…f these attacks, DTLS borrows the stateless cookie technique used by Photuris [ RFC2522 ] and IKE [ RFC7296 ]. When the client sends its ClientHello message to the server, the server Rescorla, et al. Expires May 6, 2021 [Page 20] Internet-Draft DTLS 1.3 November 2020 MAY respond …
… of these attacks, DTLS borrows the stateless cookie technique used by Photuris RFC2522 and IKE RFC7296 . When the client sends its ClientHello message to the server, the server MAY respond with a HelloRetryRequest message. The HelloRetryRequest message, as well as the "cookie" e…
…ion 10 ). A cookie mechanism, similar to one described by Karn and Simpson in [ RFC2522 ], is employed during the initialization to provide protection against synchronization attacks. The cookie mechanism uses a four-way handshake, the last two legs of which are allowed to carry …
…ay, reflection, and denial-of-service (DOS) attacks on unsecured networks [STS, RFC2522 , SKEME]. GDOI assumes the network is not secure and may be under the complete control of an attacker. GDOI assumes that the host computer is secure even though the network is insecure. GDOI u…
…f these attacks, DTLS borrows the stateless cookie technique used by Photuris [ RFC2522 ] and IKE [ RFC7296 ] . When the client sends its ClientHello message to the server, the server MAY respond with a HelloRetryRequest message. The HelloRetryRequest message, as well as the "coo…