Re: [Dance] [EXT] Re: Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries

Orie Steele <orie@transmute.industries> Fri, 09 June 2023 15:51 UTC

Return-Path: <orie@transmute.industries>
X-Original-To: dance@ietfa.amsl.com
Delivered-To: dance@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D214C1526FB for <dance@ietfa.amsl.com>; Fri, 9 Jun 2023 08:51:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.075
X-Spam-Level:
X-Spam-Status: No, score=-2.075 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_PDS_OTHER_BAD_TLD=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QxadUszsUN9K for <dance@ietfa.amsl.com>; Fri, 9 Jun 2023 08:51:25 -0700 (PDT)
Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7035AC151B3B for <dance@ietf.org>; Fri, 9 Jun 2023 08:50:39 -0700 (PDT)
Received: by mail-ed1-x52d.google.com with SMTP id 4fb4d7f45d1cf-5147f7d045bso2921817a12.2 for <dance@ietf.org>; Fri, 09 Jun 2023 08:50:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; t=1686325837; x=1688917837; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=x3UG6wq3n0lKxmuCr3JrXuh8V+AkjBpaCfPTFe8SxDM=; b=CLfdR+LhWmbyout3IlWnZ1gtzXFl/cLr+DZ2D3pK5HsQQGX/xnk56XSga8RrrLGZFe Vjwk4CpecSzUsajRClB741fPUMwDrix8pXjt9YlM0UOJsWuDx1KT9iDdUTtHWB/u+D4r hmS1KqEPFgGMSWrVLmsrE46D2+Huu+/CpyBnC9z/DRSLPmaU7wvQ2r+krvUJAI1uTJ24 9QqdAtW7iLwh41dybZQRy76TomJBCGoemc1fFxvY+UpvMdD/93kXrQAa08Nv34VmHhPM SFfPy79qzKZldiZenakcLl+bsJs8cnKoV93CyZb6bbqV+g3W1HE0DHaJWUb7cDWrvyh1 L9iw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686325837; x=1688917837; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=x3UG6wq3n0lKxmuCr3JrXuh8V+AkjBpaCfPTFe8SxDM=; b=QMCDPHyJOdwoMZxNsSjvFOJ5GbRt9w73oIz2Nrm0I9RaGyA8lx4cqsmdUqLLRKX2NC vUY8qtrfPZ50oTbZ04AbYGbYOYMuTqalWTmWBbXM3FXJ15KBBXU5Jyj+QDzQ0J2ELlov LurhdA3mS9RISwF6eJXogl9IXqCjtkzeUvWnpDFdbAxaUhGEQdRefjSfPY5D7JLJ2PsG iCvG7kCEhsyLZ08Ta50Htq8SpyxgxTWBiBDjyjIfcHNqwonoQ6DbIw7B7p/44I4vVJWU f2zjDMmkI3Z1xFC3oxTRWB4Fc4Hgp+wybTtL5Drs5LfpPlBkCG82Ba31amXx8EsrGC8t px5Q==
X-Gm-Message-State: AC+VfDwaGv4M0axCyLHfklFPxHmr0dzPNWyAGHmXPTC8uJEKPeYVyOqH QkkygRXbqu8ijkKRnaWmZKtkbbQDFjNAxquaewReTg==
X-Google-Smtp-Source: ACHHUZ5N09cU8QqmjTzMdVNEydhIv01WFSIOjDn+9BZmgkzgIr1zZnyqOlNUNkAglEKPcdJ3Geaq//JV4zwfoms307E=
X-Received: by 2002:a17:907:318d:b0:974:6176:2223 with SMTP id xe13-20020a170907318d00b0097461762223mr2243944ejb.13.1686325836888; Fri, 09 Jun 2023 08:50:36 -0700 (PDT)
MIME-Version: 1.0
References: <CAN8C-_KcJ8G+QX99SA859N=oS8-cXqziy-WwovV7jUS6GM29EQ@mail.gmail.com> <YT2P288MB025264AA5242AA7908096DED8A51A@YT2P288MB0252.CANP288.PROD.OUTLOOK.COM>
In-Reply-To: <YT2P288MB025264AA5242AA7908096DED8A51A@YT2P288MB0252.CANP288.PROD.OUTLOOK.COM>
From: Orie Steele <orie@transmute.industries>
Date: Fri, 09 Jun 2023 10:50:26 -0500
Message-ID: <CAN8C-_KV3iYz7rze5oNiJes4vbKXMtXjKQHT=LvvQsu5z9sV7A@mail.gmail.com>
To: Jacques Latour <Jacques.Latour@cira.ca>
Cc: "dance@ietf.org" <dance@ietf.org>, "uta@ietf.org" <uta@ietf.org>, scitt <scitt@ietf.org>, Mathieu Glaude <mathieu@northernblock.io>, Jesse Carter <Jesse.Carter@cira.ca>, protocol@blueskyweb.xyz
Content-Type: multipart/alternative; boundary="0000000000007bd56e05fdb454a7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dance/7WjONpW5dE5HnXeXh8_Em0rwPmU>
Subject: Re: [Dance] [EXT] Re: Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries
X-BeenThere: dance@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DANE Authentication for Network Clients Everywhere <dance.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dance>, <mailto:dance-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dance/>
List-Post: <mailto:dance@ietf.org>
List-Help: <mailto:dance-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dance>, <mailto:dance-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jun 2023 15:51:30 -0000

Inline:

On Fri, Jun 9, 2023 at 8:13 AM Jacques Latour <Jacques.Latour@cira.ca>
wrote:

> Orie,
>
> ATDT555-1212 - was my first thought 🙂 but I like what I read on Bluesky
> and the AT protocol, it's different but related worlds and I think there
> could be some synergies,   I don't see any mention of DNSSEC usage in the
> AT protocol?
>
> example-issuer.ca plays the role of the verifiable digital credential DC
> issuer.  Like a university or a gov driver's license department that issues
> different forms of DCs.
>

The structure of this example name confused me, perhaps something like:

contoso.university.example.edu, manufacturer.example.com,
mobile.software.example, or regulatory.example.gov would be better?

