> As stated in Section 7.1 of [TRANS], each device will send a list of
> preferred methods for key exchange. The most-preferred method is the
> first in the list. It is RECOMMENDED to sort
> the algorithms by cryptographic strength, strongest first. Some
> additional guidance for this is given in BCP 86 [RFC 3766].
I'm OK with this. I have one other vote for "A" but since this has the
essential gist of the thought I'll ask if anyone really opposes it. If
not, I'll integrate those changes into the docs.