open. Only the client knows how long it needs the binding. The
+ server SHOULD NOT close a connection if a request was received over
+ that connection for which a response was not sent. A server MUST NOT
+ ever open a connection back towards the client in order to send a
+ response. Servers SHOULD follow best practices regarding connection
+ management in cases of overload.
+
+7.3. Receiving a STUN Message
+
+ This section specifies the processing of a STUN message. The
+ processing specified here is for STUN messages as defined in this
+ specification; additional rules for backwards compatibility are
+ defined in Section 12. Those additional procedures are optional, and
+ usages can elect to utilize them. First, a set of processing
+ operations is applied that is independent of the class. This is
+ followed by class-specific processing, described in the subsections
+ that follow.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 16]
+
+RFC 5389 STUN October 2008
+
+
+ When a STUN agent receives a STUN message, it first checks that the
+ message obeys the rules of Section 6. It checks that the first two
+ bits are 0, that the magic cookie field has the correct value, that
+ the message length is sensible, and that the method value is a
+ supported method. It checks that the message class is allowed for
+ the particular method. If the message class is "Success Response" or
+ "Error Response", the agent checks that the transaction ID matches a
+ transaction that is still in progress. If the FINGERPRINT extension
+ is being used, the agent checks that the FINGERPRINT attribute is
+ present and contains the correct value. If any errors are detected,
+ the message is silently discarded. In the case when STUN is being
+ multiplexed with another protocol, an error may indicate that this is
+ not really a STUN message; in this case, the agent should try to
+ parse the message as a different protocol.
+
+ The STUN agent then does any checks that are required by a
+ authentication mechanism that the usage has specified (see
+ Section 10).
+
+ Once the authentication checks are done, the STUN agent checks for
+ unknown attributes and known-but-unexpected attributes in the
+ message. Unknown comprehension-optional attributes MUST be ignored
+ by the agent. Known-but-unexpected attributes SHOULD be ignored by
+ the agent. Unknown comprehension-required attributes cause
+ processing that depends on the message class and is described below.
+
+ At this point, further processing depends on the message class of the
+ request.
+
+7.3.1. Processing a Request
+
+ If the request contains one or more unknown comprehension-required
+ attributes, the server replies with an error response with an error
+ code of 420 (Unknown Attribute), and includes an UNKNOWN-ATTRIBUTES
+ attribute in the response that lists the unknown comprehension-
+ required attributes.
+
+ The server then does any additional checking that the method or the
+ specific usage requires. If all the checks succeed, the server
+ formulates a success response as described below.
+
+ When run over UDP, a request received by the server could be the
+ first request of a transaction, or a retransmission. The server MUST
+ respond to retransmissions such that the following property is
+ preserved: if the client receives the response to the retransmission
+ and not the response that was sent to the original request, the
+ overall state on the client and server is identical to the case where
+ only the response to the original retransmission is received, or
+
+
+
+Rosenberg, et al. Standards Track [Page 17]
+
+RFC 5389 STUN October 2008
+
+
+ where both responses are received (in which case the client will use
+ the first). The easiest way to meet this requirement is for the
+ server to remember all transaction IDs received over UDP and their
+ corresponding responses in the last 40 seconds. However, this
+ requires the server to hold state, and will be inappropriate for any
+ requests which are not authenticated. Another way is to reprocess
+ the request and recompute the response. The latter technique MUST
+ only be applied to requests that are idempotent (a request is
+ considered idempotent when the same request can be safely repeated
+ without impacting the overall state of the system) and result in the
+ same success response for the same request. The Binding method is
+ considered to be idempotent. Note that there are certain rare
+ network events that could cause the reflexive transport address value
+ to change, resulting in a different mapped address in different
+ success responses. Extensions to STUN MUST discuss the implications
+ of request retransmissions on servers that do not store transaction
+ state.
+
+7.3.1.1. Forming a Success or Error Response
+
+ When forming the response (success or error), the server follows the
+ rules of Section 6. The method of the response is the same as that
+ of the request, and the message class is either "Success Response" or
+ "Error Response".
+
+ For an error response, the server MUST add an ERROR-CODE attribute
+ containing the error code specified in the processing above. The
+ reason phrase is not fixed, but SHOULD be something suitable for the
+ error code. For certain errors, additional attributes are added to
+ the message. These attributes are spelled out in the description
+ where the error code is specified. For example, for an error code of
+ 420 (Unknown Attribute), the server MUST include an UNKNOWN-
+ ATTRIBUTES attribute. Certain authentication errors also cause
+ attributes to be added (see Section 10). Extensions may define other
+ errors and/or additional attributes to add in error cases.
+
+ If the server authenticated the request using an authentication
+ mechanism, then the server SHOULD add the appropriate authentication
+ attributes to the response (see Section 10).
+
+ The server also adds any attributes required by the specific method
+ or usage. In addition, the server SHOULD add a SOFTWARE attribute to
+ the message.
+
+ For the Binding method, no additional checking is required unless the
+ usage specifies otherwise. When forming the success response, the
+ server adds a XOR-MAPPED-ADDRESS attribute to the response, where the
+ contents of the attribute are the source transport address of the
+
+
+
+Rosenberg, et al. Standards Track [Page 18]
+
+RFC 5389 STUN October 2008
+
+
+ request message. For UDP, this is the source IP address and source
+ UDP port of the request message. For TCP and TLS-over-TCP, this is
+ the source IP address and source TCP port of the TCP connection as
+ seen by the server.
+
+7.3.1.2. Sending the Success or Error Response
+
+ The response (success or error) is sent over the same transport as
+ the request was received on. If the request was received over UDP,
+ the destination IP address and port of the response are the source IP
+ address and port of the received request message, and the source IP
+ address and port of the response are equal to the destination IP
+ address and port of the received request message. If the request was
+ received over TCP or TLS-over-TCP, the response is sent back on the
+ same TCP connection as the request was received on.
+
+7.3.2. Processing an Indication
+
+ If the indication contains unknown comprehension-required attributes,
+ the indication is discarded and processing ceases.
+
+ The agent then does any additional checking that the method or the
+ specific usage requires. If all the checks succeed, the agent then
+ processes the indication. No response is generated for an
+ indication.
+
+ For the Binding method, no additional checking or processing is
+ required, unless the usage specifies otherwise. The mere receipt of
+ the message by the agent has refreshed the "bindings" in the
+ intervening NATs.
+
+ Since indications are not re-transmitted over UDP (unlike requests),
+ there is no need to handle re-transmissions of indications at the
+ sending agent.
+
+7.3.3. Processing a Success Response
+
+ If the success response contains unknown comprehension-required
+ attributes, the response is discarded and the transaction is
+ considered to have failed.
+
+ The client then does any additional checking that the method or the
+ specific usage requires. If all the checks succeed, the client then
+ processes the success response.
+
+ For the Binding method, the client checks that the XOR-MAPPED-ADDRESS
+ attribute is present in the response. The client checks the address
+ family specified. If it is an unsupported address family, the
+
+
+
+Rosenberg, et al. Standards Track [Page 19]
+
+RFC 5389 STUN October 2008
+
+
+ attribute SHOULD be ignored. If it is an unexpected but supported
+ address family (for example, the Binding transaction was sent over
+ IPv4, but the address family specified is IPv6), then the client MAY
+ accept and use the value.
+
+7.3.4. Processing an Error Response
+
+ If the error response contains unknown comprehension-required
+ attributes, or if the error response does not contain an ERROR-CODE
+ attribute, then the transaction is simply considered to have failed.
+
+ The client then does any processing specified by the authentication
+ mechanism (see Section 10). This may result in a new transaction
+ attempt.
+
+ The processing at this point depends on the error code, the method,
+ and the usage; the following are the default rules:
+
+ o If the error code is 300 through 399, the client SHOULD consider
+ the transaction as failed unless the ALTERNATE-SERVER extension is
+ being used. See Section 11.
+
+ o If the error code is 400 through 499, the client declares the
+ transaction failed; in the case of 420 (Unknown Attribute), the
+ response should contain a UNKNOWN-ATTRIBUTES attribute that gives
+ additional information.
+
+ o If the error code is 500 through 599, the client MAY resend the
+ request; clients that do so MUST limit the number of times they do
+ this.
+
+ Any other error code causes the client to consider the transaction
+ failed.
+
+8. FINGERPRINT Mechanism
+
+ This section describes an optional mechanism for STUN that aids in
+ distinguishing STUN messages from packets of other protocols when the
+ two are multiplexed on the same transport address. This mechanism is
+ optional, and a STUN usage must describe if and when it is used. The
+ FINGERPRINT mechanism is not backwards compatible with RFC 3489, and
+ cannot be used in environments where such compatibility is required.
