![]() ![]() "SHOULD", "SHOULD NOT", and "MAY" are to be interpreted as described In this document, the keywords "MUST", "MUST NOT", "REQUIRED", Possible, both to minimize new security invention and to maximize the DTLS is deliberately designed to be as similar to TLS as Memo describes such a protocol: Datagram Transport Layer Security Thus, aĭatagram-compatible variant of TLS would be very desirable. In many cases, the most desirable way to secure client/serverĪpplications would be to use TLS however, the requirement forĭatagram semantics automatically prohibits use of TLS. Relatively small amount of effort required to run the protocol over Requires a large amount of effort to design - in contrast to the (e.g., end-to-end security in the case of S/MIME), they typically Security protocols generally provide superior security properties Unfortunately, although application layer Transport are preserved by the DTLS protocol.ġ. The DTLS protocol isīased on the Transport Layer Security (TLS) protocol and providesĮquivalent security guarantees. The protocol allows client/serverĪpplications to communicate in a way that is designed to preventĮavesdropping, tampering, or message forgery. The DTLS protocol provides communications This document specifies Version 1.0 of the Datagram Transport Layer ![]() Distribution of this memo is unlimited.Ĭopyright (C) The Internet Society (2006). Official Protocol Standards" (STD 1) for the standardization stateĪnd status of this protocol. Please refer to the current edition of the "Internet Internet community, and requests discussion and suggestions for This document specifies an Internet standards track protocol for the April 2006 Datagram Transport Layer Security ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |