Pending. (Still need that later example?)
Will not be able to investigate.
...
Not enough consensus to include in spec, should be specified externally. (First as a seperate document, then maybe in the Additional XML Security URIs?)
Reagle: Is section 5.2 too constraining? I think there is some confusion about its interpration, but the intention isn't too preclude externally specified algorithms from processing the IV as they see fit. I could make a tweak to make this more clear. ACTION Eastlake: since Don has change control on section 5 he can review this text.
Same understanding as the encrypted IV, start off with it being externally specified.
Eastlake: wouldn't hurt to say we're interested in feedback about performance.