Another comment, since you mention Verifiable Credentials, you may be interested to follow the SPICE WG chartering discussions on various lists:
- https://datatracker.ietf.org/group/spice/about/ OS On Tue, Feb 20, 2024 at 7:25 AM Orie Steele <orie@transmute.industries> wrote: > Chair hat off, > > I'm not sure if authors will agree with this characterization, but I will > give it anyway, and authors can correct me: > > Why use VCs? > Because of the CBOR toolchain. > You should comment on if the payload is JSON-LD, if it is, then you lose > most of the value of CBOR in my view. > > Why use DIDs? > Alternative PKI, similar to "let's encrypt" or a private pki... > > More of the interesting part comes from "properties of different PKIs", > which translate to "properties of DID Methods" in this document. > It's worth being upfront about the energy cost / censorship trade offs for > the different possible solutions here. > > There is also a phenomenon in "blockchain (aka verifiable data registry)" > where infrastructure can be single use or multi-use. > > In the case that a specific ledger is used for payments, it can also be > used for key distribution, or routing, for example: > https://datatracker.ietf.org/doc/draft-mcbride-rtgwg-bgp-blockchain/ > > Of course this draft is not about payments or routing, but it is about key > distribution and TLS, and delivering those capabilities alongside places > that might already rely on a specific technology for routing or payments... > at least that is how I see it :) > > Regards, > > OS > > > > > > > > On Tue, Feb 20, 2024 at 2:51 AM Andrea Vesco < > andrea.ve...@linksfoundation.com> wrote: > >> Thanks for the comment. The I-D describes how to add VCs as a certificate >> type in TLS while maintaining the interoperability with other certificates. >> The aim is to move SSI-based authentication from the application layer down >> to TLS without changing the way SSI and TLS work. The SSI model (based on >> the use of VC [0] and DIDs [1]) specifies the use of DLT (or more generally >> Verifiable Data Registry) to store and retrieve public keys. We will >> clarify this point in the abstract and introduction of the next version. >> >> Andrea Vesco >> >> [0] https://www.w3.org/TR/vc-data-model-2.0/ >> [1] https://www.w3.org/TR/did-core/ >> >> >> > On 19 Feb 2024, at 13:40, Yanlei(Ray) <ray.yan...@huawei.com> wrote: >> > >> > The motivation for your design needs to be described in the draft. >> > Why do you want to put the public key in the distributed ledger? >> > >> > Lei YAN >> > >> > -----Original Message----- >> > From: Uta <uta-boun...@ietf.org> On Behalf Of Andrea Vesco >> > Sent: Monday, February 19, 2024 4:57 PM >> > To: uta@ietf.org >> > Subject: [Uta] New I-D on VC and TLS >> > >> > L.Perugini and I have written an I-D on the use of Verifiable >> Credential (VC) as a new means of authentication in TLS. We think it might >> be of interest and in the scope of the UTA WG. >> > >> > Could you please give us your opinion? >> > >> > Draft >> > Datatracker https://datatracker.ietf.org/doc/draft-vesco-vcauthtls/ >> > Github https://github.com/Cybersecurity-LINKS/draft-vesco-vcauthtls >> > >> > Kind Regards, >> > Andrea Vesco >> > _______________________________________________ >> > Uta mailing list >> > Uta@ietf.org >> > https://www.ietf.org/mailman/listinfo/uta >> >> _______________________________________________ >> Uta mailing list >> Uta@ietf.org >> https://www.ietf.org/mailman/listinfo/uta >> > > > -- > > > ORIE STEELE > Chief Technology Officer > www.transmute.industries > > <https://transmute.industries> > -- ORIE STEELE Chief Technology Officer www.transmute.industries <https://transmute.industries>
_______________________________________________ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta