Hi UTA list,

I rarely post here, but I would like to a very individual opinion for once. Please feel free to ignore.

If you inherit JSON-LD (as part of VC) from W3C, then... why bother? Web Token Claims in the IETF and JSON-LD fragments in the W3C are a clear demarcation line between the work of the two SDO, currently.


Viele Grüße,

Henk

On 20.02.24 14:25, Orie Steele wrote:
Chair hat off,

I'm not sure if authors will agree with this characterization, but I will give it anyway, and authors can correct me:

Why use VCs?
Because of the CBOR toolchain.
You should comment on if the payload is JSON-LD, if it is, then you lose most of the value of CBOR in my view.

Why use DIDs?
Alternative PKI, similar to "let's encrypt" or a private pki...

More of the interesting part comes from "properties of different PKIs", which translate to "properties of DID Methods" in this document. It's worth being upfront about the energy cost / censorship trade offs for the different possible solutions here.

There is also a phenomenon in "blockchain (aka verifiable data registry)" where infrastructure can be single use or multi-use.

In the case that a specific ledger is used for payments, it can also be used for key distribution, or routing, for example: https://datatracker.ietf.org/doc/draft-mcbride-rtgwg-bgp-blockchain/ <https://datatracker.ietf.org/doc/draft-mcbride-rtgwg-bgp-blockchain/>

Of course this draft is not about payments or routing, but it is about key distribution and TLS, and delivering those capabilities alongside places that might already rely on a specific technology for routing or payments... at least that is how I see it :)

Regards,

OS







On Tue, Feb 20, 2024 at 2:51 AM Andrea Vesco <andrea.ve...@linksfoundation.com <mailto:andrea.ve...@linksfoundation.com>> wrote:

    Thanks for the comment. The I-D describes how to add VCs as a
    certificate type in TLS while maintaining the interoperability with
    other certificates. The aim is to move SSI-based authentication from
    the application layer down to TLS without changing the way SSI and
    TLS work. The SSI model (based on the use of VC [0] and DIDs [1])
    specifies the use of DLT (or more generally Verifiable Data
    Registry) to store and retrieve public keys. We will clarify this
    point in the abstract and introduction of the next version.

    Andrea Vesco

    [0] https://www.w3.org/TR/vc-data-model-2.0/
    <https://www.w3.org/TR/vc-data-model-2.0/>
    [1] https://www.w3.org/TR/did-core/ <https://www.w3.org/TR/did-core/>


     > On 19 Feb 2024, at 13:40, Yanlei(Ray) <ray.yan...@huawei.com
    <mailto:ray.yan...@huawei.com>> wrote:
     >
     > The motivation for your design needs to be described in the draft.
     > Why do you want to put the public key in the distributed ledger?
     >
     > Lei YAN
     >
     > -----Original Message-----
     > From: Uta <uta-boun...@ietf.org <mailto:uta-boun...@ietf.org>> On
    Behalf Of Andrea Vesco
     > Sent: Monday, February 19, 2024 4:57 PM
     > To: uta@ietf.org <mailto:uta@ietf.org>
     > Subject: [Uta] New I-D on VC and TLS
     >
     > L.Perugini and I have written an I-D on the use of Verifiable
    Credential (VC) as a new means of authentication in TLS.  We think
    it might be of interest and in the scope of the UTA WG.
     >
     > Could you please give us your opinion?
     >
     > Draft
     > Datatracker
    https://datatracker.ietf.org/doc/draft-vesco-vcauthtls/
    <https://datatracker.ietf.org/doc/draft-vesco-vcauthtls/>
     > Github
    https://github.com/Cybersecurity-LINKS/draft-vesco-vcauthtls
    <https://github.com/Cybersecurity-LINKS/draft-vesco-vcauthtls>
     >
     > Kind Regards,
     > Andrea Vesco
     > _______________________________________________
     > Uta mailing list
     > Uta@ietf.org <mailto:Uta@ietf.org>
     > https://www.ietf.org/mailman/listinfo/uta
    <https://www.ietf.org/mailman/listinfo/uta>

    _______________________________________________
    Uta mailing list
    Uta@ietf.org <mailto:Uta@ietf.org>
    https://www.ietf.org/mailman/listinfo/uta
    <https://www.ietf.org/mailman/listinfo/uta>



--


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to