<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-webtrans-overview-06" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="WebTransport">The WebTransport Protocol Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-webtrans-overview-06"/>
    <author initials="V." surname="Vasiliev" fullname="Victor Vasiliev">
      <organization>Google</organization>
      <address>
        <email>vasilvv@google.com</email>
      </address>
    </author>
    <date/>
    <area>Applications and Real-Time</area>
    <workgroup>WEBTRANS</workgroup>
    <abstract>
      <?line 30?>

<t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with an abstract model that allows them
to be used interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <?line 42?>

<t>Discussion of this draft takes place on the WebTransport mailing list
(webtransport@ietf.org), which is archived at
&lt;https://mailarchive.ietf.org/arch/search/?email_list=webtransport&gt;.</t>
      <t>The repository tracking the issues for this draft can be found at
&lt;https://github.com/ietf-wg-webtrans/draft-ietf-webtrans-overview/issues&gt;.
The web API draft corresponding to this document can be found at
&lt;https://wicg.github.io/web-transport/&gt;.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with an abstract model that allows them
to be used interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Historically, web applications that needed a bidirectional data stream between a
client and a server could rely on WebSockets <xref target="RFC6455"/>, a message-based
protocol compatible with the Web security model.  However, since the
abstraction it provides is a single ordered reliable stream of messages, it
suffers from head-of-line blocking, meaning that all messages must be sent and
received in order even if they could be processed independently of each other,
and some messages may no longer be relevant.  This makes it a poor fit for
latency-sensitive applications which rely on partial reliability and stream
independence for performance.</t>
        <t>One existing option available to Web developers are WebRTC data channels
<xref target="RFC8831"/>, which provide a WebSocket-like API for a peer-to-peer SCTP
channel protected by DTLS.  In theory, it is possible to use it for the use
cases addressed by this specification. However, in practice, it has not seen
wide adoption outside of browser-to-browser settings due to its dependency on
ICE (which fits poorly with the Web model) and userspace SCTP (which has a
limited number of implementations available due to not being used in other
contexts).</t>
        <t>An alternative design would be to open multiple WebSocket connections over
HTTP/3 <xref target="RFC9220"/>.  That would avoid head-of-line blocking and provide an
ability to cancel a stream by closing the corresponding WebSocket session.
However, this approach has a number of drawbacks, which all stem primarily from
the fact that semantically each WebSocket is a completely independent entity:</t>
        <ul spacing="normal">
          <li>Each new stream would require a WebSocket handshake to agree on application
protocol used, meaning that it would take at least one RTT to establish each
new stream before the client can write to it.</li>
          <li>Only clients can initiate streams.  Server-initiated streams and other
alternative modes of communication (such as the QUIC DATAGRAM frame
<xref target="RFC9221"/>) are not available.</li>
          <li>While the streams would normally be pooled by the user agent, this is not
guaranteed, and the general process of mapping a WebSocket to a server is
opaque to the client.  This introduces unpredictable performance properties
into the system, and prevents optimizations which rely on the streams being on
the same connection (for instance, it might be possible for the client to
request different retransmission priorities for different streams, but that
would be much more complex unless they are all on the same connection).</li>
        </ul>
        <t>WebTransport avoids all of those issues by letting applications create a single
transport object that can contain multiple streams multiplexed together in a
single context (similar to SCTP, HTTP/2, QUIC and others), and can be also used
to send unreliable datagrams (similar to UDP).</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
        <t>WebTransport is a framework that aims to abstract away the underlying transport
protocol while still exposing a few key transport-layer aspects to application
developers.  It is structured around the following concepts:</t>
        <dl>
          <dt>WebTransport session:</dt>
          <dd>
            <t>A WebTransport session is a single communication context established between a
client and a server.  It may correspond to a specific transport-layer
connection, or it may be a logical entity within an existing multiplexed
transport-layer connection.  WebTransport sessions are logically independent
from one another even if some sessions can share an underlying
transport-layer connection.</t>
          </dd>
          <dt>WebTransport protocol:</dt>
          <dd>
            <t>A WebTransport protocol is a specific protocol that can be used to establish
a WebTransport session.</t>
          </dd>
          <dt>Datagram:</dt>
          <dd>
            <t>A datagram is a unit of transmission that is limited in size (typically to
the path MTU), does not have an expectation of being delivered reliably, and
