Another comment, since you mention Verifiable Credentials, you may be
interested to follow the SPICE WG chartering discussions on various lists:

- https://datatracker.ietf.org/group/spice/about/

OS

On Tue, Feb 20, 2024 at 7:25 AM Orie Steele <orie@transmute.industries>
wrote:

> Chair hat off,
>
> I'm not sure if authors will agree with this characterization, but I will
> give it anyway, and authors can correct me:
>
> Why use VCs?
> Because of the CBOR toolchain.
> You should comment on if the payload is JSON-LD, if it is, then you lose
> most of the value of CBOR in my view.
>
> Why use DIDs?
> Alternative PKI, similar to "let's encrypt" or a private pki...
>
> More of the interesting part comes from "properties of different PKIs",
> which translate to "properties of DID Methods" in this document.
> It's worth being upfront about the energy cost / censorship trade offs for
> the different possible solutions here.
>
> There is also a phenomenon in "blockchain (aka verifiable data registry)"
> where infrastructure can be single use or multi-use.
>
> In the case that a specific ledger is used for payments, it can also be
> used for key distribution, or routing, for example:
> https://datatracker.ietf.org/doc/draft-mcbride-rtgwg-bgp-blockchain/
>
> Of course this draft is not about payments or routing, but it is about key
> distribution and TLS, and delivering those capabilities alongside places
> that might already rely on a specific technology for routing or payments...
> at least that is how I see it :)
>
> Regards,
>
> OS
>
>
>
>
>
>
>
> On Tue, Feb 20, 2024 at 2:51 AM Andrea Vesco <
> andrea.ve...@linksfoundation.com> wrote:
>
>> Thanks for the comment. The I-D describes how to add VCs as a certificate
>> type in TLS while maintaining the interoperability with other certificates.
>> The aim is to move SSI-based authentication from the application layer down
>> to TLS without changing the way SSI and TLS work. The SSI model (based on
>> the use of VC [0] and DIDs [1]) specifies the use of DLT (or more generally
>> Verifiable Data Registry) to store and retrieve public keys. We will
>> clarify this point in the abstract and introduction of the next version.
>>
>> Andrea Vesco
>>
>> [0] https://www.w3.org/TR/vc-data-model-2.0/
>> [1] https://www.w3.org/TR/did-core/
>>
>>
>> > On 19 Feb 2024, at 13:40, Yanlei(Ray) <ray.yan...@huawei.com> wrote:
>> >
>> > The motivation for your design needs to be described in the draft.
>> > Why do you want to put the public key in the distributed ledger?
>> >
>> > Lei YAN
>> >
>> > -----Original Message-----
>> > From: Uta <uta-boun...@ietf.org> On Behalf Of Andrea Vesco
>> > Sent: Monday, February 19, 2024 4:57 PM
>> > To: uta@ietf.org
>> > Subject: [Uta] New I-D on VC and TLS
>> >
>> > L.Perugini and I have written an I-D on the use of Verifiable
>> Credential (VC) as a new means of authentication in TLS.  We think it might
>> be of interest and in the scope of the UTA WG.
>> >
>> > Could you please give us your opinion?
>> >
>> > Draft
>> > Datatracker https://datatracker.ietf.org/doc/draft-vesco-vcauthtls/
>> > Github https://github.com/Cybersecurity-LINKS/draft-vesco-vcauthtls
>> >
>> > Kind Regards,
>> > Andrea Vesco
>> > _______________________________________________
>> > Uta mailing list
>> > Uta@ietf.org
>> > https://www.ietf.org/mailman/listinfo/uta
>>
>> _______________________________________________
>> Uta mailing list
>> Uta@ietf.org
>> https://www.ietf.org/mailman/listinfo/uta
>>
>
>
> --
>
>
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
>
> <https://transmute.industries>
>


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to