I have question regarding the server authentication during the SSL handshake.
I am going to write this up as my understanding of the concept. Please feel free to point out any mistakes.
We generate a CSR on the server which includes the public key of the server along with the ID information of the server. The CA verifies the identity information after series of steps and generates a certificate which is also signed by the digital signature of the CA server. My first question here is that what comprises of the Digital signature of the server.Does it use the values in CSR; i.e take a hash and encrypt them to generate digital signature or this process of digital signature is individual to the CA.
Secondly during the SSL handshake this certificate is presented to the client. Now in order to verify this certificate one of the steps would be to make sure that issuing CA’s public key validate the issuer’s digital signature.How is this step performed?