%% You should probably cite draft-ietf-dprive-opportunistic-adotq instead of this I-D. @techreport{pp-recursive-authoritative-opportunistic-02, number = {draft-pp-recursive-authoritative-opportunistic-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-pp-recursive-authoritative-opportunistic/02/}, author = {Paul E. Hoffman}, title = {{Recursive to Authoritative DNS with Opportunistic Encryption}}, pagetotal = 6, year = 2020, month = nov, day = 20, abstract = {This document describes a use case and a method for a DNS recursive resolver to use opportunistic encryption when communicating with authoritative servers. A motivating use case for this method is that more encryption on the Internet is better, and opportunistic encryption is better than no encryption at all. The method here is optional for both the recursive resolver and the authoritative server. Nothing in this method prevents use cases and methods that require authenticated encryption.}, }