is treated atomically by the transport.</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A stream is a sequence of bytes that is reliably delivered to the receiving
application in the same order as it was transmitted by the sender.  Streams
can be of arbitrary length, and therefore cannot always be buffered entirely
in memory. WebTransport protocols and APIs are expected to provide partial
stream data to the application before the stream has been entirely received.</t>
          </dd>
          <dt>Message:</dt>
          <dd>
            <t>A message is a stream that is sufficiently small that it can be fully buffered
before being passed to the application.  WebTransport does not define messages
as a primitive, since from the transport perspective they can be simulated
by fully buffering a stream before passing it to the application.  However,
this distinction is important to highlight since some of the similar protocols
and APIs (notably WebSocket <xref target="RFC6455"/>) use messages as a core abstraction.</t>
          </dd>
          <dt>Server:</dt>
          <dd>
            <t>A WebTransport server is an application that accepts incoming WebTransport
sessions.  In cases when WebTransport is served over a multiplexed protocol
(such as HTTP/2 or HTTP/3), "WebTransport server" refers to a handler for a
specific multiplexed endpoint (e.g. an application handling specific HTTP
resource), rather than the application listening on a given TCP or UDP
socket.</t>
          </dd>
          <dt>Client:</dt>
          <dd>
            <t>A WebTransport client is an application that initiates the transport
session and may be running in a constrained security context, for instance,
a JavaScript application running inside a browser.</t>
          </dd>
          <dt>User agent:</dt>
          <dd>
            <t>A WebTransport user agent is a software system that has an unrestricted
access to the host network stack and can create transports on behalf
of the client.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="common-requirements">
      <name>Common Transport Requirements</name>
      <t>Since clients are not necessarily trusted and have to be constrained by the
Web security model, WebTransport imposes certain requirements on any specific
protocol used.</t>
      <t>All WebTransport protocols MUST use TLS <xref target="RFC8446"/> or a semantically
equivalent security protocol (for instance, DTLS <xref target="RFC9147"/>).
The protocols SHOULD use TLS version 1.3 or later, unless they aim for
backwards compatibility with legacy systems.</t>
      <t>All WebTransport protocols MUST require the user agent to obtain and maintain
explicit consent from the server to send data.  For connection-oriented
protocols (such as TCP or QUIC), the connection establishment and keep-alive
mechanisms suffice.  STUN Consent Freshness <xref target="RFC7675"/> is another example of
a mechanism satisfying this requirement.</t>
      <t>All WebTransport protocols MUST limit the rate at which the client sends data.
This SHOULD be accomplished via a feedback-based congestion control mechanism
(such as <xref target="RFC5681"/> or <xref target="RFC9002"/>).</t>
      <t>All WebTransport protocols MUST support simultaneously establishing multiple
sessions between the same client and server.</t>
      <t>All WebTransport protocols MUST prevent clients from establishing transport
sessions to network endpoints that are not WebTransport servers.</t>
      <t>All WebTransport protocols MUST provide a way for the user agent to indicate
the origin <xref target="RFC6454"/> of the client to the server.</t>
      <t>All WebTransport protocols MUST provide a way for a server endpoint location to
be described using a URI <xref target="RFC3986"/>.  This enables integration with various
Web platform features that represent resources as URIs, such as Content
Security Policy <xref target="CSP"/>.</t>
    </section>
    <section anchor="session-establishment">
      <name>Session Establishment</name>
      <t>WebTransport session establishment is an asynchronous process.  A session is
considered <em>ready</em> from the client's perspective when the server has confirmed
that it is willing to accept the session with the provided origin and URI.
WebTransport protocols MAY allow clients to send data before the session is
ready; however, they MUST NOT use mechanisms that are unsafe against replay
attacks without an explicit indication from the client.</t>
    </section>
    <section anchor="transport-features">
      <name>Transport Features</name>
      <t>All transport protocols MUST provide datagrams, unidirectional and
bidirectional streams in order to make the transport protocols interchangeable.</t>
      <section anchor="features-session">
        <name>Session-Wide Features</name>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>establish a session</dt>
          <dd>
            <t>Create a new WebTransport session given a URI <xref target="RFC3986"/> of the requester.
An origin <xref target="RFC6454"/> MUST be given if the WebTransport session is coming
from a browser client; otherwise, it is OPTIONAL.</t>
          </dd>
          <dt>terminate a session</dt>
          <dd>
            <t>Terminate the session while communicating to the peer an unsigned 32-bit
error code and an error reason string of at most 1024 bytes.  As soon as the
session is terminated, no further application data will be exchanged on it.