The `.ca` threw me off.

In the VC Data Model, issuer's are identified with `@id` property from
JSON-LD.... See https://www.w3.org/TR/json-ld11/#node-identifiers

Most common examples of issuer identifiers are:

https URLS
did URLS

It would also be possible to use a URN for a key, such as
https://datatracker.ietf.org/doc/rfc9278/

Or other URNs for keys or certificates.

urn:ietf:params:oauth:jwk-thumbprint:sha-256:NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs

jwk supports x5c, and x5u, see -
https://datatracker.ietf.org/doc/html/rfc7517#section-4.6

Not sure about cose key...
https://www.rfc-editor.org/rfc/rfc9360.html#name-x509-cose-header-parameters

issuer A role an entity <https://www.w3.org/TR/vc-data-model/#dfn-entities> can
> perform by asserting claims
> <https://www.w3.org/TR/vc-data-model/#dfn-claims> about one or more
> subjects <https://www.w3.org/TR/vc-data-model/#dfn-subjects>, creating a verifiable
> credential
> <https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> from
> these claims <https://www.w3.org/TR/vc-data-model/#dfn-claims>, and
> transmitting the verifiable credential
> <https://www.w3.org/TR/vc-data-model/#dfn-verifiable-credentials> to a
> holder <https://www.w3.org/TR/vc-data-model/#dfn-holders>.
>
>
> So with TLSA records, standard labels and URI/PTR (whatever scheme we
> decide to use) and DNSSEC, trust of issuers can be asserted.  The I-D is
> about finding trust registry relationships in the DNS, for global interoperability
> of different ecosystems.
>
>
I see, so for example:

regulatory.gov

Might point to identifiers for issuers of related claims... as an example

https://www.sec.gov/

Might point to:

- https://www.fincen.gov - did:example:123
- https://treasury.gov - did:example:456
- https://www.imf.org - did:example:789


> In your example below, it's _atproto.wyden.senate.gov, I think it's the
> "end user" direct AT protocol credential DID and information, not the same
> thing.... more research/reading required.
>
>
You are right,  I think its the other half of the example I gave above:

https://www.sec.gov - did:example:000


> a TXT record pointing to a DID which returns : _atproto.wyden.senate.gov.
> 10777 IN     TXT     "did=did:plc:ydtsvzzsl6nlfkmnuooeqcmc"
>
> where does on go to resolve a DID:PLC? is the DID for the user "wallet" or
> the "account"?
>

AFAIK, it's a DID for the account & wallet (same thing for now, but maybe
this splits in the future... I could be wrong about this.), see their spec
registration details:

{
  "name": "plc",
  "status": "registered",
  "specification": "https://github.com/bluesky-social/did-method-plc",
  "contactName": "Bluesky PBLLC",
  "contactEmail": "protocol@blueskyweb.xyz",
  "contactWebsite": "https://blueskyweb.xyz/",
  "verifiableDataRegistry": "https://plc.directory"
}


> More reading required,
>
> Jack
>
>
>
>
> ------------------------------
> *From:* Orie Steele <orie@transmute.industries>
> *Sent:* Thursday, June 8, 2023 11:21 AM
> *To:* dance@ietf.org <dance@ietf.org>
> *Cc:* Jacques Latour <Jacques.Latour@cira.ca>; uta@ietf.org <uta@ietf.org>;
> scitt <scitt@ietf.org>
> *Subject:* [EXT] Re: Leveraging DNS in Digital Trust: Credential
> Exchanges and Trust Registries
>
> You don't often get email from orie@transmute.industries. Learn why this
> is important <https://aka.ms/LearnAboutSenderIdentification>
>
> Original thread:
> https://mailarchive.ietf.org/arch/msg/dance/g0eSMxmZzb1ucsFtgkVkICV5Hh8/
>
> I read
> https://www.ietf.org/archive/id/draft-latour-dns-and-digital-trust-00.html
>
>
> Previously I had read:
> - https://datatracker.ietf.org/doc/draft-mayrhofer-did-dns/
> - https://identity.foundation/.well-known/resources/did-configuration/ (I'm
> co-author)
>
> I don't understand the role that "example-issuer.ca" is playing in these
> records.
>
> Why is there a need to structure the record "key" to include CA
> information?
>
> Is https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/ relevant
> to this conversation?
>
>
> I wanted to share some related work, from BlueSky:
>
> They support linking https://www.w3.org/TR/did-core/ to specific domains,
> this allows for the natural control of a domain to be used to establish the
> natural authority of an identifier,
>
> For example:
>
> dig -t txt _atproto.wyden.senate.gov | grep 'did=' | grep -o '"did=.*"' |
> jq -r 'split("=")[1]'
>
> https://github.com/w3c/did-spec-registries/pull/515
>
>
> I would like to see a standard way to link decentralized identifiers to
> domains documented somewhere at IETF.
>
> Including UTA & SCITT in case there are folks with relevant comments.
>
> Regards,
>
> OS
>
> --
>
>
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
>
> <https://transmute.industries>
>


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>