Have read and support adoption. I like the general idea. I don't
have comments on the particular wrappings chosen.
Minor comments:
It might be better to not specify the cryptosuite(s) in use -- aren't
those documented in draft-ietf-sidr-bgpsec-algs? (ECDSA is named in
sections 1 and 4.)
The current security considerations section seems applicable only to
the operator-generated model. You might want to say something about
the other model. And for the operator-generated model, you may want
to add a (flip) comment about transport security being "keep your hand
on the USB key". This almost looks like a use for Resurrecting
Duckling keying methods.
-- Sam
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr