Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks, November 2016
Discuss this RFC: Send questions or comments to the mailing list firstname.lastname@example.org
This document recommends implementation and configuration best practices for Internet Key Exchange Protocol version 2 (IKEv2) Responders, to allow them to resist Denial-of-Service and Distributed Denial-of-Service attacks. Additionally, the document introduces a new mechanism called "Client Puzzles" that helps accomplish this task.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.