>> How do you plan to deal with the large number of DID methods?
>> Standardization of many of the DID methods has not been finished and
>> they appear to have vastly different security properties, even for the
>> most basic DID methods like did:web and did:key. It sounds difficult to
>> accomplish interoperability in such a flexible system.

Hi Hannes thanks for raising this point.

The did_methods extension proposed in the I-D is intended to carry the list of 
supported DID Methods that a TLS endpoint supports to resolve the peer's DID. 
In our opinion, the DLT-based DID Methods that conform to the DID core [1], and 
store a DID Document that expresses at least one verification method of type 
authentication, are candidates for use in the IoT use case. DID Methods that 
meet this set of minimum requirements (to be agreed upon and reviewed) should 
be entered into a registry and assigned to a range of values for "Experimental 
Use" in an early stage to encourage interoperability experiments.

[1] https://www.w3.org/TR/did-core/

Best regards,
Leonardo Perugini
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to