+
+ In some usages, STUN messages are multiplexed on the same transport
+ address as other protocols, such as the Real Time Transport Protocol
+ (RTP). In order to apply the processing described in Section 7, STUN
+ messages must first be separated from the application packets.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 20]
+
+RFC 5389 STUN October 2008
+
+
+ Section 6 describes three fixed fields in the STUN header that can be
+ used for this purpose. However, in some cases, these three fixed
+ fields may not be sufficient.
+
+ When the FINGERPRINT extension is used, an agent includes the
+ FINGERPRINT attribute in messages it sends to another agent.
+ Section 15.5 describes the placement and value of this attribute.
+ When the agent receives what it believes is a STUN message, then, in
+ addition to other basic checks, the agent also checks that the
+ message contains a FINGERPRINT attribute and that the attribute
+ contains the correct value. Section 7.3 describes when in the
+ overall processing of a STUN message the FINGERPRINT check is
+ performed. This additional check helps the agent detect messages of
+ other protocols that might otherwise seem to be STUN messages.
+
+9. DNS Discovery of a Server
+
+ This section describes an optional procedure for STUN that allows a
+ client to use DNS to determine the IP address and port of a server.
+ A STUN usage must describe if and when this extension is used. To
+ use this procedure, the client must know a server's domain name and a
+ service name; the usage must also describe how the client obtains
+ these. Hard-coding the domain name of the server into software is
+ NOT RECOMMENDED in case the domain name is lost or needs to change
+ for legal or other reasons.
+
+ When a client wishes to locate a STUN server in the public Internet
+ that accepts Binding request/response transactions, the SRV service
+ name is "stun". When it wishes to locate a STUN server that accepts
+ Binding request/response transactions over a TLS session, the SRV
+ service name is "stuns". STUN usages MAY define additional DNS SRV
+ service names.
+
+ The domain name is resolved to a transport address using the SRV
+ procedures specified in [RFC2782]. The DNS SRV service name is the
+ service name provided as input to this procedure. The protocol in
+ the SRV lookup is the transport protocol the client will run STUN
+ over: "udp" for UDP and "tcp" for TCP. Note that only "tcp" is
+ defined with "stuns" at this time.
+
+ The procedures of RFC 2782 are followed to determine the server to
+ contact. RFC 2782 spells out the details of how a set of SRV records
+ is sorted and then tried. However, RFC 2782 only states that the
+ client should "try to connect to the (protocol, address, service)"
+ without giving any details on what happens in the event of failure.
+ When following these procedures, if the STUN transaction times out
+ without receipt of a response, the client SHOULD retry the request to
+
+
+
+
+Rosenberg, et al. Standards Track [Page 21]
+
+RFC 5389 STUN October 2008
+
+
+ the next server in the ordered defined by RFC 2782. Such a retry is
+ only possible for request/response transmissions, since indication
+ transactions generate no response or timeout.
+
+ The default port for STUN requests is 3478, for both TCP and UDP.
+
+ Administrators of STUN servers SHOULD use this port in their SRV
+ records for UDP and TCP. In all cases, the port in DNS MUST reflect
+ the one on which the server is listening. The default port for STUN
+ over TLS is 5349. Servers can run STUN over TLS on the same port as
+ STUN over TCP if the server software supports determining whether the
+ initial message is a TLS or STUN message.
+
+ If no SRV records were found, the client performs an A or AAAA record
+ lookup of the domain name. The result will be a list of IP
+ addresses, each of which can be contacted at the default port using
+ UDP or TCP, independent of the STUN usage. For usages that require
+ TLS, the client connects to one of the IP addresses using the default
+ STUN over TLS port.
+
+10. Authentication and Message-Integrity Mechanisms
+
+ This section defines two mechanisms for STUN that a client and server
+ can use to provide authentication and message integrity; these two
+ mechanisms are known as the short-term credential mechanism and the
+ long-term credential mechanism. These two mechanisms are optional,
+ and each usage must specify if and when these mechanisms are used.
+ Consequently, both clients and servers will know which mechanism (if
+ any) to follow based on knowledge of which usage applies. For
+ example, a STUN server on the public Internet supporting ICE would
+ have no authentication, whereas the STUN server functionality in an
+ agent supporting connectivity checks would utilize short-term
+ credentials. An overview of these two mechanisms is given in
+ Section 3.
+
+ Each mechanism specifies the additional processing required to use
+ that mechanism, extending the processing specified in Section 7. The
+ additional processing occurs in three different places: when forming
+ a message, when receiving a message immediately after the basic
+ checks have been performed, and when doing the detailed processing of
+ error responses.
+
+10.1. Short-Term Credential Mechanism
+
+ The short-term credential mechanism assumes that, prior to the STUN
+ transaction, the client and server have used some other protocol to
+ exchange a credential in the form of a username and password. This
+ credential is time-limited. The time limit is defined by the usage.
+
+
+
+Rosenberg, et al. Standards Track [Page 22]
+
+RFC 5389 STUN October 2008
+
+
+ As an example, in the ICE usage [MMUSIC-ICE], the two endpoints use
+ out-of-band signaling to agree on a username and password, and this
+ username and password are applicable for the duration of the media
+ session.
+
+ This credential is used to form a message-integrity check in each
+ request and in many responses. There is no challenge and response as
+ in the long-term mechanism; consequently, replay is prevented by
+ virtue of the time-limited nature of the credential.
+
+10.1.1. Forming a Request or Indication
+
+ For a request or indication message, the agent MUST include the
+ USERNAME and MESSAGE-INTEGRITY attributes in the message. The HMAC
+ for the MESSAGE-INTEGRITY attribute is computed as described in
+ Section 15.4. Note that the password is never included in the
+ request or indication.
+
+10.1.2. Receiving a Request or Indication
+
+ After the agent has done the basic processing of a message, the agent
+ performs the checks listed below in order specified:
+
+ o If the message does not contain both a MESSAGE-INTEGRITY and a
+ USERNAME attribute:
+
+ * If the message is a request, the server MUST reject the request
+ with an error response. This response MUST use an error code
+ of 400 (Bad Request).
+
+ * If the message is an indication, the agent MUST silently
+ discard the indication.
+
+ o If the USERNAME does not contain a username value currently valid
+ within the server:
+
+ * If the message is a request, the server MUST reject the request
+ with an error response. This response MUST use an error code
+ of 401 (Unauthorized).
+
+ * If the message is an indication, the agent MUST silently
+ discard the indication.
+
+ o Using the password associated with the username, compute the value
+ for the message integrity as described in Section 15.4. If the
+ resulting value does not match the contents of the MESSAGE-
+ INTEGRITY attribute:
+
+
+
+
+Rosenberg, et al. Standards Track [Page 23]
+
+RFC 5389 STUN October 2008
+
+
+ * If the message is a request, the server MUST reject the request
+ with an error response. This response MUST use an error code
+ of 401 (Unauthorized).
+
+ * If the message is an indication, the agent MUST silently
+ discard the indication.
+
+ If these checks pass, the agent continues to process the request or
+ indication. Any response generated by a server MUST include the
+ MESSAGE-INTEGRITY attribute, computed using the password utilized to
+ authenticate the request. The response MUST NOT contain the USERNAME
+ attribute.
+
+ If any of the checks fail, a server MUST NOT include a MESSAGE-
+ INTEGRITY or USERNAME attribute in the error response. This is
+ because, in these failure cases, the server cannot determine the
+ shared secret necessary to compute MESSAGE-INTEGRITY.
+
+10.1.3. Receiving a Response
+
+ The client looks for the MESSAGE-INTEGRITY attribute in the response.
+ If present, the client computes the message integrity over the
+ response as defined in Section 15.4, using the same password it
+ utilized for the request. If the resulting value matches the
+ contents of the MESSAGE-INTEGRITY attribute, the response is
+ considered authenticated. If the value does not match, or if
+ MESSAGE-INTEGRITY was absent, the response MUST be discarded, as if
+ it was never received. This means that retransmits, if applicable,
+ will continue.
+
+10.2. Long-Term Credential Mechanism
+
+ The long-term credential mechanism relies on a long-term credential,
+ in the form of a username and password that are shared between client
+ and server. The credential is considered long-term since it is
+ assumed that it is provisioned for a user, and remains in effect
+ until the user is no longer a subscriber of the system, or is
+ changed. This is basically a traditional "log-in" username and
+ password given to users.
+
+ Because these usernames and passwords are expected to be valid for
+ extended periods of time, replay prevention is provided in the form
+ of a digest challenge. In this mechanism, the client initially sends
+ a request, without offering any credentials or any integrity checks.
+ The server rejects this request, providing the user a realm (used to
+ guide the user or agent in selection of a username and password) and
+ a nonce. The nonce provides the replay protection. It is a cookie,
+ selected by the server, and encoded in such a way as to indicate a
+
+
+
+Rosenberg, et al. Standards Track [Page 24]
+
+RFC 5389 STUN October 2008
+
+
+ duration of validity or client identity from which it is valid. The
+ client retries the request, this time including its username and the
+ realm, and echoing the nonce provided by the server. The client also
+ includes a message-integrity, which provides an HMAC over the entire
+ request, including the nonce. The server validates the nonce and
+ checks the message integrity. If they match, the request is
+ authenticated. If the nonce is no longer valid, it is considered
+ "stale", and the server rejects the request, providing a new nonce.
