ERROR_IPSEC_IKE_DOS_COOKIE_SENT - 13890 (0x3642)
Sent DoS cookie notify to initiator.
Updated: Feb 21, 2026
Technical Meaning
The error code ERROR_IPSEC_IKE_DOS_COOKIE_SENT with the numeric value 13890 and hex code 0x3642 indicates that a DoS (Denial of Service) cookie notify has been sent to the initiator during an IPsec/IKE negotiation process.
Error Details
This error is specific to the Internet Key Exchange (IKE) protocol, which is used for establishing secure communication channels in IPsec. The DoS cookie notify is a mechanism employed by IKE to mitigate potential DoS attacks by ensuring that only legitimate peers can initiate or respond to security associations.
Usage Context
This error typically occurs during the negotiation phase of an IPsec/IKE session, where one peer (the initiator) sends a DoS cookie notify message to another peer (the responder). The presence of this error does not necessarily indicate a failure in establishing the connection but rather that the notification was sent as part of the security protocol.
Developer Interpretation
As a developer, encountering this error should be interpreted as a normal part of the IPsec/IKE negotiation process. It is important to understand that the presence of this error does not imply any failure or issue with the connection itself but rather indicates that the security mechanism was correctly implemented and executed.
Related Errors
ERROR_IPSEC_IKE_NEGOTIATION_FAILED(13892)ERROR_IPSEC_IKE_PROCESSING_ERROR(13894)
FAQ
Q: What does the DoS cookie notify do?
A: The DoS cookie notify is a security mechanism used to prevent DoS attacks by ensuring that only legitimate peers can initiate or respond to security associations.
Q: Why would this error be sent?
A: This error is typically sent as part of the normal negotiation process during an IPsec/IKE session, indicating that the DoS cookie notify has been successfully transmitted to the initiator.
Summary
The ERROR_IPSEC_IKE_DOS_COOKIE_SENT (13890) error code is a specific indication that a DoS cookie notify was sent as part of an IPsec/IKE negotiation. It is not indicative of a failure but rather a normal security mechanism in action. Developers should interpret this error as expected behavior during the establishment of secure communication channels.