Tina Tsou <tina.t...@tiktok.com> wrote:
    > I agree that’s a key point. Typically you’d verify the telemetry signing
    > key using a trust anchor – for example, a device certificate signed by a 
CA
    > you already trust or a key the operator installed. If the signing
    > certificate chains up to one of your trusted CAs/keys, then you know the
    > signature is valid. We should probably make this trust-anchor step 
explicit
    > in the draft.

So the reason I ask the question is because if the point is to have data
passed through a couple of steps, and still remain trustworthy, then it's not
clear to me that it the device certificate will be available to those third,
fourth and fifth parties.

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to