> B sees the invalid spi messages, > goes through few levels of steps to assure itself the message > is genuine and then rekeys. what exactly does B do to validate the message? please show your work. - Bill