+
+ In subsequent requests to the same server, the client reuses the
+ nonce, username, realm, and password it used previously. In this
+ way, subsequent requests are not rejected until the nonce becomes
+ invalid by the server, in which case the rejection provides a new
+ nonce to the client.
+
+ Note that the long-term credential mechanism cannot be used to
+ protect indications, since indications cannot be challenged. Usages
+ utilizing indications must either use a short-term credential or omit
+ authentication and message integrity for them.
+
+ Since the long-term credential mechanism is susceptible to offline
+ dictionary attacks, deployments SHOULD utilize passwords that are
+ difficult to guess. In cases where the credentials are not entered
+ by the user, but are rather placed on a client device during device
+ provisioning, the password SHOULD have at least 128 bits of
+ randomness. In cases where the credentials are entered by the user,
+ they should follow best current practices around password structure.
+
+10.2.1. Forming a Request
+
+ There are two cases when forming a request. In the first case, this
+ is the first request from the client to the server (as identified by
+ its IP address and port). In the second case, the client is
+ submitting a subsequent request once a previous request/response
+ transaction has completed successfully. Forming a request as a
+ consequence of a 401 or 438 error response is covered in
+ Section 10.2.3 and is not considered a "subsequent request" and thus
+ does not utilize the rules described in Section 10.2.1.2.
+
+10.2.1.1. First Request
+
+ If the client has not completed a successful request/response
+ transaction with the server (as identified by hostname, if the DNS
+ procedures of Section 9 are used, else IP address if not), it SHOULD
+ omit the USERNAME, MESSAGE-INTEGRITY, REALM, and NONCE attributes.
+ In other words, the very first request is sent as if there were no
+ authentication or message integrity applied.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 25]
+
+RFC 5389 STUN October 2008
+
+
+10.2.1.2. Subsequent Requests
+
+ Once a request/response transaction has completed successfully, the
+ client will have been presented a realm and nonce by the server, and
+ selected a username and password with which it authenticated. The
+ client SHOULD cache the username, password, realm, and nonce for
+ subsequent communications with the server. When the client sends a
+ subsequent request, it SHOULD include the USERNAME, REALM, and NONCE
+ attributes with these cached values. It SHOULD include a MESSAGE-
+ INTEGRITY attribute, computed as described in Section 15.4 using the
+ cached password.
+
+10.2.2. Receiving a Request
+
+ After the server has done the basic processing of a request, it
+ performs the checks listed below in the order specified:
+
+ o If the message does not contain a MESSAGE-INTEGRITY attribute, the
+ server MUST generate an error response with an error code of 401
+ (Unauthorized). This response MUST include a REALM value. It is
+ RECOMMENDED that the REALM value be the domain name of the
+ provider of the STUN server. The response MUST include a NONCE,
+ selected by the server. The response SHOULD NOT contain a
+ USERNAME or MESSAGE-INTEGRITY attribute.
+
+ o If the message contains a MESSAGE-INTEGRITY attribute, but is
+ missing the USERNAME, REALM, or NONCE attribute, the server MUST
+ generate an error response with an error code of 400 (Bad
+ Request). This response SHOULD NOT include a USERNAME, NONCE,
+ REALM, or MESSAGE-INTEGRITY attribute.
+
+ o If the NONCE is no longer valid, the server MUST generate an error
+ response with an error code of 438 (Stale Nonce). This response
+ MUST include NONCE and REALM attributes and SHOULD NOT include the
+ USERNAME or MESSAGE-INTEGRITY attribute. Servers can invalidate
+ nonces in order to provide additional security. See Section 4.3
+ of [RFC2617] for guidelines.
+
+ o If the username in the USERNAME attribute is not valid, the server
+ MUST generate an error response with an error code of 401
+ (Unauthorized). This response MUST include a REALM value. It is
+ RECOMMENDED that the REALM value be the domain name of the
+ provider of the STUN server. The response MUST include a NONCE,
+ selected by the server. The response SHOULD NOT contain a
+ USERNAME or MESSAGE-INTEGRITY attribute.
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 26]
+
+RFC 5389 STUN October 2008
+
+
+ o Using the password associated with the username in the USERNAME
+ attribute, compute the value for the message integrity as
+ described in Section 15.4. If the resulting value does not match
+ the contents of the MESSAGE-INTEGRITY attribute, the server MUST
+ reject the request with an error response. This response MUST use
+ an error code of 401 (Unauthorized). It MUST include REALM and
+ NONCE attributes and SHOULD NOT include the USERNAME or MESSAGE-
+ INTEGRITY attribute.
+
+ If these checks pass, the server continues to process the request.
+ Any response generated by the server (excepting the cases described
+ above) MUST include the MESSAGE-INTEGRITY attribute, computed using
+ the username and password utilized to authenticate the request. The
+ REALM, NONCE, and USERNAME attributes SHOULD NOT be included.
+
+10.2.3. Receiving a Response
+
+ If the response is an error response with an error code of 401
+ (Unauthorized), the client SHOULD retry the request with a new
+ transaction. This request MUST contain a USERNAME, determined by the
+ client as the appropriate username for the REALM from the error
+ response. The request MUST contain the REALM, copied from the error
+ response. The request MUST contain the NONCE, copied from the error
+ response. The request MUST contain the MESSAGE-INTEGRITY attribute,
+ computed using the password associated with the username in the
+ USERNAME attribute. The client MUST NOT perform this retry if it is
+ not changing the USERNAME or REALM or its associated password, from
+ the previous attempt.
+
+ If the response is an error response with an error code of 438 (Stale
+ Nonce), the client MUST retry the request, using the new NONCE
+ supplied in the 438 (Stale Nonce) response. This retry MUST also
+ include the USERNAME, REALM, and MESSAGE-INTEGRITY.
+
+ The client looks for the MESSAGE-INTEGRITY attribute in the response
+ (either success or failure). If present, the client computes the
+ message integrity over the response as defined in Section 15.4, using
+ the same password it utilized for the request. If the resulting
+ value matches the contents of the MESSAGE-INTEGRITY attribute, the
+ response is considered authenticated. If the value does not match,
+ or if MESSAGE-INTEGRITY was absent, the response MUST be discarded,
+ as if it was never received. This means that retransmits, if
+ applicable, will continue.
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 27]
+
+RFC 5389 STUN October 2008
+
+
+11. ALTERNATE-SERVER Mechanism
+
+ This section describes a mechanism in STUN that allows a server to
+ redirect a client to another server. This extension is optional, and
+ a usage must define if and when this extension is used.
+
+ A server using this extension redirects a client to another server by
+ replying to a request message with an error response message with an
+ error code of 300 (Try Alternate). The server MUST include an
+ ALTERNATE-SERVER attribute in the error response. The error response
+ message MAY be authenticated; however, there are uses cases for
+ ALTERNATE-SERVER where authentication of the response is not possible
+ or practical.
+
+ A client using this extension handles a 300 (Try Alternate) error
+ code as follows. The client looks for an ALTERNATE-SERVER attribute
+ in the error response. If one is found, then the client considers
+ the current transaction as failed, and reattempts the request with
+ the server specified in the attribute, using the same transport
+ protocol used for the previous request. That request, if
+ authenticated, MUST utilize the same credentials that the client
+ would have used in the request to the server that performed the
+ redirection. If the client has been redirected to a server on which
+ it has already tried this request within the last five minutes, it
+ MUST ignore the redirection and consider the transaction to have
+ failed. This prevents infinite ping-ponging between servers in case
+ of redirection loops.
+
+12. Backwards Compatibility with RFC 3489
+
+ This section defines procedures that allow a degree of backwards
+ compatibility with the original protocol defined in RFC 3489
+ [RFC3489]. This mechanism is optional, meant to be utilized only in
+ cases where a new client can connect to an old server, or vice versa.
+ A usage must define if and when this procedure is used.
+
+ Section 19 lists all the changes between this specification and RFC
+ 3489 [RFC3489]. However, not all of these differences are important,
+ because "classic STUN" was only used in a few specific ways. For the
+ purposes of this extension, the important changes are the following.
+ In RFC 3489:
+
+ o UDP was the only supported transport.
+
+ o The field that is now the magic cookie field was a part of the
+ transaction ID field, and transaction IDs were 128 bits long.
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 28]
+
+RFC 5389 STUN October 2008
+
+
+ o The XOR-MAPPED-ADDRESS attribute did not exist, and the Binding
+ method used the MAPPED-ADDRESS attribute instead.
+
+ o There were three comprehension-required attributes, RESPONSE-
+ ADDRESS, CHANGE-REQUEST, and CHANGED-ADDRESS, that have been
+ removed from this specification.
