[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: response to Last Call on: IP Authentication using Keyed




Hugo,

Excellent specification for a keyed hash!  Your text represents improvements 
and clarifications on a approach that has been a group consensus within the 
ipsec working group.  As you know, keyed MD5 is being implemented several ways 
in the IETF, so your clear documentation is a significant contribution.

Paul


PS - now how do we most expediently update the ipsp specifications