Last Call: <draft-dukhovni-opportunistic-security-05.txt> (Opportunistic Security: Some Protection Most of the Time) to Informational RFC

The IESG <> Mon, 27 October 2014 17:15 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id B8C871A6F04 for <>; Mon, 27 Oct 2014 10:15:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id yzOkB2ipKuOz for <>; Mon, 27 Oct 2014 10:15:30 -0700 (PDT)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id 4D5E81A6F5A for <>; Mon, 27 Oct 2014 10:14:20 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-dukhovni-opportunistic-security-05.txt> (Opportunistic Security: Some Protection Most of the Time) to Informational RFC
X-Test-IDTracker: no
X-IETF-IDTracker: 5.7.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Mon, 27 Oct 2014 10:14:20 -0700
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 27 Oct 2014 17:15:32 -0000

The IESG is asking the community to re-review the new version of the
following document, as a result of the previous last call and IESG evaluation:

- 'Opportunistic Security: Some Protection Most of the Time'
  <draft-dukhovni-opportunistic-security-05.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2014-11-18. Exceptionally, comments may be
sent to instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

In particular, the IESG needs to know about substantive issues that have
not been addressed appropriately in this version.  Comments should clearly
mark each actionable issue that they are raising, and should clearly state
what action they are asking for.  Please suggest specific text, where that is

   This document defines the concept "Opportunistic Security" in the
   context of communications protocols.  Protocol designs based on
   Opportunistic Security use encryption even when authentication is not
   available, and use authentication when possible, thereby removing
   barriers to the widespread use of encryption on the Internet.

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.