Opportunistic Encryption using the Internet Key Exchange (IKE)
RFC 4322
Revision differences
Document history
Date | By | Action |
---|---|---|
2020-01-21
|
(System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2018-12-20
|
(System) | Received changes through RFC Editor sync (changed abstract to 'This document describes opportunistic encryption (OE) as designed and implemented by the Linux FreeS/WAN project. OE … Received changes through RFC Editor sync (changed abstract to 'This document describes opportunistic encryption (OE) as designed and implemented by the Linux FreeS/WAN project. OE uses the Internet Key Exchange (IKE) and IPsec protocols. The objective is to allow encryption for secure communication without any pre-arrangement specific to the pair of systems involved. DNS is used to distribute the public keys of each system involved. This is resistant to passive attacks. The use of DNS Security (DNSSEC) secures this system against active attackers as well. As a result, the administrative overhead is reduced from the square of the number of systems to a linear dependence, and it becomes possible to make secure communication the default even when the partner is not known in advance. This memo provides information for the Internet community.') |
2015-10-14
|
(System) | Notify list changed from mcr@sandelman.ottawa.on.ca, hugh@mimosa.com to (None) |
2012-05-03
|
Cindy Morgan | Changed stream from Legacy to ISE |
2005-12-27
|
Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2005-12-27
|
Amy Vezza | [Note]: 'RFC 4322' added by Amy Vezza |
2005-12-23
|
(System) | RFC published |