+
+ * CHANGE-REQUEST and CHANGED-ADDRESS are now part of the NAT
+ Behavior Discovery usage [BEHAVE-NAT], and the other is
+ deprecated.
+
+12.1. Changes to Client Processing
+
+ A client that wants to interoperate with an [RFC3489] server SHOULD
+ send a request message that uses the Binding method, contains no
+ attributes, and uses UDP as the transport protocol to the server. If
+ successful, the success response received from the server will
+ contain a MAPPED-ADDRESS attribute rather than an XOR-MAPPED-ADDRESS
+ attribute. A client seeking to interoperate with an older server
+ MUST be prepared to receive either. Furthermore, the client MUST
+ ignore any Reserved comprehension-required attributes that might
+ appear in the response. Of the Reserved attributes in Section 18.2,
+ 0x0002, 0x0004, 0x0005, and 0x000B may appear in Binding responses
+ from a server compliant to RFC 3489. Other than this change, the
+ processing of the response is identical to the procedures described
+ above.
+
+12.2. Changes to Server Processing
+
+ A STUN server can detect when a given Binding request message was
+ sent from an RFC 3489 [RFC3489] client by the absence of the correct
+ value in the magic cookie field. When the server detects an RFC 3489
+ client, it SHOULD copy the value seen in the magic cookie field in
+ the Binding request to the magic cookie field in the Binding response
+ message, and insert a MAPPED-ADDRESS attribute instead of an XOR-
+ MAPPED-ADDRESS attribute.
+
+ The client might, in rare situations, include either the RESPONSE-
+ ADDRESS or CHANGE-REQUEST attributes. In these situations, the
+ server will view these as unknown comprehension-required attributes
+ and reply with an error response. Since the mechanisms utilizing
+ those attributes are no longer supported, this behavior is
+ acceptable.
+
+ The RFC 3489 version of STUN lacks both the magic cookie and the
+ FINGERPRINT attribute that allows for a very high probability of
+ correctly identifying STUN messages when multiplexed with other
+ protocols. Therefore, STUN implementations that are backwards
+
+
+
+Rosenberg, et al. Standards Track [Page 29]
+
+RFC 5389 STUN October 2008
+
+
+ compatible with RFC 3489 SHOULD NOT be used in cases where STUN will
+ be multiplexed with another protocol. However, that should not be an
+ issue as such multiplexing was not available in RFC 3489.
+
+13. Basic Server Behavior
+
+ This section defines the behavior of a basic, stand-alone STUN
+ server. A basic STUN server provides clients with server reflexive
+ transport addresses by receiving and replying to STUN Binding
+ requests.
+
+ The STUN server MUST support the Binding method. It SHOULD NOT
+ utilize the short-term or long-term credential mechanism. This is
+ because the work involved in authenticating the request is more than
+ the work in simply processing it. It SHOULD NOT utilize the
+ ALTERNATE-SERVER mechanism for the same reason. It MUST support UDP
+ and TCP. It MAY support STUN over TCP/TLS; however, TLS provides
+ minimal security benefits in this basic mode of operation. It MAY
+ utilize the FINGERPRINT mechanism but MUST NOT require it. Since the
+ stand-alone server only runs STUN, FINGERPRINT provides no benefit.
+ Requiring it would break compatibility with RFC 3489, and such
+ compatibility is desirable in a stand-alone server. Stand-alone STUN
+ servers SHOULD support backwards compatibility with [RFC3489]
+ clients, as described in Section 12.
+
+ It is RECOMMENDED that administrators of STUN servers provide DNS
+ entries for those servers as described in Section 9.
+
+ A basic STUN server is not a solution for NAT traversal by itself.
+ However, it can be utilized as part of a solution through STUN
+ usages. This is discussed further in Section 14.
+
+14. STUN Usages
+
+ STUN by itself is not a solution to the NAT traversal problem.
+ Rather, STUN defines a tool that can be used inside a larger
+ solution. The term "STUN usage" is used for any solution that uses
+ STUN as a component.
+
+ At the time of writing, three STUN usages are defined: Interactive
+ Connectivity Establishment (ICE) [MMUSIC-ICE], Client-initiated
+ connections for SIP [SIP-OUTBOUND], and NAT Behavior Discovery
+ [BEHAVE-NAT]. Other STUN usages may be defined in the future.
+
+ A STUN usage defines how STUN is actually utilized -- when to send
+ requests, what to do with the responses, and which optional
+ procedures defined here (or in an extension to STUN) are to be used.
+ A usage would also define:
+
+
+
+Rosenberg, et al. Standards Track [Page 30]
+
+RFC 5389 STUN October 2008
+
+
+ o Which STUN methods are used.
+
+ o What authentication and message-integrity mechanisms are used.
+
+ o The considerations around manual vs. automatic key derivation for
+ the integrity mechanism, as discussed in [RFC4107].
+
+ o What mechanisms are used to distinguish STUN messages from other
+ messages. When STUN is run over TCP, a framing mechanism may be
+ required.
+
+ o How a STUN client determines the IP address and port of the STUN
+ server.
+
+ o Whether backwards compatibility to RFC 3489 is required.
+
+ o What optional attributes defined here (such as FINGERPRINT and
+ ALTERNATE-SERVER) or in other extensions are required.
+
+ In addition, any STUN usage must consider the security implications
+ of using STUN in that usage. A number of attacks against STUN are
+ known (see the Security Considerations section in this document), and
+ any usage must consider how these attacks can be thwarted or
+ mitigated.
+
+ Finally, a usage must consider whether its usage of STUN is an
+ example of the Unilateral Self-Address Fixing approach to NAT
+ traversal, and if so, address the questions raised in RFC 3424
+ [RFC3424].
+
+15. STUN Attributes
+
+ After the STUN header are zero or more attributes. Each attribute
+ MUST be TLV encoded, with a 16-bit type, 16-bit length, and value.
+ Each STUN attribute MUST end on a 32-bit boundary. As mentioned
+ above, all fields in an attribute are transmitted most significant
+ bit first.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Value (variable) ....
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 4: Format of STUN Attributes
+
+
+
+
+Rosenberg, et al. Standards Track [Page 31]
+
+RFC 5389 STUN October 2008
+
+
+ The value in the length field MUST contain the length of the Value
+ part of the attribute, prior to padding, measured in bytes. Since
+ STUN aligns attributes on 32-bit boundaries, attributes whose content
+ is not a multiple of 4 bytes are padded with 1, 2, or 3 bytes of
+ padding so that its value contains a multiple of 4 bytes. The
+ padding bits are ignored, and may be any value.
+
+ Any attribute type MAY appear more than once in a STUN message.
+ Unless specified otherwise, the order of appearance is significant:
+ only the first occurrence needs to be processed by a receiver, and
+ any duplicates MAY be ignored by a receiver.
+
+ To allow future revisions of this specification to add new attributes
+ if needed, the attribute space is divided into two ranges.
+ Attributes with type values between 0x0000 and 0x7FFF are
+ comprehension-required attributes, which means that the STUN agent
+ cannot successfully process the message unless it understands the
+ attribute. Attributes with type values between 0x8000 and 0xFFFF are
+ comprehension-optional attributes, which means that those attributes
+ can be ignored by the STUN agent if it does not understand them.
+
+ The set of STUN attribute types is maintained by IANA. The initial
+ set defined by this specification is found in Section 18.2.
+
+ The rest of this section describes the format of the various
+ attributes defined in this specification.
+
+15.1. MAPPED-ADDRESS
+
+ The MAPPED-ADDRESS attribute indicates a reflexive transport address
+ of the client. It consists of an 8-bit address family and a 16-bit
+ port, followed by a fixed-length value representing the IP address.
+ If the address family is IPv4, the address MUST be 32 bits. If the
+ address family is IPv6, the address MUST be 128 bits. All fields
+ must be in network byte order.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 32]
+
+RFC 5389 STUN October 2008
+
+
+ The format of the MAPPED-ADDRESS attribute is:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |0 0 0 0 0 0 0 0| Family | Port |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ | Address (32 bits or 128 bits) |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 5: Format of MAPPED-ADDRESS Attribute
+
+ The address family can take on the following values:
+
+ 0x01:IPv4
+ 0x02:IPv6
+
+ The first 8 bits of the MAPPED-ADDRESS MUST be set to 0 and MUST be
+ ignored by receivers. These bits are present for aligning parameters
+ on natural 32-bit boundaries.
+
+ This attribute is used only by servers for achieving backwards
+ compatibility with RFC 3489 [RFC3489] clients.
+
+15.2. XOR-MAPPED-ADDRESS
+
+ The XOR-MAPPED-ADDRESS attribute is identical to the MAPPED-ADDRESS
+ attribute, except that the reflexive transport address is obfuscated
+ through the XOR function.
