The publickey algorithms and encodings defined in this
document SHOULD be accepted anyplace in the ssh2
protocol suite where publickeys are used, including,
but not limited to hostkeys, publickey authentication
and hostbased authentication.
Yes, that does seem like a better way of doing it, as apparently we have
missed out on a number of existing areas. However, I would like to be
able to list of all the existing areas where we believe it does apply in
order to give implementers an idea of what they need to change based on
current standards in order to adopt this (i.e., "including but not
limited to" type language).