Yaron Sheffer writes:
> Tero requested a clarification: I'm proposing to say that the
> certificate's hash algorithm does not determine the AUTH hash
> function (which is the negotiated PRF). Implementations may use the
> certificates received from a given peer as a hint for selecting a
> mutually-understood PRF with that peer. 

That I can accept. They are not unrelated, but certificate's hash
algorithm does not determine AUTH hash algorithm.


> And yes, the last sentence refers to this text:
> 
> To promote interoperability, implementations that support this type
> SHOULD support signatures that use SHA-1 as the hash function and
> SHOULD use SHA-1 as the default hash function when generating
> signatures. 

Do you have new proposed text?
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to