...
NOTE: This Zoom meeting link will be replaced by a link to a recording of the meeting once it is available.
Attendees
Agenda Items and Notes (including all relevant links)
Time | Agenda Item | Lead | Notes |
3 min | | Chairs | |
2 min | Review of previous action items | Leads | Link to spec: https://docs.google.com/document/d/1BVmciUxNsolRMknz3dws0dgYFfgwKLOTHRKuVb-Vazo/edit?tab=t.0#heading=h.u9t084b0ygnz |
2 min | Update main diagram | | Link: Drummond: Reference the Lei to x509 relationship |
~ 30 mins | Review current state of spec AND updates made by Alex & Jesse | | x509 and DID bridge | | Hash of DIDs as ID in X509: x509 must relate to a keypair Controlled by the DID Doc: Drummond: Potential link between x509 to the DID beyond a keypair Markus: How doe Tim: Public Key of x509 is idempotent (static). x509 doesn’t support key rotation. DIDs are not idempotent (non static) DNS idempotent (non static) Use outputs of the governance
Drummond: Diff between static and non static (DID vs x509) equivalence assertion than the original assumption: CA certifying the DID/Controller and issuing a cert against that DID Certificate Practice Statement around doing that issuance to a DID is a different thing than the technical bridge (example limits on revocation periods, certificate renewal) Has value because this continuity can be maintained between the rotating DID and x509 certificate
Scott: You can change keys within an x509: rekeying the certificate but are fixed within the certificate lifetime CAs are a signing authority to a public key included in a CSR (don’t generally get involved in keys) CAs endorse the meta data in the CSR We should create a Certificate Policy/Practice statement We should assign ourself an OID? How do CAs subscribe to the CP? Can involve a public CA in this process OIDs are driven by usecases 2 Trust Lists (Soon to be released)
Tim: Is there an OID for the domain name being in the CN? We want to resolve to a DID, where does that live in the certificate? Need to agree on the recipe which is tentatively: Put the DID in the SAN, may use a hashlink, maybe use the Common Name (see what vLEI) The keypair used to generate the CSR and rekey the x509 needs to be present in the DID document as a verificationMethod. Before thou issue the x509 need to do a challenge and response with the DID using the keypair pertaining to the x509.
Markus: Scott:
|
| | | |
5 mins | | | |
Screenshots/Diagrams (numbered for reference in notes above)
Action Items:
How to insert the DID inside an x509
How do we register an OID
Certificate Profile RFC 3647: https://datatracker.ietf.org/doc/html/rfc3647
RFC 5280: https://datatracker.ietf.org/doc/html/rfc5280