After re-reading the draft I think that I'm also a bit unhappy with
the way the last table (Section 4.2) is introduced. The draft says
that this table is:

   Recommendation of Authentication Method described in [RFC7427]
   notation.

However, the values from this table are just examples in RFC7427.
Why exactly these algorithms were selected for recommendation?

Note, that most of them are MAY, so we should really remove them from
this draft.

That's what I suggest.

Anyways I think we need to remove all that is not SHOULD or SHOULD NOT
from the list, i.e., everything we have MAY recommendation in the
list.

Fine. That will resolve my concern.
I agree on removing all MAY algorithms, we do not need note, as that
is already said in the section 1.2.

OK.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to