+
+ The format of the XOR-MAPPED-ADDRESS is:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |x x x x x x x x| Family | X-Port |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | X-Address (Variable)
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 6: Format of XOR-MAPPED-ADDRESS Attribute
+
+ The Family represents the IP address family, and is encoded
+ identically to the Family in MAPPED-ADDRESS.
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 33]
+
+RFC 5389 STUN October 2008
+
+
+ X-Port is computed by taking the mapped port in host byte order,
+ XOR'ing it with the most significant 16 bits of the magic cookie, and
+ then the converting the result to network byte order. If the IP
+ address family is IPv4, X-Address is computed by taking the mapped IP
+ address in host byte order, XOR'ing it with the magic cookie, and
+ converting the result to network byte order. If the IP address
+ family is IPv6, X-Address is computed by taking the mapped IP address
+ in host byte order, XOR'ing it with the concatenation of the magic
+ cookie and the 96-bit transaction ID, and converting the result to
+ network byte order.
+
+ The rules for encoding and processing the first 8 bits of the
+ attribute's value, the rules for handling multiple occurrences of the
+ attribute, and the rules for processing address families are the same
+ as for MAPPED-ADDRESS.
+
+ Note: XOR-MAPPED-ADDRESS and MAPPED-ADDRESS differ only in their
+ encoding of the transport address. The former encodes the transport
+ address by exclusive-or'ing it with the magic cookie. The latter
+ encodes it directly in binary. RFC 3489 originally specified only
+ MAPPED-ADDRESS. However, deployment experience found that some NATs
+ rewrite the 32-bit binary payloads containing the NAT's public IP
+ address, such as STUN's MAPPED-ADDRESS attribute, in the well-meaning
+ but misguided attempt at providing a generic ALG function. Such
+ behavior interferes with the operation of STUN and also causes
+ failure of STUN's message-integrity checking.
+
+15.3. USERNAME
+
+ The USERNAME attribute is used for message integrity. It identifies
+ the username and password combination used in the message-integrity
+ check.
+
+ The value of USERNAME is a variable-length value. It MUST contain a
+ UTF-8 [RFC3629] encoded sequence of less than 513 bytes, and MUST
+ have been processed using SASLprep [RFC4013].
+
+15.4. MESSAGE-INTEGRITY
+
+ The MESSAGE-INTEGRITY attribute contains an HMAC-SHA1 [RFC2104] of
+ the STUN message. The MESSAGE-INTEGRITY attribute can be present in
+ any STUN message type. Since it uses the SHA1 hash, the HMAC will be
+ 20 bytes. The text used as input to HMAC is the STUN message,
+ including the header, up to and including the attribute preceding the
+ MESSAGE-INTEGRITY attribute. With the exception of the FINGERPRINT
+ attribute, which appears after MESSAGE-INTEGRITY, agents MUST ignore
+ all other attributes that follow MESSAGE-INTEGRITY.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 34]
+
+RFC 5389 STUN October 2008
+
+
+ The key for the HMAC depends on whether long-term or short-term
+ credentials are in use. For long-term credentials, the key is 16
+ bytes:
+
+ key = MD5(username ":" realm ":" SASLprep(password))
+
+ That is, the 16-byte key is formed by taking the MD5 hash of the
+ result of concatenating the following five fields: (1) the username,
+ with any quotes and trailing nulls removed, as taken from the
+ USERNAME attribute (in which case SASLprep has already been applied);
+ (2) a single colon; (3) the realm, with any quotes and trailing nulls
+ removed; (4) a single colon; and (5) the password, with any trailing
+ nulls removed and after processing using SASLprep. For example, if
+ the username was 'user', the realm was 'realm', and the password was
+ 'pass', then the 16-byte HMAC key would be the result of performing
+ an MD5 hash on the string 'user:realm:pass', the resulting hash being
+ 0x8493fbc53ba582fb4c044c456bdc40eb.
+
+ For short-term credentials:
+
+ key = SASLprep(password)
+
+ where MD5 is defined in RFC 1321 [RFC1321] and SASLprep() is defined
+ in RFC 4013 [RFC4013].
+
+ The structure of the key when used with long-term credentials
+ facilitates deployment in systems that also utilize SIP. Typically,
+ SIP systems utilizing SIP's digest authentication mechanism do not
+ actually store the password in the database. Rather, they store a
+ value called H(A1), which is equal to the key defined above.
+
+ Based on the rules above, the hash used to construct MESSAGE-
+ INTEGRITY includes the length field from the STUN message header.
+ Prior to performing the hash, the MESSAGE-INTEGRITY attribute MUST be
+ inserted into the message (with dummy content). The length MUST then
+ be set to point to the length of the message up to, and including,
+ the MESSAGE-INTEGRITY attribute itself, but excluding any attributes
+ after it. Once the computation is performed, the value of the
+ MESSAGE-INTEGRITY attribute can be filled in, and the value of the
+ length in the STUN header can be set to its correct value -- the
+ length of the entire message. Similarly, when validating the
+ MESSAGE-INTEGRITY, the length field should be adjusted to point to
+ the end of the MESSAGE-INTEGRITY attribute prior to calculating the
+ HMAC. Such adjustment is necessary when attributes, such as
+ FINGERPRINT, appear after MESSAGE-INTEGRITY.
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 35]
+
+RFC 5389 STUN October 2008
+
+
+15.5. FINGERPRINT
+
+ The FINGERPRINT attribute MAY be present in all STUN messages. The
+ value of the attribute is computed as the CRC-32 of the STUN message
+ up to (but excluding) the FINGERPRINT attribute itself, XOR'ed with
+ the 32-bit value 0x5354554e (the XOR helps in cases where an
+ application packet is also using CRC-32 in it). The 32-bit CRC is
+ the one defined in ITU V.42 [ITU.V42.2002], which has a generator
+ polynomial of x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x+1.
+ When present, the FINGERPRINT attribute MUST be the last attribute in
+ the message, and thus will appear after MESSAGE-INTEGRITY.
+
+ The FINGERPRINT attribute can aid in distinguishing STUN packets from
+ packets of other protocols. See Section 8.
+
+ As with MESSAGE-INTEGRITY, the CRC used in the FINGERPRINT attribute
+ covers the length field from the STUN message header. Therefore,
+ this value must be correct and include the CRC attribute as part of
+ the message length, prior to computation of the CRC. When using the
+ FINGERPRINT attribute in a message, the attribute is first placed
+ into the message with a dummy value, then the CRC is computed, and
+ then the value of the attribute is updated. If the MESSAGE-INTEGRITY
+ attribute is also present, then it must be present with the correct
+ message-integrity value before the CRC is computed, since the CRC is
+ done over the value of the MESSAGE-INTEGRITY attribute as well.
+
+15.6. ERROR-CODE
+
+ The ERROR-CODE attribute is used in error response messages. It
+ contains a numeric error code value in the range of 300 to 699 plus a
+ textual reason phrase encoded in UTF-8 [RFC3629], and is consistent
+ in its code assignments and semantics with SIP [RFC3261] and HTTP
+ [RFC2616]. The reason phrase is meant for user consumption, and can
+ be anything appropriate for the error code. Recommended reason
+ phrases for the defined error codes are included in the IANA registry
+ for error codes. The reason phrase MUST be a UTF-8 [RFC3629] encoded
+ sequence of less than 128 characters (which can be as long as 763
+ bytes).
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Reserved, should be 0 |Class| Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Reason Phrase (variable) ..
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 7: ERROR-CODE Attribute
+
+
+
+Rosenberg, et al. Standards Track [Page 36]
+
+RFC 5389 STUN October 2008
+
+
+ To facilitate processing, the class of the error code (the hundreds
+ digit) is encoded separately from the rest of the code, as shown in
+ Figure 7.
+
+ The Reserved bits SHOULD be 0, and are for alignment on 32-bit
+ boundaries. Receivers MUST ignore these bits. The Class represents
+ the hundreds digit of the error code. The value MUST be between 3
+ and 6. The Number represents the error code modulo 100, and its
+ value MUST be between 0 and 99.
+
+ The following error codes, along with their recommended reason
+ phrases, are defined:
+
+ 300 Try Alternate: The client should contact an alternate server for
+ this request. This error response MUST only be sent if the
+ request included a USERNAME attribute and a valid MESSAGE-
+ INTEGRITY attribute; otherwise, it MUST NOT be sent and error
+ code 400 (Bad Request) is suggested. This error response MUST
+ be protected with the MESSAGE-INTEGRITY attribute, and receivers
+ MUST validate the MESSAGE-INTEGRITY of this response before
+ redirecting themselves to an alternate server.
+
+ Note: Failure to generate and validate message integrity
+ for a 300 response allows an on-path attacker to falsify a
+ 300 response thus causing subsequent STUN messages to be
+ sent to a victim.
+
+ 400 Bad Request: The request was malformed. The client SHOULD NOT
+ retry the request without modification from the previous
+ attempt. The server may not be able to generate a valid
+ MESSAGE-INTEGRITY for this error, so the client MUST NOT expect
+ a valid MESSAGE-INTEGRITY attribute on this response.
