Get desktop application:
View/edit binary Protocol Buffers messages
RenewChain creates a chain from the chain request.
The signed certificate chain renewal requests. The body of the SignedMessage is the serialized ChainRenewalRequestBody.
The certificate signing request. The content is an ASN.1 DER encoded CMS SignedData structure that contains an ASN.1 DER encoded PKCS #10 request.
The signed certificate chain renewal response. The body of the SignedMessage is the serialized ChainRenewalResponseBody.
The renewed certificate chain. The content is an ASN.1 DER encoded CMS SignedData structure that contains the certificate chain. The chain is the concatenation of the ASN.1 DER encoded certificates.
Return the Level1Key that matches the request
DRKeyLevel1Request leaves out the 'dstIA' field which can be extracted from the transport itself (ideally from authenticated information).
Point in time where requested key is valid.
Protocol value.
DRKeyLevel1Response leaves out the 'dstIA' and 'srcIA' fields which can be extracted from the transport itself (ideally from authenticated information).
Begin of the validity period
End of the validity period
Level1 key
Return the ASAS that matches the request
Point in time where requested key is valid.
Protocol value.
Src ISD-AS of the requested DRKey.
Dst ISD-AS of the requested DRKey.
Begin of validity period of DRKey.
End of validity period of DRKey.
Level1 key.
Return the AS-Host that matches the request
Point in time where requested key is valid.
Protocol value.
Src ISD-AS of the requested DRKey.
Dst ISD-AS of the requested DRKey.
Dst Host of the request DRKey.
Begin of validity period of DRKey.
End of validity period of DRKey.
Level2 key.
Return the Host-AS that matches the request
Point in time where requested key is valid.
Protocol value.
Src ISD-AS of the requested DRKey.
Dst ISD-AS of the requested DRKey.
Src Host of the request DRKey.
Begin of validity period of DRKey.
End of validity period of DRKey.
Level2 key.
Return the Host-Host that matches the request
Point in time where requested key is valid.
Protocol value.
Src ISD-AS of the requested DRKey.
Dst ISD-AS of the requested DRKey.
Src Host of the request DRKey.
Dst Host of the request DRKey.
Begin of validity period of DRKey.
End of validity period of DRKey.
Level2 key.
Return the SecretValue that matches the request
Point in time when the requested key is valid.
Protocol value.
Begin of the validity period.
End of the validity period.
SecretValue key.
Beacon sends a beacon to the remote.
Beacon in form of a partial path segment.
(message has no fields)
Segments returns all segments that match the request.
The source ISD-AS of the segment.
The destination ISD-AS of the segment.
Mapping from path segment type to path segments. The key is the integer representation of the SegmentType enum.
Deprecated list of signed revocations. Will be removed with header v1.
SegmentsRegistration registers segments at the remote.
Mapping from path segment type to path segments. The key is the integer representation of the SegmentType enum.
(message has no fields)
Return the certificate chains that match the request.
ISD-AS of Subject in the AS certificate.
SubjectKeyID in the AS certificate.
Point in time at which the AS certificate must still be valid. In seconds since UNIX epoch.
Point in time at which the AS certificate must be or must have been valid. In seconds since UNIX epoch.
List of chains that match the request.
Return a specific TRC that matches the request.
ISD of the TRC.
BaseNumber of the TRC.
SerialNumber of the TRC.
Raw TRC.
Used in:
The signed part of the AS entry. The body of the SignedMessage is the serialized ASEntrySignedBody. The signature input is defined as following: input(ps, i) = signed.header_and_body || associated_data(ps, i) associated_data(ps, i) = ps.segment_info || ps.as_entries[1].signed.header_and_body || ps.as_entries[1].signed.signature || ... ps.as_entries[i-1].signed.header_and_body || ps.as_entries[i-1].signed.signature
The unsigned part of the AS entry.
ISD-AS of the AS that created this AS entry.
ISD-AS of the downstream AS.
The required regular hop entry.
Optional peer entries.
Intra AS MTU.
Optional extensions.
BandwidthInfo specifies approximate maximum link bandwidth. The separate intra and inter AS bandwidth information allows to reconstruct bandwidth values for all paths (cross-over, shortcut, peering) based on this ASEntry. All values are in Kbit/s.
Used in:
Bandwidth between construction-egress interface and the relevant other interfaces. These are: - construction-ingress interface (if any) - sibling child interfaces, - core interfaces, if this is the start of a segment, or the end of a core segment - peer interfaces The key is the interface identifier of the other interface.
