Skip to main content

Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
RFC 7427

Yes

(Kathleen Moriarty)

No Objection

(Adrian Farrel)
(Alissa Cooper)
(Jari Arkko)
(Joel Jaeggli)
(Martin Stiemerling)
(Pete Resnick)
(Spencer Dawkins)
(Stephen Farrell)

Note: This ballot was opened for revision 07 and is now closed.

(Kathleen Moriarty; former steering group member) Yes

Yes ()

                            

(Richard Barnes; former steering group member) Yes

Yes (2014-08-06)
Thanks for re-using PKIX algorithm identifiers instead of inventing new ones!

(Adrian Farrel; former steering group member) No Objection

No Objection ()

                            

(Alissa Cooper; former steering group member) No Objection

No Objection ()

                            

(Barry Leiba; former steering group member) No Objection

No Objection (2014-08-04)
-- Section 5 --
This section povides three ways by which the responder can select an appropiate key pair type, but gives little guidance about how to go about the process.  What happens if the different methods give different results?  Should they be applied in a particular order?  Why does this specification not cover this?

(Brian Haberman; former steering group member) No Objection

No Objection (2014-08-04)
I have the same question as Barry.

(Jari Arkko; former steering group member) No Objection

No Objection ()

                            

(Joel Jaeggli; former steering group member) No Objection

No Objection ()

                            

(Martin Stiemerling; former steering group member) No Objection

No Objection ()

                            

(Pete Resnick; former steering group member) No Objection

No Objection ()

                            

(Spencer Dawkins; former steering group member) No Objection

No Objection ()

                            

(Stephen Farrell; former steering group member) No Objection

No Objection ()