{"draft":"draft-ietf-httpbis-http2-encryption-11","doc_id":"RFC8164","title":"Opportunistic Security for HTTP\/2","authors":["M. Nottingham","M. Thomson"],"format":["ASCII","HTML"],"page_count":"10","pub_status":"EXPERIMENTAL","status":"HISTORIC","source":"HTTP","abstract":"This document describes how \"http\" URIs can be accessed using\r\nTransport Layer Security (TLS) and HTTP\/2 to mitigate pervasive\r\nmonitoring attacks. This mechanism not a replacement for \"https\"\r\nURIs; it is vulnerable to active attacks.\r\n","pub_date":"May 2017","keywords":["Opportunistic Security","HTTP"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8164","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc8164"}