The error code and string are optional; the default values are 0 and "".  The
delivery of the error code and string MAY be best-effort.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events:</t>
        <dl>
          <dt>session terminated event</dt>
          <dd>
            <t>Indicates that the WebTransport session has been terminated, either by the
peer or by the local networking stack, and no user data can be exchanged on
it any further.  If the session has been terminated as a result of the peer
performing the "terminate a session" operation above, a corresponding error
code and an error string can be provided.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-datagrams">
        <name>Datagrams</name>
        <t>A datagram is a sequence of bytes that is limited in size (generally to the path
MTU) and is not expected to be transmitted reliably.  The general goal for
WebTransport datagrams is to be similar in behavior to UDP while being subject
to common requirements expressed in <xref target="common-requirements"/>.</t>
        <t>A WebTransport sender is not expected to retransmit datagrams, though it may
end up doing so if it is using TCP or some other underlying protocol that only
provides reliable delivery.  WebTransport datagrams are not expected to be flow
controlled, meaning that the receiver might drop datagrams if the application
is not consuming them fast enough.</t>
        <t>The application MUST be provided with the maximum datagram size that it can
send.  The size SHOULD be derived from the result of performing path MTU
discovery.</t>
        <t>In the WebTransport model, all of the outgoing and incoming datagrams are
placed into a size-bound queue (similar to a network interface card queue).</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>send a datagram</dt>
          <dd>
            <t>Enqueues a datagram to be sent to the peer.  This can potentially result in
the datagram being dropped if the queue is full.</t>
          </dd>
          <dt>receive a datagram</dt>
          <dd>
            <t>Dequeues an incoming datagram, if one is available.</t>
          </dd>
          <dt>get maxiumum datagram size</dt>
          <dd>
            <t>Returns the largest size of the datagram that a WebTransport session is
expected to be able to send.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-streams">
        <name>Streams</name>
        <t>A unidirectional stream is a one-way reliable in-order stream of bytes where the
initiator is the only endpoint that can send data.  A bidirectional stream
allows both endpoints to send data and can be conceptually represented as a pair
of unidirectional streams.</t>
        <t>The streams are in general expected to follow the semantics and the state
machine of QUIC streams (<xref target="RFC9000"/>, Sections 2 and 3).
TODO: describe the stream state machine explicitly.</t>
        <t>A WebTransport stream can be reset, indicating that the endpoint is not
interested in either sending or receiving any data related to the stream.  In
that case, the sender is expected to not retransmit any data that was already
sent on that stream.</t>
        <t>Streams SHOULD be sufficiently lightweight that they can be used as messages.</t>
        <t>Data sent on a stream is flow controlled by the transport protocol.  In addition
to flow controlling stream data, the creation of new streams is flow controlled
as well: an endpoint may only open a limited number of streams until the peer
explicitly allows creating more streams.  From the perspective of the client,
this is presented as a size-bounded queue of incoming streams.</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>create a unidirectional stream</dt>
          <dd>
            <t>Creates an outgoing unidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>create a bidirectional stream</dt>
          <dd>
            <t>Creates an outgoing bidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>receive a unidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
          <dt>receive a bidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following operations on an
individual stream:</t>
        <dl>
          <dt>send bytes</dt>
          <dd>
            <t>Add bytes into the stream send buffer.  The sender can also indicate a FIN,
signalling the fact that no new data will be send on the stream.  Not
applicable for incoming unidirectional streams.</t>
          </dd>
          <dt>receive bytes</dt>
          <dd>
            <t>Removes bytes from the stream receive buffer.  FIN can be received together
with the stream data.  Not applicable for outgoing unidirectional streams.</t>
          </dd>
          <dt>abort send side</dt>
          <dd>
            <t>Sends a signal to the peer that the write side of the stream has been aborted.
Discards the send buffer; if possible, no currently outstanding data is
transmitted or retransmitted.  An unsigned 8-bit error code can be supplied
as a part of the signal to the peer; if omitted, the error code is presumed
to be 0.</t>
          </dd>
          <dt>abort receive side</dt>
          <dd>
            <t>Sends a signal to the peer that the read side of the stream has been aborted.
