Prince actually repeated it quite concisely albeit bluntly to someone who assumed wrongly that heartbleed was strictly a TCP/HTTPS vulnerability. Lyon's refusal to admit his own mistake and then subsequently bark up/redirect the discussion to the certificate amp protection in DTLS (the cookie bit) is a bit sad. RFC 6347 adds that security feature for handshaking, but sadly RFC 6520 is slightly orthogonal to it, with only passing mention to the 6347. As it currently is, OpenSSL's implementation of heartbeat is outside the handshake, as the original patch mentions "Heartbeats can be sent any time when no handshake is in progress to check the availability of the peer"
In fact, most network IDS setups right now purporting to monitor for heartbleed attacks relies on the fact that most malware implementations right now bypass the handshake altogether and go directly for the jugular (hence why you can 'detect' it unencrypted).
In the end, Mr. Mehta is right. Fix your DTLS apps too.
Please.