Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
Note: This ballot was opened for revision 07 and is now closed.
(Richard Barnes) Yes
Thanks for re-using PKIX algorithm identifiers instead of inventing new ones!
(Kathleen Moriarty) Yes
(Jari Arkko) No Objection
Alissa Cooper No Objection
(Spencer Dawkins) No Objection
(Adrian Farrel) No Objection
(Stephen Farrell) No Objection
(Brian Haberman) No Objection
I have the same question as Barry.
(Joel Jaeggli) No Objection
Barry Leiba No Objection
-- Section 5 -- This section povides three ways by which the responder can select an appropiate key pair type, but gives little guidance about how to go about the process. What happens if the different methods give different results? Should they be applied in a particular order? Why does this specification not cover this?