Dave Crocker wrote:

>     A validator MUST support {SHA-1, SHA-256}.

+1
 
>     A signer MUST support {SHA-1, SHA-26}.

IMHO unnecessary, "SHOULD use SHA-256" and "MAY use SHA-1"
are good enough as you have it here:

> A signer SHOULD use {SHA-256} for its higher security
> strength. However a signer MAY use {SHA-1}, such as for
> compatibility with an installed base, lower computational
> cost, or easier implementation effort.

All fine, but IIRC Stephen's concern was about the future
transition to another constellation when SHA-1 met Mr. Bond.

To emulate this, what would you say about CRC32 today ?  Is
that "SHOULD NOT accept" and "MUST NOT generate" ?  Or take
MD5 if CRC32 is too simple.
                              Bye, Frank


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to