Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)

Note: This ballot was opened for revision 07 and is now closed.

(Richard Barnes) Yes

Comment (2014-08-06)
No email
send info
Thanks for re-using PKIX algorithm identifiers instead of inventing new ones!

(Kathleen Moriarty) Yes

(Jari Arkko) No Objection

(Alissa Cooper) No Objection

(Spencer Dawkins) No Objection

(Adrian Farrel) No Objection

(Stephen Farrell) No Objection

(Brian Haberman) No Objection

Comment (2014-08-04)
No email
send info
I have the same question as Barry.

(Joel Jaeggli) No Objection

(Barry Leiba) No Objection

Comment (2014-08-04)
No email
send info
-- Section 5 --
This section povides three ways by which the responder can select an appropiate key pair type, but gives little guidance about how to go about the process.  What happens if the different methods give different results?  Should they be applied in a particular order?  Why does this specification not cover this?

(Pete Resnick) No Objection

(Martin Stiemerling) No Objection