Hello, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This draft documents how a Suite B-compliant SSH client can be built using various other documents that describe how to do ECC-DH, ECDSA, and AES-GCM in SSH. It establishes 2 minimum levels of security, one at 128-bits and another at 192-bits, and specifies how to use the ECC-DH, ECDSA, and AES-GCM components to achieve those two levels. I found no issues with the draft itself and my only complaint is that the Security Considerations seem a little insufficient for the task of describing how to put Suite B in SSH. They are, in their entirety: The security considerations of [SSH-Arch] apply. where [SSH-ARCH] is RFC 4251. The Security Considerations in RFC 4251 are very nice and it is proper to refer to them but, at the very least, it would be nice to provide some text around the following questions: 1. how much entropy is each side required to put into the ECC-DH exchange to achieve the appropriate minimum level of security? 2. in the introduction the draft mentions that following the requirements in the draft does not imply that an implementation is suitable for protection of classified data. What other guidance can the author recommend to leap that bar? Are there any other documents that specify the other requirements an implementation would have to comply with? regards, Dan.