Opportunistic Security: Some Protection Most of the Time, December 2014
Discuss this RFC: Send questions or comments to email@example.com
This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 4844.