Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • NA/EU meeting: 08:00-09:00 PT / 16:00-17:00 UTC
  • APAC meeting: 18:00-19:00 PT / 02:00-03:00 UTC

See the Calendar of ToIP Meetings for exact meeting dates, times and Zoom links.

Zoom Meeting Links / Recordings

NOTE: These Zoom meeting links will be replaced by links to recordings of the meetings once they are available (usually by the end of the day of the meeting).

...

NA/EU:

APAC:

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • New member introductions
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
2 minReview of previous action itemsChairsNone
25 minsWhat VID types are needed first by implementers?Chairs

This discussion will help us focus on the key requirements we need in the VID section of the Working Draft.

Darrell O'Donnell observed that the process of deciding about the acceptability of a VID is a two-part question:

  1. The Is the VID type .The acceptable to the receiver?
  2. Is the appraisability of the VID instance .
We want
  1. acceptable to the receiver?

Image Added

Sam Smith said that he wants to push receivers towards the most secure VIDs. Sam Smith He said that we should provide examples of the types and instances of VIDs that can prevent the most attacks. We He said we are facing a tsunami of "edge attacks". Sam , and mentioned the HIPAA "Wall of Shame" showing how many breaches and the size of each. So "we are losing the battle" to protect HIPAA. That will capture all of OIDC and all of DNS.

The list we compiled is:

  1. AIDs (Autonomic Identifiers) as defined by the KERI suite of specs.
    1. AIDs use the out-of-band introduction (OOBI) protocol (the OOBI spec is within the CESR spec). You need at least one VID relationship in order to set up the relationship. Once you have the first one, you can use the relationship formation protocol within the TSP to set others.
    2. The OOBI protocol is not necessarily AID-specific. It just relates an IP address with a VID.
    3. It relates 3 things: 1) VID, 2) IP address or DNS name, and optionally 3) a role (a string). The role allows the controller to organize their endpoints.
    4. APIs for KERI are based on an adaptation of the Web principle that location = service. You can query an endpoint and get the list of routes that the endpoint supports. A route is the base path of a URL (unparameterized). So a route can be used with other protocols without having to use the URL mini-language.
    5. AIDs are self-appraising, so they already satisfy appraisability. To appraise, the receiver can discover the endpoint, retrieve the KEL (key event log), and then verify the AID and the nature of its key stake. The receiver can tell the number of witnesses. KERI also has multiple duplicity recovery mechanisms. So the KEL can be appraised.
    6. KERI has two modes: direct and indirect. Either side can be either, so you can have direct-direct, direct-indirect, or indirect-indirect. The receiver just needs to know what mode the sender is in.
      1. In direct mode, the first item the sender would transmit is the KEL. The first event in the KEL has the AID and the inception event. That begins the event log. In direct mode, the AIDs are completely private. 
      2. In indirect mode, the sender is using other witnesses. So the sender assumes the receiver knows how to look up the sender's endpoint via an OOBI. Or the receiver can use a well-known endpoint. Wenjing noted that indirect mode is closer to the TSP discovery. Sam noted that, "The Web itself is a good discovery mechanism." So the Web can be used to retrieve a KEL and use that to do the appraisability. So an AID can be embedded in another DID can be used to bootstrap discovery. In indirect mode, the receiver can also verify the KEL with other witnesses.
      3. Watchers are how the receiver protects from an "eclipse attack": an attack where the only nodes that the receiver can see are from the attacker. So essentially the attacker creates a forked KEL. That's what watchers protect against. The "first seen" policy in KERI mean that an attacker must attack all watchers.
    7. The final outcome is that, if the KEL verifies, and there is no evidence of duplicity, then the receiver decides based on the appraisal whether to trust the AID for the particular context.
    8. SUMMARY: To establish a VID relationship with a controller using an AID requires accessing the set of KERI API endpoints. Those endpoints can be public or private.
  2. did:web
  3. did:webs (which is functionally compatible with did:web) — see AID above (it did:webs is KERI under the hood).
  4. did:dht — <need reference>x509 — <reference X5VTF TF>
  5. did:x509 — <reference X5VTF TF>dht — This is the DID method Block is promoting: https://did-dht.com/
  6. did:indy:<namespace> — <reference>
  7. did:prismOpen Enteprise Enterprise Agent relies on did:prism - I'd love to explore how this can be used (if appropriate)it

Sam Smith noted that any ledger-based DID method can use the ledger to verify key state. But if keys are compromised, the ledger cannot confer that fact.

Sam explained that a key compromise impersonation attack is now quite common. So any VID method that is based on the Web is susceptible to this attack. There is a link to the attack is in the SPAC white paper. Any protocol that is not signing messages is subject to this attack. Double-ratchet does not protect directly from the attack, but it does shorten the time window. KCI Attack:

Neil Thomson:

FWIW - this might be a bit stale - I produced this 3 months ago as an object of conformity for verifiable identifiers. https://github.com/dgc-cgn/CAS-Digital-Trade-Documentation/blob/main/scheme/objects/obj-verifiable-identifier.md

Whether to adopt a VID or not depends on Risk Analysis.

Darrell O'Donnell: If certain attacks are deemed low risk by a given eco-system, then that's their choice in terms of what VID types are acceptable.

This paper was recommended: https://

Image Removed

www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf

Wendy: Aren’t we talking about modularity and defense in depth?

5 minsWhat transport types are needed first by implementers?Chairs

This discussion will help us focus on the key requirements we need in the transports section of the Working Draft.

List:

  1. "Bare metal TCP." transport protocols (TCP, BLE, NFC)
  2. HTTP or HTTPS.
  3. UDP (not supported in KERI yet, but coming). That solution will look like RAET (a protocol Sam wrote in 2013). https://github.com/RaetProtocol/raet.
  4. QUIC.
  5. SMTP (CESR can be embedded in a text protocol).

Key rotation
APAC: We discussed that this issue has not yet been closed, but that an optional standard TSP control message providing notification of key rotation would handle it.

Trust Registry TFDarrell O'Donnell 

Tomorrow will have mathieu showing a demo of a registry-of-registries model.

The goal is still to have an implementer's draft before the end of March.

5 mins
  • Review decisions/action items
  • Planning for next meeting 
Chairs

Screenshots/Diagrams (numbered for reference in notes above)

#1

#2

#3

#4

#5

#6

#7

#8

#9

#10

Decisions

...

NO MEETING NEXT WEEK as Wenjing is traveling and we are going to give him time to move the Google doc to Spec-Up.

Decisions

  • None

Action Items

  •  Sample Action ItemNone