Re: [IPSECKEY] Generic algorithm test

Michael Richardson <mcr@sandelman.ottawa.on.ca> Mon, 09 June 2003 15:02 UTC

Received: from noxmail.sandelman.ottawa.on.ca (cyphermail.sandelman.ottawa.on.ca [192.139.46.78]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA07931 for <ipseckey-archive@lists.ietf.org>; Mon, 9 Jun 2003 11:02:38 -0400 (EDT)
Received: from lox.sandelman.ottawa.on.ca (IDENT:root@lox.sandelman.ottawa.on.ca [192.139.46.2]) by noxmail.sandelman.ottawa.on.ca (8.11.6p2/8.11.6) with ESMTP id h59Ewwq07295 (using TLSv1/SSLv3 with cipher EDH-RSA-DES-CBC3-SHA (168 bits) verified NO); Mon, 9 Jun 2003 10:59:00 -0400 (EDT)
Received: (from majordom@localhost) by lox.sandelman.ottawa.on.ca (8.11.6/8.11.6) id h59F07S09490 for ipseckey-outgoing; Mon, 9 Jun 2003 11:00:07 -0400 (EDT)
Received: from noxmail.sandelman.ottawa.on.ca (nox.sandelman.ottawa.on.ca [192.139.46.6]) by lox.sandelman.ottawa.on.ca (8.11.6/8.11.6) with ESMTP id h59F06X09485 for <ipseckey@pophost.sandelman.ottawa.on.ca>; Mon, 9 Jun 2003 11:00:06 -0400 (EDT)
Received: from sandelman.ottawa.on.ca (marajade.sandelman.ottawa.on.ca [192.139.46.20]) by noxmail.sandelman.ottawa.on.ca (8.11.6p2/8.11.6) with ESMTP id h59EwZq07290 (using TLSv1/SSLv3 with cipher EDH-RSA-DES-CBC3-SHA (168 bits) verified OK) for <ipseckey@lox.sandelman.ottawa.on.ca>; Mon, 9 Jun 2003 10:58:36 -0400 (EDT)
Received: from marajade.sandelman.ottawa.on.ca (mcr@localhost) by sandelman.ottawa.on.ca (8.12.3/8.12.3/Debian -4) with ESMTP id h59EwYiP029351 for <ipseckey@lox.sandelman.ottawa.on.ca>; Mon, 9 Jun 2003 10:58:35 -0400
Message-Id: <200306091458.h59EwYiP029351@sandelman.ottawa.on.ca>
To: ipseckey <ipseckey@lox.sandelman.ottawa.on.ca>
Subject: Re: [IPSECKEY] Generic algorithm test
In-reply-to: Your message of "Wed, 04 Jun 2003 23:04:55 EDT." <Pine.NEB.3.96L.1030604230133.8368A-100000@fledge.watson.org>
Mime-Version: 1.0 (generated by tm-edit 1.8)
Content-Type: text/plain; charset="US-ASCII"
Date: Mon, 09 Jun 2003 10:58:34 -0400
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
Sender: owner-ipseckey@sandelman.ottawa.on.ca
Precedence: bulk
X-List: ipseckey@sandelman.ottawa.on.ca

>>>>> "Sam" == Sam Weiler <weiler@watson.org> writes:
    Sam> I've been having second thoughts about the wisdom of inheriting from
    Sam> the DNS Algorithm registry.  Are all of the defined alogirthm types
    Sam> appropriate for IPSECKEY use?  Is it likely that future ones will be?

  If there are future public key algorithms defined, they would be appropriate.
  
    Sam> Remember that DNSSEC algorithms specify a hash, too, which is why
    Sam> RSA/MD5 and RSA/SHA1 have different algorithm values even though the

  Yes, as does IKE, for the same reason.
  If we do not want to use DNSSEC values, then we can use IKE values:

http://www.iana.org/assignments/ipsec-registry

  It doesn't matter to me.
  Or we can create a new space.

]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-
This is the IPSECKEY@sandelman.ca list.
Email to ipseckey-request@sandelman.ca to be removed.