Discards the receive buffer; the peer is typically expected to abort the
corresponding send side in response.  An unsigned 8-bit error code can be
supplied as a part of the signal to the peer.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events for an individual
stream:</t>
        <dl>
          <dt>send side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding receive side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>receive side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding send side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>Data Recvd state reached</dt>
          <dd>
            <t>Indicates that no further data will be transmitted or retransmitted on the
local send side, and that the FIN has been sent.  Data Recvd implies that
aborting send-side is a no-op.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="transport-properties">
      <name>Transport Properties</name>
      <t>WebTransport defines common semantics for multiple protocols to allow them to
be used interchangeably.  Nevertheless, those protocols still have
substantially different performance properties that an application may want to
query.</t>
      <t>The most notable property is support for unreliable data delivery.  The
protocol is defined to support unreliable delivery if:</t>
      <ul spacing="normal">
        <li>Resetting a stream results in the lost stream data no longer being
retransmitted, and</li>
        <li>The datagrams are never retransmitted.</li>
      </ul>
      <t>Another important property is pooling support.  Pooling means that multiple
transport sessions may end up sharing the same transport layer connection, and
thus share a congestion controller and other contexts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Providing untrusted clients with a reasonably low-level access to the network
comes with risks.  This document mitigates those risks by imposing a set of
common requirements described in <xref target="common-requirements"/>.</t>
      <t>WebTransport mandates the use of TLS for all protocols implementing it.  This
has a dual purpose.  On one hand, it protects the transport from the network,
including both potential attackers and ossification by middleboxes.  On the
other hand, it protects the network elements from potential confusion attacks
such as the one discussed in Section 10.3 of <xref target="RFC6455"/>.</t>
      <t>One potential concern is that even when a transport cannot be created, the
connection error would reveal enough information to allow an attacker to scan
the network addresses that would normally be inaccessible.  Because of that, the
user agent that runs untrusted clients MUST NOT provide any detailed error
information until the server has confirmed that it is a WebTransport endpoint.
For example, the client must not be able to distinguish between a network
address that is unreachable and one that is reachable but is not a WebTransport
server.</t>
      <t>WebTransport does not support any traditional means of HTTP-based
authentication.  It is not necessarily based on HTTP, and hence does not support
HTTP cookies or HTTP authentication.  Since it requires TLS, individual
transport protocols MAY expose TLS-based authentication capabilities such as
client certificates.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no requests to IANA in this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents. Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites. In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string. It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CSP" target="https://www.w3.org/TR/CSP/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2023" month="September"/>
          </front>
        </reference>
        <reference anchor="RFC6455">
          <front>
            <title>The WebSocket Protocol</title>
            <author fullname="I. Fette" initials="I." surname="Fette"/>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code. The security model used for this is the origin-based security model commonly used by web browsers. The protocol consists of an opening handshake followed by basic message framing, layered over TCP. The goal of this technology is to provide a mechanism for browser-based applications that need two-way communication with servers that does not rely on opening multiple HTTP connections (e.g., using XMLHttpRequest or s and long polling). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6455"/>
          <seriesInfo name="DOI" value="10.17487/RFC6455"/>
        </reference>
        <reference anchor="RFC8831">
          <front>
            <title>WebRTC Data Channels</title>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>The WebRTC framework specifies protocol support for direct, interactive, rich communication using audio, video, and data between two peers' web browsers. This document specifies the non-media data transport aspects of the WebRTC framework. It provides an architectural overview of how the Stream Control Transmission Protocol (SCTP) is used in the WebRTC context as a generic transport service that allows web browsers to exchange generic data from peer to peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8831"/>
          <seriesInfo name="DOI" value="10.17487/RFC8831"/>
        </reference>
        <reference anchor="RFC9220">
          <front>
            <title>Bootstrapping WebSockets with HTTP/3</title>
            <author fullname="R. Hamilton" initials="R." surname="Hamilton"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9220"/>
          <seriesInfo name="DOI" value="10.17487/RFC9220"/>
        </reference>
        <reference anchor="RFC9221">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9221"/>
          <seriesInfo name="DOI" value="10.17487/RFC9221"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="RFC5681">
          <front>
            <title>TCP Congestion Control</title>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="V. Paxson" initials="V." surname="Paxson"/>
            <author fullname="E. Blanton" initials="E." surname="Blanton"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods. This document obsoletes RFC 2581. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5681"/>
          <seriesInfo name="DOI" value="10.17487/RFC5681"/>
        </reference>
        <reference anchor="RFC9002">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
