Inline:

On Fri, Jun 9, 2023 at 8:13 AM Jacques Latour <jacques.lat...@cira.ca>
wrote:

> Orie,
>
> ATDT555-1212 - was my first thought 🙂 but I like what I read on Bluesky
> and the AT protocol, it's different but related worlds and I think there
> could be some synergies,   I don't see any mention of DNSSEC usage in the
> AT protocol?
>
> example-issuer.ca plays the role of the verifiable digital credential DC
> issuer.  Like a university or a gov driver's license department that issues
> different forms of DCs.
>

The structure of this example name confused me, perhaps something like:

contoso.university.example.edu, manufacturer.example.com,
mobile.software.example, or regulatory.example.gov would be better?

The `.ca` threw me off.

In the VC Data Model, issuer's are identified with `@id` property from
JSON-LD.... See https://www.w3.org/TR/json-ld11/#node-identifiers

Most common examples of issuer identifiers are:

https URLS
did URLS

It would also be possible to use a URN for a key, such as
https://datatracker.ietf.org/doc/rfc9278/

Or other URNs for keys or certificates.

urn:ietf:params:oauth:jwk-thumbprint:sha-256:NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs

jwk supports x5c, and x5u, see -
https://datatracker.ietf.org/doc/html/rfc7517#section-4.6

Not sure about cose key...
https://www.rfc-editor.org/rfc/rfc9360.html#name-x509-cose-header-parameters

issuer A role an entity <https://www.w3.org/TR/vc-data-model/#dfn-entities> can
> perform by asserting claims
> <https://www.w3.org/TR/vc-data-model/#dfn-claims> about one or more
> subjects <https://www.w3.org/TR/vc-data-model/#dfn-subjects>, creating a 
> verifiable
> credential
> <https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> from
> these claims <https://www.w3.org/TR/vc-data-model/#dfn-claims>, and
> transmitting the verifiable credential
> <https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> to a
> holder <https://www.w3.org/TR/vc-data-model/#dfn-holders>.
>
>
> So with TLSA records, standard labels and URI/PTR (whatever scheme we
> decide to use) and DNSSEC, trust of issuers can be asserted.  The I-D is
> about finding trust registry relationships in the DNS, for global 
> interoperability
> of different ecosystems.
>
>
I see, so for example:

regulatory.gov

Might point to identifiers for issuers of related claims... as an example

https://www.sec.gov/

Might point to:

- https://www.fincen.gov - did:example:123
- https://treasury.gov - did:example:456
- https://www.imf.org - did:example:789


> In your example below, it's _atproto.wyden.senate.gov, I think it's the
> "end user" direct AT protocol credential DID and information, not the same
> thing.... more research/reading required.
>
>
You are right,  I think its the other half of the example I gave above:

https://www.sec.gov - did:example:000


> a TXT record pointing to a DID which returns : _atproto.wyden.senate.gov.
> 10777 IN     TXT     "did=did:plc:ydtsvzzsl6nlfkmnuooeqcmc"
>
> where does on go to resolve a DID:PLC? is the DID for the user "wallet" or
> the "account"?
>

AFAIK, it's a DID for the account & wallet (same thing for now, but maybe
this splits in the future... I could be wrong about this.), see their spec
registration details:

{
  "name": "plc",
  "status": "registered",
  "specification": "https://github.com/bluesky-social/did-method-plc";,
  "contactName": "Bluesky PBLLC",
  "contactEmail": "proto...@blueskyweb.xyz",
  "contactWebsite": "https://blueskyweb.xyz/";,
  "verifiableDataRegistry": "https://plc.directory";
}


> More reading required,
>
> Jack
>
>
>
>
> ------------------------------
> *From:* Orie Steele <orie@transmute.industries>
> *Sent:* Thursday, June 8, 2023 11:21 AM
> *To:* da...@ietf.org <da...@ietf.org>
> *Cc:* Jacques Latour <jacques.lat...@cira.ca>; uta@ietf.org <uta@ietf.org>;
> scitt <sc...@ietf.org>
> *Subject:* [EXT] Re: Leveraging DNS in Digital Trust: Credential
> Exchanges and Trust Registries
>
> You don't often get email from orie@transmute.industries. Learn why this
> is important <https://aka.ms/LearnAboutSenderIdentification>
>
> Original thread:
> https://mailarchive.ietf.org/arch/msg/dance/g0eSMxmZzb1ucsFtgkVkICV5Hh8/
>
> I read
> https://www.ietf.org/archive/id/draft-latour-dns-and-digital-trust-00.html
>
>
> Previously I had read:
> - https://datatracker.ietf.org/doc/draft-mayrhofer-did-dns/
> - https://identity.foundation/.well-known/resources/did-configuration/ (I'm
> co-author)
>
> I don't understand the role that "example-issuer.ca" is playing in these
> records.
>
> Why is there a need to structure the record "key" to include CA
> information?
>
> Is https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/ relevant
> to this conversation?
>
>
> I wanted to share some related work, from BlueSky:
>
> They support linking https://www.w3.org/TR/did-core/ to specific domains,
> this allows for the natural control of a domain to be used to establish the
> natural authority of an identifier,
>
> For example:
>
> dig -t txt _atproto.wyden.senate.gov | grep 'did=' | grep -o '"did=.*"' |
> jq -r 'split("=")[1]'
>
> https://github.com/w3c/did-spec-registries/pull/515
>
>
> I would like to see a standard way to link decentralized identifiers to
> domains documented somewhere at IETF.
>
> Including UTA & SCITT in case there are folks with relevant comments.
>
> Regards,
>
> OS
>
> --
>
>
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
>
> <https://transmute.industries>
>


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to