Issue:

Sec. 4.1.1 has requirements on algorithm agility. They are important,
but insufficient. I propose to mention that when the tunnel method uses
certificates, it MUST be possible to migrate to new algorithms for such
certificates as well. (This possibly belongs in 4.2.1). 

Comment:

 Proposed Text in section 4.1.1:

 " The tunnel method MUST NOT be tied to any single cryptographic
    algorithm.  Instead, it MUST support run-time negotiation to select
    among an extensible set of cryptographic algorithms.  This includes
algorithms used with certificates presented during tunnel establishment.
 ..."

--
Ticket URL: <http://trac.tools.ietf.org/wg/emu/trac/ticket/15#comment:1>
emu <http://tools.ietf.org/wg/emu/>

_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to