From: "David Gaon" <gaond(_at_)ncr(_dot_)disa(_dot_)mil>
>>>1. mandatory support for strong, open and unencumbered
>>>cryptographic algorithms. Other algorithms may be optionally
>>>specified, but will >>not be required for conformance.
I disagree - There MUST NOT be any mandatory requirements for
algorithms, keys, ...
Welcome to the IETF. We do not do things this way.
If they h ave compoatible capabilities, they will correspond, if they
do not, tough luck.
The IETF requires _interoperable_ implementations for its Standards
Process. That means we need to specify mandatory algorithms that all
conformant implementations will use.
WSimpson(_at_)UMich(_dot_)edu
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
BSimpson(_at_)MorningStar(_dot_)com
Key fingerprint = 2E 07 23 03 C5 62 70 D3 59 B1 4F 5E 1D C2 C1 A2