1.3 The Need For Self-Signed Certificates. 15
1.4 Example SDP Description For TLS Connection. 15
4. Endpoint Identification. 16
4.2 Certificate Presentation. 17
12.1.1 Applicability Statement 19
12.1.2 Conventions Used in This Document 19
12.2 PSK Key Exchange Algorithm.. 19
12.3 DHE_PSK Key Exchange Algorithm.. 21
12.4 RSA_PSK Key Exchange Algorithm.. 22
12.5 Conformance Requirements. 23
12.5.1 PSK Identity Encoding. 23
12.5.3 Requirements for TLS Implementations. 23
12.5.4 Requirements for Management Interfaces. 23
12.6 Security Considerations. 23
12.6.1 Perfect Forward Secrecy (PFS) 23
12.6.2 Brute-Force and Dictionary Attacks. 23