Last Call Review of draft-dbider-sha2-mac-for-ssh-
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.
This memo defines algorithm names and parameters for use of some of
the SHA-2 family of secure hash algorithms for data integrity
verification in the Secure Shell (SSH) protocol. It also updates
RFC4253 by specifying a new RECOMMENDED data integrity algorithm.
I see no issues with this draft
Derek Atkins 617-623-3745
derek at ihtfp.com www.ihtfp.com
Computer and Internet Security Consultant