Orie,

ATDT555-1212 - was my first thought 🙂 but I like what I read on Bluesky and the 
AT protocol, it's different but related worlds and I think there could be some 
synergies,   I don't see any mention of DNSSEC usage in the AT protocol?

example-issuer.ca plays the role of the verifiable digital credential DC 
issuer.  Like a university or a gov driver's license department that issues 
different forms of DCs.
      
issuer
A role an entity<https://www.w3.org/TR/vc-data-model/#dfn-entities> can perform 
by asserting claims<https://www.w3.org/TR/vc-data-model/#dfn-claims> about one 
or more subjects<https://www.w3.org/TR/vc-data-model/#dfn-subjects>, creating a 
verifiable 
credential<https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> 
from these claims<https://www.w3.org/TR/vc-data-model/#dfn-claims>, and 
transmitting the verifiable 
credential<https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> to 
a holder<https://www.w3.org/TR/vc-data-model/#dfn-holders>.

So with TLSA records, standard labels and URI/PTR (whatever scheme we decide to 
use) and DNSSEC, trust of issuers can be asserted.  The I-D is about finding 
trust registry relationships in the DNS, for global interoperability of 
different ecosystems.

In your example below, it's _atproto.wyden.senate.gov, I think it's the "end 
user" direct AT protocol credential DID and information, not the same thing.... 
more research/reading required.

a TXT record pointing to a DID which returns : _atproto.wyden.senate.gov. 10777 
IN     TXT     "did=did:plc:ydtsvzzsl6nlfkmnuooeqcmc"

where does on go to resolve a DID:PLC? is the DID for the user "wallet" or the 
"account"?

More reading required,

Jack




________________________________
From: Orie Steele <orie@transmute.industries>
Sent: Thursday, June 8, 2023 11:21 AM
To: da...@ietf.org <da...@ietf.org>
Cc: Jacques Latour <jacques.lat...@cira.ca>; uta@ietf.org <uta@ietf.org>; scitt 
<sc...@ietf.org>
Subject: [EXT] Re: Leveraging DNS in Digital Trust: Credential Exchanges and 
Trust Registries

You don't often get email from orie@transmute.industries. Learn why this is 
important<https://aka.ms/LearnAboutSenderIdentification>

Original thread: 
https://mailarchive.ietf.org/arch/msg/dance/g0eSMxmZzb1ucsFtgkVkICV5Hh8/

I read 
https://www.ietf.org/archive/id/draft-latour-dns-and-digital-trust-00.html

Previously I had read:
- https://datatracker.ietf.org/doc/draft-mayrhofer-did-dns/
- https://identity.foundation/.well-known/resources/did-configuration/ (I'm 
co-author)

I don't understand the role that "example-issuer.ca<http://example-issuer.ca>" 
is playing in these records.

Why is there a need to structure the record "key" to include CA information?


Is https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/ relevant to this 
conversation?

I wanted to share some related work, from BlueSky:

They support linking https://www.w3.org/TR/did-core/ to specific domains, this 
allows for the natural control of a domain to be used to establish the natural 
authority of an identifier,

For example:

dig -t txt _atproto.wyden.senate.gov<http://atproto.wyden.senate.gov> | grep 
'did=' | grep -o '"did=.*"' | jq -r 'split("=")[1]'


https://github.com/w3c/did-spec-registries/pull/515

I would like to see a standard way to link decentralized identifiers to domains 
documented somewhere at IETF.

Including UTA & SCITT in case there are folks with relevant comments.

Regards,

OS


--


ORIE STEELE
Chief Technology Officer
www.transmute.industries

[https://ci3.googleusercontent.com/mail-sig/AIorK4xqtkj5psM1dDeDes_mjSsF3ylbEa5EMEQmnz3602cucAIhjLaHod-eVJq0E28BwrivrNSBMBc]<https://transmute.industries>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to