Skip to main content

Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
draft-kivinen-ipsecme-signature-auth-07

Yes

(Kathleen Moriarty)

No Objection

(Adrian Farrel)
(Alissa Cooper)
(Jari Arkko)
(Joel Jaeggli)
(Martin Stiemerling)
(Pete Resnick)
(Spencer Dawkins)
(Stephen Farrell)

Note: This ballot was opened for revision 07 and is now closed.

Kathleen Moriarty Former IESG member
Yes
Yes () Unknown

                            
Richard Barnes Former IESG member
Yes
Yes (2014-08-06) Unknown
Thanks for re-using PKIX algorithm identifiers instead of inventing new ones!
Adrian Farrel Former IESG member
No Objection
No Objection () Unknown

                            
Alissa Cooper Former IESG member
No Objection
No Objection () Unknown

                            
Barry Leiba Former IESG member
No Objection
No Objection (2014-08-04) Unknown
-- Section 5 --
This section povides three ways by which the responder can select an appropiate key pair type, but gives little guidance about how to go about the process.  What happens if the different methods give different results?  Should they be applied in a particular order?  Why does this specification not cover this?
Brian Haberman Former IESG member
No Objection
No Objection (2014-08-04) Unknown
I have the same question as Barry.
Jari Arkko Former IESG member
No Objection
No Objection () Unknown

                            
Joel Jaeggli Former IESG member
No Objection
No Objection () Unknown

                            
Martin Stiemerling Former IESG member
No Objection
No Objection () Unknown

                            
Pete Resnick Former IESG member
No Objection
No Objection () Unknown

                            
Spencer Dawkins Former IESG member
No Objection
No Objection () Unknown

                            
Stephen Farrell Former IESG member
No Objection
No Objection () Unknown