Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
Note: This ballot was opened for revision 07 and is now closed.
(Richard Barnes) Yes
Thanks for re-using PKIX algorithm identifiers instead of inventing new ones!
(Kathleen Moriarty) Yes
(Jari Arkko) No Objection
Alissa Cooper No Objection
Spencer Dawkins No Objection
(Adrian Farrel) No Objection
(Stephen Farrell) No Objection
(Brian Haberman) No Objection
I have the same question as Barry.
(Joel Jaeggli) No Objection
(Barry Leiba) No Objection
-- Section 5 -- This section povides three ways by which the responder can select an appropiate key pair type, but gives little guidance about how to go about the process. What happens if the different methods give different results? Should they be applied in a particular order? Why does this specification not cover this?