@misc{rfc7619, series = {Request for Comments}, number = 7619, howpublished = {RFC 7619}, publisher = {RFC Editor}, doi = {10.17487/RFC7619}, url = {https://www.rfc-editor.org/info/rfc7619}, author = {Valery Smyslov and Paul Wouters}, title = {{The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2)}}, pagetotal = 12, year = 2015, month = aug, abstract = {This document specifies the NULL Authentication method and the ID\_NULL Identification Payload ID Type for Internet Key Exchange Protocol version 2 (IKEv2). This allows two IKE peers to establish single-side authenticated or mutual unauthenticated IKE sessions for those use cases where a peer is unwilling or unable to authenticate or identify itself. This ensures IKEv2 can be used for Opportunistic Security (also known as Opportunistic Encryption) to defend against Pervasive Monitoring attacks without the need to sacrifice anonymity.}, }