Chair hat off, I'm not sure if authors will agree with this characterization, but I will give it anyway, and authors can correct me:
Why use VCs? Because of the CBOR toolchain. You should comment on if the payload is JSON-LD, if it is, then you lose most of the value of CBOR in my view. Why use DIDs? Alternative PKI, similar to "let's encrypt" or a private pki... More of the interesting part comes from "properties of different PKIs", which translate to "properties of DID Methods" in this document. It's worth being upfront about the energy cost / censorship trade offs for the different possible solutions here. There is also a phenomenon in "blockchain (aka verifiable data registry)" where infrastructure can be single use or multi-use. In the case that a specific ledger is used for payments, it can also be used for key distribution, or routing, for example: https://datatracker.ietf.org/doc/draft-mcbride-rtgwg-bgp-blockchain/ Of course this draft is not about payments or routing, but it is about key distribution and TLS, and delivering those capabilities alongside places that might already rely on a specific technology for routing or payments... at least that is how I see it :) Regards, OS On Tue, Feb 20, 2024 at 2:51 AM Andrea Vesco < andrea.ve...@linksfoundation.com> wrote: > Thanks for the comment. The I-D describes how to add VCs as a certificate > type in TLS while maintaining the interoperability with other certificates. > The aim is to move SSI-based authentication from the application layer down > to TLS without changing the way SSI and TLS work. The SSI model (based on > the use of VC [0] and DIDs [1]) specifies the use of DLT (or more generally > Verifiable Data Registry) to store and retrieve public keys. We will > clarify this point in the abstract and introduction of the next version. > > Andrea Vesco > > [0] https://www.w3.org/TR/vc-data-model-2.0/ > [1] https://www.w3.org/TR/did-core/ > > > > On 19 Feb 2024, at 13:40, Yanlei(Ray) <ray.yan...@huawei.com> wrote: > > > > The motivation for your design needs to be described in the draft. > > Why do you want to put the public key in the distributed ledger? > > > > Lei YAN > > > > -----Original Message----- > > From: Uta <uta-boun...@ietf.org> On Behalf Of Andrea Vesco > > Sent: Monday, February 19, 2024 4:57 PM > > To: uta@ietf.org > > Subject: [Uta] New I-D on VC and TLS > > > > L.Perugini and I have written an I-D on the use of Verifiable Credential > (VC) as a new means of authentication in TLS. We think it might be of > interest and in the scope of the UTA WG. > > > > Could you please give us your opinion? > > > > Draft > > Datatracker https://datatracker.ietf.org/doc/draft-vesco-vcauthtls/ > > Github https://github.com/Cybersecurity-LINKS/draft-vesco-vcauthtls > > > > Kind Regards, > > Andrea Vesco > > _______________________________________________ > > Uta mailing list > > Uta@ietf.org > > https://www.ietf.org/mailman/listinfo/uta > > _______________________________________________ > Uta mailing list > Uta@ietf.org > https://www.ietf.org/mailman/listinfo/uta > -- ORIE STEELE Chief Technology Officer www.transmute.industries <https://transmute.industries>
_______________________________________________ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta