Opportunistic Security: Some Protection Most of the Time, December 2014
- Canonical URL:
- File formats:
- V. Dukhovni
- NON WORKING GROUP
Discuss this RFC: Send questions or comments to firstname.lastname@example.org
This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 4844.