[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: response to Last Call on: IP Authentication using Keyed
Hugo,
Excellent specification for a keyed hash! Your text represents improvements
and clarifications on a approach that has been a group consensus within the
ipsec working group. As you know, keyed MD5 is being implemented several ways
in the IETF, so your clear documentation is a significant contribution.
Paul
PS - now how do we most expediently update the ipsp specifications