+
+ 401 Unauthorized: The request did not contain the correct
+ credentials to proceed. The client should retry the request
+ with proper credentials.
+
+ 420 Unknown Attribute: The server received a STUN packet containing
+ a comprehension-required attribute that it did not understand.
+ The server MUST put this unknown attribute in the UNKNOWN-
+ ATTRIBUTE attribute of its error response.
+
+ 438 Stale Nonce: The NONCE used by the client was no longer valid.
+ The client should retry, using the NONCE provided in the
+ response.
+
+ 500 Server Error: The server has suffered a temporary error. The
+ client should try again.
+
+
+
+Rosenberg, et al. Standards Track [Page 37]
+
+RFC 5389 STUN October 2008
+
+
+15.7. REALM
+
+ The REALM attribute may be present in requests and responses. It
+ contains text that meets the grammar for "realm-value" as described
+ in RFC 3261 [RFC3261] but without the double quotes and their
+ surrounding whitespace. That is, it is an unquoted realm-value (and
+ is therefore a sequence of qdtext or quoted-pair). It MUST be a
+ UTF-8 [RFC3629] encoded sequence of less than 128 characters (which
+ can be as long as 763 bytes), and MUST have been processed using
+ SASLprep [RFC4013].
+
+ Presence of the REALM attribute in a request indicates that long-term
+ credentials are being used for authentication. Presence in certain
+ error responses indicates that the server wishes the client to use a
+ long-term credential for authentication.
+
+15.8. NONCE
+
+ The NONCE attribute may be present in requests and responses. It
+ contains a sequence of qdtext or quoted-pair, which are defined in
+ RFC 3261 [RFC3261]. Note that this means that the NONCE attribute
+ will not contain actual quote characters. See RFC 2617 [RFC2617],
+ Section 4.3, for guidance on selection of nonce values in a server.
+
+ It MUST be less than 128 characters (which can be as long as 763
+ bytes).
+
+15.9. UNKNOWN-ATTRIBUTES
+
+ The UNKNOWN-ATTRIBUTES attribute is present only in an error response
+ when the response code in the ERROR-CODE attribute is 420.
+
+ The attribute contains a list of 16-bit values, each of which
+ represents an attribute type that was not understood by the server.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Attribute 1 Type | Attribute 2 Type |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Attribute 3 Type | Attribute 4 Type ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Figure 8: Format of UNKNOWN-ATTRIBUTES Attribute
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 38]
+
+RFC 5389 STUN October 2008
+
+
+ Note: In [RFC3489], this field was padded to 32 by duplicating the
+ last attribute. In this version of the specification, the normal
+ padding rules for attributes are used instead.
+
+15.10. SOFTWARE
+
+ The SOFTWARE attribute contains a textual description of the software
+ being used by the agent sending the message. It is used by clients
+ and servers. Its value SHOULD include manufacturer and version
+ number. The attribute has no impact on operation of the protocol,
+ and serves only as a tool for diagnostic and debugging purposes. The
+ value of SOFTWARE is variable length. It MUST be a UTF-8 [RFC3629]
+ encoded sequence of less than 128 characters (which can be as long as
+ 763 bytes).
+
+15.11. ALTERNATE-SERVER
+
+ The alternate server represents an alternate transport address
+ identifying a different STUN server that the STUN client should try.
+
+ It is encoded in the same way as MAPPED-ADDRESS, and thus refers to a
+ single server by IP address. The IP address family MUST be identical
+ to that of the source IP address of the request.
+
+16. Security Considerations
+
+16.1. Attacks against the Protocol
+
+16.1.1. Outside Attacks
+
+ An attacker can try to modify STUN messages in transit, in order to
+ cause a failure in STUN operation. These attacks are detected for
+ both requests and responses through the message-integrity mechanism,
+ using either a short-term or long-term credential. Of course, once
+ detected, the manipulated packets will be dropped, causing the STUN
+ transaction to effectively fail. This attack is possible only by an
+ on-path attacker.
+
+ An attacker that can observe, but not modify, STUN messages in-
+ transit (for example, an attacker present on a shared access medium,
+ such as Wi-Fi), can see a STUN request, and then immediately send a
+ STUN response, typically an error response, in order to disrupt STUN
+ processing. This attack is also prevented for messages that utilize
+ MESSAGE-INTEGRITY. However, some error responses, those related to
+ authentication in particular, cannot be protected by MESSAGE-
+ INTEGRITY. When STUN itself is run over a secure transport protocol
+ (e.g., TLS), these attacks are completely mitigated.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 39]
+
+RFC 5389 STUN October 2008
+
+
+ Depending on the STUN usage, these attacks may be of minimal
+ consequence and thus do not require message integrity to mitigate.
+ For example, when STUN is used to a basic STUN server to discover a
+ server reflexive candidate for usage with ICE, authentication and
+ message integrity are not required since these attacks are detected
+ during the connectivity check phase. The connectivity checks
+ themselves, however, require protection for proper operation of ICE
+ overall. As described in Section 14, STUN usages describe when
+ authentication and message integrity are needed.
+
+ Since STUN uses the HMAC of a shared secret for authentication and
+ integrity protection, it is subject to offline dictionary attacks.
+ When authentication is utilized, it SHOULD be with a strong password
+ that is not readily subject to offline dictionary attacks.
+ Protection of the channel itself, using TLS, mitigates these attacks.
+ However, STUN is most often run over UDP and in those cases, strong
+ passwords are the only way to protect against these attacks.
+
+16.1.2. Inside Attacks
+
+ A rogue client may try to launch a DoS attack against a server by
+ sending it a large number of STUN requests. Fortunately, STUN
+ requests can be processed statelessly by a server, making such
+ attacks hard to launch.
+
+ A rogue client may use a STUN server as a reflector, sending it
+ requests with a falsified source IP address and port. In such a
+ case, the response would be delivered to that source IP and port.
+ There is no amplification of the number of packets with this attack
+ (the STUN server sends one packet for each packet sent by the
+ client), though there is a small increase in the amount of data,
+ since STUN responses are typically larger than requests. This attack
+ is mitigated by ingress source address filtering.
+
+ Revealing the specific software version of the agent through the
+ SOFTWARE attribute might allow them to become more vulnerable to
+ attacks against software that is known to contain security holes.
+ Implementers SHOULD make usage of the SOFTWARE attribute a
+ configurable option.
+
+16.2. Attacks Affecting the Usage
+
+ This section lists attacks that might be launched against a usage of
+ STUN. Each STUN usage must consider whether these attacks are
+ applicable to it, and if so, discuss counter-measures.
+
+ Most of the attacks in this section revolve around an attacker
+ modifying the reflexive address learned by a STUN client through a
+
+
+
+Rosenberg, et al. Standards Track [Page 40]
+
+RFC 5389 STUN October 2008
+
+
+ Binding request/response transaction. Since the usage of the
+ reflexive address is a function of the usage, the applicability and
+ remediation of these attacks are usage-specific. In common
+ situations, modification of the reflexive address by an on-path
+ attacker is easy to do. Consider, for example, the common situation
+ where STUN is run directly over UDP. In this case, an on-path
+ attacker can modify the source IP address of the Binding request
+ before it arrives at the STUN server. The STUN server will then
+ return this IP address in the XOR-MAPPED-ADDRESS attribute to the
+ client, and send the response back to that (falsified) IP address and
+ port. If the attacker can also intercept this response, it can
+ direct it back towards the client. Protecting against this attack by
+ using a message-integrity check is impossible, since a message-
+ integrity value cannot cover the source IP address, since the
+ intervening NAT must be able to modify this value. Instead, one
+ solution to preventing the attacks listed below is for the client to
+ verify the reflexive address learned, as is done in ICE [MMUSIC-ICE].
+ Other usages may use other means to prevent these attacks.
+
+16.2.1. Attack I: Distributed DoS (DDoS) against a Target
+
+ In this attack, the attacker provides one or more clients with the
+ same faked reflexive address that points to the intended target.
+ This will trick the STUN clients into thinking that their reflexive
+ addresses are equal to that of the target. If the clients hand out
+ that reflexive address in order to receive traffic on it (for
+ example, in SIP messages), the traffic will instead be sent to the
+ target. This attack can provide substantial amplification,
+ especially when used with clients that are using STUN to enable
+ multimedia applications. However, it can only be launched against
+ targets for which packets from the STUN server to the target pass
+ through the attacker, limiting the cases in which it is possible.
+
+16.2.2. Attack II: Silencing a Client
+
+ In this attack, the attacker provides a STUN client with a faked
+ reflexive address. The reflexive address it provides is a transport
+ address that routes to nowhere. As a result, the client won't
+ receive any of the packets it expects to receive when it hands out
+ the reflexive address. This exploitation is not very interesting for
+ the attacker. It impacts a single client, which is frequently not
+ the desired target. Moreover, any attacker that can mount the attack
+ could also deny service to the client by other means, such as
+ preventing the client from receiving any response from the STUN
+ server, or even a DHCP server. As with the attack in Section 16.2.1,
+ this attack is only possible when the attacker is on path for packets
+ sent from the STUN server towards this unused IP address.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 41]
+
+RFC 5389 STUN October 2008
+
+
+16.2.3. Attack III: Assuming the Identity of a Client
+
+ This attack is similar to attack II. However, the faked reflexive
+ address points to the attacker itself. This allows the attacker to
+ receive traffic that was destined for the client.
+
+16.2.4. Attack IV: Eavesdropping
+
+ In this attack, the attacker forces the client to use a reflexive
+ address that routes to itself. It then forwards any packets it
+ receives to the client. This attack would allow the attacker to
+ observe all packets sent to the client. However, in order to launch
+ the attack, the attacker must have already been able to observe
+ packets from the client to the STUN server. In most cases (such as
+ when the attack is launched from an access network), this means that
+ the attacker could already observe packets sent to the client. This
+ attack is, as a result, only useful for observing traffic by
+ attackers on the path from the client to the STUN server, but not
+ generally on the path of packets being routed towards the client.
+
+16.3. Hash Agility Plan
+
+ This specification uses HMAC-SHA-1 for computation of the message
+ integrity. If, at a later time, HMAC-SHA-1 is found to be
+ compromised, the following is the remedy that will be applied.
+
+ We will define a STUN extension that introduces a new message-
+ integrity attribute, computed using a new hash. Clients would be
+ required to include both the new and old message-integrity attributes
+ in their requests or indications. A new server will utilize the new
+ message-integrity attribute, and an old one, the old. After a
+ transition period where mixed implementations are in deployment, the
+ old message-integrity attribute will be deprecated by another
+ specification, and clients will cease including it in requests.
+
+ It is also important to note that the HMAC is done using a key that
+ is itself computed using an MD5 of the user's password. The choice
+ of the MD5 hash was made because of the existence of legacy databases
+ that store passwords in that form. If future work finds that an HMAC
+ of an MD5 input is not secure, and a different hash is needed, it can
+ also be changed using this plan. However, this would require
+ administrators to repopulate their databases.
+
+17. IAB Considerations
+
+ The IAB has studied the problem of Unilateral Self-Address Fixing
+ (UNSAF), which is the general process by which a client attempts to
+ determine its address in another realm on the other side of a NAT
+
+
+
+Rosenberg, et al. Standards Track [Page 42]
+
+RFC 5389 STUN October 2008
+
+
+ through a collaborative protocol reflection mechanism (RFC3424
+ [RFC3424]). STUN can be used to perform this function using a
+ Binding request/response transaction if one agent is behind a NAT and
+ the other is on the public side of the NAT.
+
+ The IAB has mandated that protocols developed for this purpose
+ document a specific set of considerations. Because some STUN usages
+ provide UNSAF functions (such as ICE [MMUSIC-ICE] ), and others do
+ not (such as SIP Outbound [SIP-OUTBOUND]), answers to these
+ considerations need to be addressed by the usages themselves.
+
+18. IANA Considerations
+
+ IANA has created three new registries: a "STUN Methods Registry", a
+ "STUN Attributes Registry", and a "STUN Error Codes Registry". IANA
+ has also changed the name of the assigned IANA port for STUN from
+ "nat-stun-port" to "stun".
+
+18.1. STUN Methods Registry
+
+ A STUN method is a hex number in the range 0x000 - 0xFFF. The
+ encoding of STUN method into a STUN message is described in
+ Section 6.
+
+ The initial STUN methods are:
+
+ 0x000: (Reserved)
+ 0x001: Binding
+ 0x002: (Reserved; was SharedSecret)
+
+ STUN methods in the range 0x000 - 0x7FF are assigned by IETF Review
+ [RFC5226]. STUN methods in the range 0x800 - 0xFFF are assigned by
+ Designated Expert [RFC5226]. The responsibility of the expert is to
+ verify that the selected codepoint(s) are not in use and that the
+ request is not for an abnormally large number of codepoints.
+ Technical review of the extension itself is outside the scope of the
+ designated expert responsibility.
+
+18.2. STUN Attribute Registry
+
+ A STUN Attribute type is a hex number in the range 0x0000 - 0xFFFF.
+ STUN attribute types in the range 0x0000 - 0x7FFF are considered
+ comprehension-required; STUN attribute types in the range 0x8000 -
+ 0xFFFF are considered comprehension-optional. A STUN agent handles
+ unknown comprehension-required and comprehension-optional attributes
+ differently.
+
+ The initial STUN Attributes types are:
+
+
+
+Rosenberg, et al. Standards Track [Page 43]
+
+RFC 5389 STUN October 2008
+
+
+ Comprehension-required range (0x0000-0x7FFF):
+ 0x0000: (Reserved)
+ 0x0001: MAPPED-ADDRESS
+ 0x0002: (Reserved; was RESPONSE-ADDRESS)
+ 0x0003: (Reserved; was CHANGE-ADDRESS)
+ 0x0004: (Reserved; was SOURCE-ADDRESS)
+ 0x0005: (Reserved; was CHANGED-ADDRESS)
+ 0x0006: USERNAME
+ 0x0007: (Reserved; was PASSWORD)
+ 0x0008: MESSAGE-INTEGRITY
+ 0x0009: ERROR-CODE
+ 0x000A: UNKNOWN-ATTRIBUTES
+ 0x000B: (Reserved; was REFLECTED-FROM)
+ 0x0014: REALM
+ 0x0015: NONCE
+ 0x0020: XOR-MAPPED-ADDRESS
+
+ Comprehension-optional range (0x8000-0xFFFF)
+ 0x8022: SOFTWARE
+ 0x8023: ALTERNATE-SERVER
+ 0x8028: FINGERPRINT
+
+ STUN Attribute types in the first half of the comprehension-required
+ range (0x0000 - 0x3FFF) and in the first half of the comprehension-
+ optional range (0x8000 - 0xBFFF) are assigned by IETF Review
+ [RFC5226]. STUN Attribute types in the second half of the
+ comprehension-required range (0x4000 - 0x7FFF) and in the second half
+ of the comprehension-optional range (0xC000 - 0xFFFF) are assigned by
+ Designated Expert [RFC5226]. The responsibility of the expert is to
+ verify that the selected codepoint(s) are not in use, and that the
+ request is not for an abnormally large number of codepoints.
+ Technical review of the extension itself is outside the scope of the
+ designated expert responsibility.
+
+18.3. STUN Error Code Registry
+
+ A STUN error code is a number in the range 0 - 699. STUN error codes
+ are accompanied by a textual reason phrase in UTF-8 [RFC3629] that is
+ intended only for human consumption and can be anything appropriate;
+ this document proposes only suggested values.
+
+ STUN error codes are consistent in codepoint assignments and
+ semantics with SIP [RFC3261] and HTTP [RFC2616].
+
+ The initial values in this registry are given in Section 15.6.
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 44]
+
+RFC 5389 STUN October 2008
+
+
+ New STUN error codes are assigned based on IETF Review [RFC5226].
+ The specification must carefully consider how clients that do not
+ understand this error code will process it before granting the
+ request. See the rules in Section 7.3.4.
+
+18.4. STUN UDP and TCP Port Numbers
+
+ IANA has previously assigned port 3478 for STUN. This port appears
+ in the IANA registry under the moniker "nat-stun-port". In order to
+ align the DNS SRV procedures with the registered protocol service,
+ IANA is requested to change the name of protocol assigned to port
+ 3478 from "nat-stun-port" to "stun", and the textual name from
+ "Simple Traversal of UDP Through NAT (STUN)" to "Session Traversal
+ Utilities for NAT", so that the IANA port registry would read:
+
+ stun 3478/tcp Session Traversal Utilities for NAT (STUN) port
+ stun 3478/udp Session Traversal Utilities for NAT (STUN) port
+
+ In addition, IANA has assigned port number 5349 for the "stuns"
+ service, defined over TCP and UDP. The UDP port is not currently
+ defined; however, it is reserved for future use.
+
+19. Changes since RFC 3489
+
+ This specification obsoletes RFC 3489 [RFC3489]. This specification
+ differs from RFC 3489 in the following ways:
+
+ o Removed the notion that STUN is a complete NAT traversal solution.
+ STUN is now a tool that can be used to produce a NAT traversal
+ solution. As a consequence, changed the name of the protocol to
+ Session Traversal Utilities for NAT.
+
+ o Introduced the concept of STUN usages, and described what a usage
+ of STUN must document.
+
+ o Removed the usage of STUN for NAT type detection and binding
+ lifetime discovery. These techniques have proven overly brittle
+ due to wider variations in the types of NAT devices than described
+ in this document. Removed the RESPONSE-ADDRESS, CHANGED-ADDRESS,
+ CHANGE-REQUEST, SOURCE-ADDRESS, and REFLECTED-FROM attributes.
