The line of discussion about a particular algorithm reflects the
rather
unfortunately tendency to have every system-level effort involving
security get dragged into low-level debates about basic algorithms and
about the current views of various experts in the security community.
That's no way to run a standards effort.
The current document purports to be a candidate for BCP and yet it
recommends a practice which is clearly no longer appropriate. In
light of the information provided it should be obvious that it's not
acceptable in its current form. The fix should also be obvious, and
the resulting document (with other edits as needed for clarity) seems
quite useful, timely, and appropriate.
This discussion isn' t holding back the document, it's helping
provide feedback on what kinds of edits are needed to get the
document approved. If anything, one of the authors is holding back
the document.
_______________________________________________
Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf