%% You should probably cite rfc7435 instead of this I-D. @techreport{dukhovni-opportunistic-security-03, number = {draft-dukhovni-opportunistic-security-03}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-dukhovni-opportunistic-security/03/}, author = {Viktor Dukhovni}, title = {{Opportunistic Security: Some Protection Most of the Time}}, pagetotal = 10, year = 2014, month = aug, day = 15, abstract = {This memo introduces the "Opportunistic Security" (OS) protocol design pattern. Protocol designs based on OS depart from the established practice of employing cryptographic protection against both passive and active attacks, or no protection at all. As a result, with OS at least some cryptographic protection should be provided most of the time. For example, the majority of Internet SMTP traffic is now opportunistically encrypted. OS designs remove barriers to the widespread use of encryption on the Internet. The actual protection provided by opportunistic security depends on the advertised security capabilities of the communicating peers. This document promotes designs in which cryptographic protection against both passive and active attacks can be rolled out incrementally as new systems are deployed, without creating barriers to communication.}, }