+
+ o Added a fixed 32-bit magic cookie and reduced length of
+ transaction ID by 32 bits. The magic cookie begins at the same
+ offset as the original transaction ID.
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 45]
+
+RFC 5389 STUN October 2008
+
+
+ o Added the XOR-MAPPED-ADDRESS attribute, which is included in
+ Binding responses if the magic cookie is present in the request.
+ Otherwise, the RFC 3489 behavior is retained (that is, Binding
+ response includes MAPPED-ADDRESS). See discussion in XOR-MAPPED-
+ ADDRESS regarding this change.
+
+ o Introduced formal structure into the message type header field,
+ with an explicit pair of bits for indication of request, response,
+ error response, or indication. Consequently, the message type
+ field is split into the class (one of the previous four) and
+ method.
+
+ o Explicitly point out that the most significant 2 bits of STUN are
+ 0b00, allowing easy differentiation with RTP packets when used
+ with ICE.
+
+ o Added the FINGERPRINT attribute to provide a method of definitely
+ detecting the difference between STUN and another protocol when
+ the two protocols are multiplexed together.
+
+ o Added support for IPv6. Made it clear that an IPv4 client could
+ get a v6 mapped address, and vice versa.
+
+ o Added long-term-credential-based authentication.
+
+ o Added the SOFTWARE, REALM, NONCE, and ALTERNATE-SERVER attributes.
+
+ o Removed the SharedSecret method, and thus the PASSWORD attribute.
+ This method was almost never implemented and is not needed with
+ current usages.
+
+ o Removed recommendation to continue listening for STUN responses
+ for 10 seconds in an attempt to recognize an attack.
+
+ o Changed transaction timers to be more TCP friendly.
+
+ o Removed the STUN example that centered around the separation of
+ the control and media planes. Instead, provided more information
+ on using STUN with protocols.
+
+ o Defined a generic padding mechanism that changes the
+ interpretation of the length attribute. This would, in theory,
+ break backwards compatibility. However, the mechanism in RFC 3489
+ never worked for the few attributes that weren't aligned naturally
+ on 32-bit boundaries.
+
+ o REALM, SERVER, reason phrases, and NONCE limited to 127
+ characters. USERNAME to 513 bytes.
+
+
+
+Rosenberg, et al. Standards Track [Page 46]
+
+RFC 5389 STUN October 2008
+
+
+ o Changed the DNS SRV procedures for TCP and TLS. UDP remains the
+ same as before.
+
+20. Contributors
+
+ Christian Huitema and Joel Weinberger were original co-authors of RFC
+ 3489.
+
+21. Acknowledgements
+
+ The authors would like to thank Cedric Aoun, Pete Cordell, Cullen
+ Jennings, Bob Penfield, Xavier Marjou, Magnus Westerlund, Miguel
+ Garcia, Bruce Lowekamp, and Chris Sullivan for their comments, and
+ Baruch Sterman and Alan Hawrylyshen for initial implementations.
+ Thanks for Leslie Daigle, Allison Mankin, Eric Rescorla, and Henning
+ Schulzrinne for IESG and IAB input on this work.
+
+22. References
+
+22.1. Normative References
+
+ [ITU.V42.2002] International Telecommunications Union, "Error-
+ correcting Procedures for DCEs Using Asynchronous-
+ to-Synchronous Conversion", ITU-T Recommendation
+ V.42, March 2002.
+
+ [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
+ September 1981.
+
+ [RFC1122] Braden, R., "Requirements for Internet Hosts -
+ Communication Layers", STD 3, RFC 1122,
+ October 1989.
+
+ [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm",
+ RFC 1321, April 1992.
+
+ [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC:
+ Keyed-Hashing for Message Authentication",
+ RFC 2104, February 1997.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol,
+ Version 6 (IPv6) Specification", RFC 2460,
+ December 1998.
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 47]
+
+RFC 5389 STUN October 2008
+
+
+ [RFC2617] Franks, J., Hallam-Baker, P., Hostetler, J.,
+ Lawrence, S., Leach, P., Luotonen, A., and L.
+ Stewart, "HTTP Authentication: Basic and Digest
+ Access Authentication", RFC 2617, June 1999.
+
+ [RFC2782] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS
+ RR for specifying the location of services (DNS
+ SRV)", RFC 2782, February 2000.
+
+ [RFC2818] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.
+
+ [RFC2988] Paxson, V. and M. Allman, "Computing TCP's
+ Retransmission Timer", RFC 2988, November 2000.
+
+ [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
+ 10646", STD 63, RFC 3629, November 2003.
+
+ [RFC4013] Zeilenga, K., "SASLprep: Stringprep Profile for
+ User Names and Passwords", RFC 4013, February 2005.
+
+22.2. Informative References
+
+ [BEHAVE-NAT] MacDonald, D. and B. Lowekamp, "NAT Behavior
+ Discovery Using STUN", Work in Progress, July 2008.
+
+ [BEHAVE-TURN] Rosenberg, J., Mahy, R., and P. Matthews,
+ "Traversal Using Relays around NAT (TURN): Relay
+ Extensions to Session Traversal Utilities for NAT
+ (STUN)", Work in Progress, July 2008.
+
+ [KARN87] Karn, P. and C. Partridge, "Improving Round-Trip
+ Time Estimates in Reliable Transport Protocols",
+ SIGCOMM 1987, August 1987.
+
+ [MMUSIC-ICE] Rosenberg, J., "Interactive Connectivity
+ Establishment (ICE): A Protocol for Network Address
+ Translator (NAT) Traversal for Offer/Answer
+ Protocols", Work in Progress, October 2007.
+
+ [MMUSIC-ICE-TCP] Rosenberg, J., "TCP Candidates with Interactive
+ Connectivity Establishment (ICE)", Work
+ in Progress, July 2008.
+
+ [RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,
+ Masinter, L., Leach, P., and T. Berners-Lee,
+ "Hypertext Transfer Protocol -- HTTP/1.1",
+ RFC 2616, June 1999.
+
+
+
+
+Rosenberg, et al. Standards Track [Page 48]
+
+RFC 5389 STUN October 2008
+
+
+ [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,
+ Johnston, A., Peterson, J., Sparks, R., Handley,
+ M., and E. Schooler, "SIP: Session Initiation
+ Protocol", RFC 3261, June 2002.
+
+ [RFC3264] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer
+ Model with Session Description Protocol (SDP)",
+ RFC 3264, June 2002.
+
+ [RFC3424] Daigle, L. and IAB, "IAB Considerations for
+ UNilateral Self-Address Fixing (UNSAF) Across
+ Network Address Translation", RFC 3424,
+ November 2002.
+
+ [RFC3489] Rosenberg, J., Weinberger, J., Huitema, C., and R.
+ Mahy, "STUN - Simple Traversal of User Datagram
+ Protocol (UDP) Through Network Address Translators
+ (NATs)", RFC 3489, March 2003.
+
+ [RFC4107] Bellovin, S. and R. Housley, "Guidelines for
+ Cryptographic Key Management", BCP 107, RFC 4107,
+ June 2005.
+
+ [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for
+ Writing an IANA Considerations Section in RFCs",
+ BCP 26, RFC 5226, May 2008.
+
+ [SIP-OUTBOUND] Jennings, C. and R. Mahy, "Managing Client
+ Initiated Connections in the Session Initiation
+ Protocol (SIP)", Work in Progress, June 2008.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 49]
+
+RFC 5389 STUN October 2008
+
+
+Appendix A. C Snippet to Determine STUN Message Types
+
+ Given a 16-bit STUN message type value in host byte order in msg_type
+ parameter, below are C macros to determine the STUN message types:
+
+ #define IS_REQUEST(msg_type) (((msg_type) & 0x0110) == 0x0000)
+ #define IS_INDICATION(msg_type) (((msg_type) & 0x0110) == 0x0010)
+ #define IS_SUCCESS_RESP(msg_type) (((msg_type) & 0x0110) == 0x0100)
+ #define IS_ERR_RESP(msg_type) (((msg_type) & 0x0110) == 0x0110)
+
+
+Authors' Addresses
+
+ Jonathan Rosenberg
+ Cisco
+ Edison, NJ
+ US
+
+ EMail: jdrosen@cisco.com
+ URI: http://www.jdrosen.net
+
+
+ Rohan Mahy
+ Unaffiliated
+
+ EMail: rohan@ekabal.com
+
+
+ Philip Matthews
+ Unaffiliated
+
+ EMail: philip_matthews@magma.ca
+
+
+ Dan Wing
+ Cisco
+ 771 Alder Drive
+ San Jose, CA 95035
+ US
+
+ EMail: dwing@cisco.com
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 50]
+
+RFC 5389 STUN October 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg, et al. Standards Track [Page 51]
+