Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

APAC:

  • ...

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • New member introductions
  • Agenda review
Leads
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
2 minReview of previous action itemsLeads
20 minsReview of prior art and suggested readings

X.509 DID method: Decentralising PKI starting with a X.509 DID method (a presentation proposal for RWOT 9 in August 2019)

  • This is a call for a did:x509 method to exist as part of a transition from PKI to SSI, but is not a DID method spec.
  • I could not find any documentation of this dicussion occuring at RWOT 9. I did find evidence of further work on this topic by two of these authors. (See next item.)
  • The primary point of interest in this presentation proposal for me was the idea of further abstracting the method of X.509 certificate discovery by using submethods under their proposed did:x509 method.

Analysis of hybrid wallet solutions - Implementation options for combining x509 certificates with DIDs and VCs (a presentation proposal for RWOT 11 in 2022) and Combination of x509 and DID/VC for inheritance properties of trust in digital identities (presentation to Open Identity Summit, Bonn, 2022)

  • Eric Scouten to give these two papers a second reading, hopefully before Thursday meeting. They look very similar, thus the co-listing here. First impressions:
  • These papers talk about several possible methods for linking X.509 and DID identifiers, which again highlights that one of our larger challenges will be identifying the location of the X.509 cert.
  • NOTE FOR OUR WORK: Which fields do we bind to? That significantly impacts the security profile of the identifier.

did:x509 Method Specification (draft specification and sample code published by Microsoft, 2022)

  • Does not appear to be actively maintained. Published in October 2022, a few issues filed by author over next few months, but no further commits or public discussion that I could find.
  • Requires the X.509 cert to be placed in the signing envelope (i.e. in x5c header of JWS/JST documents).
  • Requires cert subject identity to be mirrored in the DID (example: 

    did:x509:0:sha256:WE4P5dd8DnLHSkyHaIjhp4udlkF9LqoKwCvu9gl38jk::subject:C:US:ST:California:O:My%20Organisation).

  • Allows Fulcio integration. (Fulcio is new to me. Can someone explain? Worth our time?)
  • Raises issue of which chain of trust to use (X.509 or VC).
  • Looks like a fairly good starting point for create/read operation specifications.
  • ACTION: Eric to reach out to authors of MS spec to explore ToIP TF taking over or collaborating on this draft as basis of standard. CC to Jacques Latour .

(Eric Scouten to read, hopefully before Thursday meeting)

15 minsUpdate on ToIP position paperFollow up on action item from 14 December 2023 meeting: Augment this working group's charter with a second output: a position paper from ToIP advocating that decentralized trust infrastructure should incorporate existing PKI infrastructure and explore strategic alternatives.
10 minsTopic #3

Recap: Drummond Reed to review Trust Spanning protocol specification and post an analysis to Slack channel of suitability of VID section as a mini-spec.

5 mins
  • Review decisions/action items
  • Planning for next meeting 
Leads

AGENDA: Next meeting Jacques Latour would like to present on artifacts for X.509 DID at CIRA. DNS records, TLS, etc. Save 20 minutes next week.

Screenshots/Diagrams (numbered for reference in notes above)

...