Bandwidth between the local interface and the interface in the neighbor AS for the relevant links. These are: - link at construction-egress interface (if any) - peer links The key is the interface identifier of the local interface associated with the link.
Used in:
,AS certificate in the chain.
CA certificate in the chain.
The raw certificate signature request (PKCS #10).
The renewed certificate chain.
Used in:
The digest of the detached EPIC extension. The hash input is defined as follows: input = totalLen || epic.Detached.AuthHopEntry || epic.Detached.AuthPeerEntries[0] || epic.Detached.AuthPeerEntries[1] || ... epic.Detached.AuthPeerEntries[n-1] Here, 'n' denotes the number of peer entries. 'totalLen' is equal to (n+1), and therefore encodes the total number of authenticators used in the hash.
Used in:
Raw digest of the metadata.
Used in:
Latitude of the geographic coordinate, in the WGS 84 datum.
Longitude of the geographic coordinate, in the WGS 84 datum.
Civic address of the location.
Used in:
Indicate if this is a hidden path.
Used in:
Material to create the data-plane hop field.
MTU on the ingress link.
Used in:
,Ingress interface identifier.
Egress interface identifier.
8-bit encoded expiration offset relative to the segment creation timestamp.
MAC used in the dataplane to verify the hop field.
LatencyInfo specifies approximate lower-bound latency values. The separate intra and inter AS latency information allows to reconstruct latency values for all paths (cross-over, shortcut, peering) based on this ASEntry. All values are in microseconds.
Used in:
Latency between construction-egress interface and the relevant other interfaces. These are: - construction-ingress interface (if any) - sibling child interfaces, - core interfaces, at start or end of a segment - peer interfaces The key is the interface identifier of the other interface.
Latency between the local interface and the interface in the neighbor AS for the relevant links. These are: - link at construction-egress interface (if any) - peer links The key is the interface identifier of the local interface associated with the link.
Used in:
Unspecified link type.
Direct physical connection.
Connection with local routing/switching.
Connection overlayed over publicly routed Internet.
Used in:
, , ,The encoded SegmentInformation. It is used for signature input.
Entries of ASes on the path.
Used in:
Optional static info extension.
Optional hidden path extension.
Optional digests of detached extensions.
Used in:
Optional EPIC extension.
Used in:
ISD-AS of peer AS. This is used to match peering segments during path construction.
Remote peer interface identifier. This is used to match peering segments during path construction.
MTU on the peering link.
Material to create the data-plane hop field
Segment creation time set by the originating AS. Segment expiration time is computed relative to this timestamp. The timestamp is encoded as number of seconds elapsed since January 1, 1970 UTC.
The 16-bit segment ID integer used for MAC computation.
Unknown segment type.
Up segment.
Down segment.
Core segment.
Used in:
List of path segments.
Used in:
List of path segments.
A ServiceResolutionRequest must always fit within a UDP datagram. If the request does not fit, there is no mechanism for clients and servers to establish control-plane reachability.
(message has no fields)
A ServiceResolutionResponse must always fit within a UDP datagram. If the response does not fit, there is no mechanism for clients and servers to establish control-plane reachability.
Supported transports to reach the service, List of known transports: - QUIC Unknown values should be ignored by clients.
Used in:
Approximate, lower-bound latency for paths based on this ASEntry.
Approximate, maximum bandwidth for paths based on this ASEntry.
Geographical coordinates describing the location of the routers for relevant interfaces of this AS. The key is the interface identifier.
Description of the underlying network for the inter-AS links, for the relevant interfaces of this AS. The key is the interface identifier.
Number of AS internal hops between the construction-egress and the relevant other interfaces. These are: - construction-ingress interface (if any) - sibling child interfaces, - core interfaces, at start or end of a segment - peer interfaces The key is the interface identifier of the other interface.
Generic note
Used in:
Protocol specific server address descriptor. Supported address format for QUIC: 192.168.0.1:80 [2001:db8::1]:80 Missing ports / zero port / invalid port values should be treated by clients as errors.
VerificationKeyID is used to identify certificates that authenticate the verification key used to verify signatures.
ISD-AS of the subject.
SubjectKeyID referenced in the certificate.
Base number of the latest TRC available to the signer at the time of signature creation.
Serial number of the latest TRC available to the signer at the time of signature creation.