[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: response to Last Call on: IP Authentication using Key
- Subject: Re: response to Last Call on: IP Authentication using Key
- From: "Housley, Russ" <housley@spyrus.com>
- Date: Mon, 03 Jul 95 08:58:44
- Cc: ipsec@ans.net
- Encoding: 807 Text
>> Now that it may finally be on the table to do something about
>> draft-ietf-ipsec-ah-md5-03.txt
>> I would like to remind this community that not only
>> should the MAC be defined independent of
>> its intended use, so too should the encryption transform.
>
> More properly, you should state that it is your opinion that the
> transforms should be independant of use.
There are many advantages to a protocol specifiation that is
independent of mechanism and a separate mechanism description. One
iportnat benefit is that other IETF groups can use the same mechanism
description in the same way that Hugo's I-D references the MD5 RFC.
Good modularity in the specifications saves alot of time and effort
down the road. And, it makes specification maintenence easier too.
Russ