Have read and support adoption. I like the general idea. I don't have comments on the particular wrappings chosen.

Minor comments:

It might be better to not specify the cryptosuite(s) in use -- aren't those documented in draft-ietf-sidr-bgpsec-algs? (ECDSA is named in sections 1 and 4.)

The current security considerations section seems applicable only to the operator-generated model. You might want to say something about the other model. And for the operator-generated model, you may want to add a (flip) comment about transport security being "keep your hand on the USB key". This almost looks like a use for Resurrecting Duckling keying methods.

-- Sam
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to