Sorry for asking this but despite looking at likely sources  off the
documents list on the SIDR page am still in the dark, and would like
to confirm suspicions.

The SKI in the signature attribute is a hash of the signing router's public key,

a) Is this hashed with the CA's pvt key?
b) How is the corresponding CA certificate (to de-hash the SKI) obtained?
c) From where is the router EE cert identified by the SKI then
obtained, or is getting the router's cert considered  unnecessary as
the router  public key is contained in the de-hashed SKI?
thank you,
N.I.
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to