Personally, I think it would be less confusing for everyone involved if this document is Standards Track (and "updates 5996").

Whether we deprecate the old format depends IMO on the level of implementation/use of the old format. I would like to hear from people who care about the old format (i.e. who have it in products, and do not intend to move quickly to the more general solution if it is standardized). If we don't hear any screams, then I definitely support deprecating it.

Thanks,
    Yaron

On 19.10.2012 12:50, Tero Kivinen wrote:
Sean Turner writes:
Gotta ask: Should this draft update RFC 5996?  On the one hand, it's
optional and existing implementations don't need to support it.  On the
other hand, if you're really trying to deprecate the old RSA raw key
format shouldn't it update the base doc?
If we want to deprecate the old raw RSA keys, then I think this
document needs to be standard track, and it needs to update RFC 5996.
If we just add new format for raw public keys, and both old raw RSA
certificate format and this new format then I think it can be
informational and there is no need for this document to "Update" the
RFC5996. Our previous additions to the IKEv2 have not updated the base
spec (redirect, resumption, IPv6 address configuration, password
authentication, high availability, childless etc). The EAP only
authentication do update RFC5996.

So the answer really depends on which way the WG wants this document
to go...

Could add an informative reference to RFC 5480 in App A for the 04 byte
to indicate it's uncompressed.  But, it's not absolutely necessary.
Done.

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to