/
2025-02-06 HAVID TF APAC Meeting Notes

2025-02-06 HAVID TF APAC Meeting Notes

Feb 6, 2025 This Task Force meets weekly every Thursday/Friday. It alternates between two times to maximize global coverage:

  • NA/EU Meeting: 10:00-11:00 PT / 13:00-14:00 EDT / 18:00-19:00 UTC / 19:00-20:00 CET / Friday 01:00-02:00 AEST

  • APAC Meeting: 14:00-15:00 PT / 17:00-18:00 EDT / 22:00-23:00 UTC / 23:00-24:00 CET / Friday 09:00-10:00 AEST

See the Calendar of ToIP Meetings for exact meeting dates, times and Zoom links.

 

Zoom Meeting Links / Recordings

NOTE: This Zoom meeting link will be replaced by a link to a recording of the meeting once it is available.

Attendees

  • @Jesse Carter

  • @Markus Sabadello

  •  

Agenda Items and Notes (including all relevant links)

Time

Agenda Item

Lead

Notes

3 min

  • Start recording

  • Welcome & antitrust notice

  • New member introductions

  • Agenda review

Chairs

  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.

  • New Members:

2 min

Review of previous action items

Leads

Link to spec: High Assurance Verifiable Identifiers (HAVID)

2 min

Update main diagram

 

Link:

Drummond: Reference the Lei to x509 relationship

~ 30 mins

x509 and DID bridge

 

Hash of DIDs as ID in X509:

  • Tim: Hash of DID for identifier in x509

  • Markus: Hashlink DID:CORE

x509 must relate to a keypair Controlled by the DID Doc:

  • Drummond: Potential link between x509 to the DID beyond a keypair

  • Markus: How doe

  • Tim: Public Key of x509 is idempotent (static). x509 doesn’t support key rotation.

    • DIDs are not idempotent (non static)

    • DNS idempotent (non static)

    • Use outputs of the governance

      • Need to specify the rules the mapping needs to abide by

      • Criteria for managing the bridge

  • Drummond: Diff between static and non static (DID vs x509) equivalence assertion than the original assumption:

    • CA certifying the DID/Controller and issuing a cert against that DID

    • Certificate Practice Statement around doing that issuance to a DID is a different thing than the technical bridge (example limits on revocation periods, certificate renewal)

    • Has value because this continuity can be maintained between the rotating DID and x509 certificate

  • Scott:

    • You can change keys within an x509: rekeying the certificate but are fixed within the certificate lifetime

    • CAs are a signing authority to a public key included in a CSR (don’t generally get involved in keys)

    • CAs endorse the meta data in the CSR

      • Can request modification and rekeying the certificate within the Certificate Validity Period

    • We should create a Certificate Policy/Practice statement

    • We should assign ourself an OID?

    • How do CAs subscribe to the CP?

      • Remote Attestation (IETF RATS) for verifying the DID

      • This could be extended for a DID

    • Can involve a public CA in this process

    • OIDs are driven by usecases

    • 2 Trust Lists (Soon to be released)

      • Issue = Endorsing a CSR

      • CA cannot issue a certificate unless that Subject Name is in a Trust List

  • Tim:

    • Is there an OID for the domain name being in the CN?

      • How do we mirror this for DIDs

    • We want to resolve to a DID, where does that live in the certificate?

      • The CA needs to do some challenge and response and that needs to be included in the CP to verify control of the DID

    • Need to agree on the recipe which is tentatively:

      • Put the DID in the SAN, may use a hashlink, maybe use the Common Name (see what vLEI)

      • The keypair used to generate the CSR and rekey the x509 needs to be present in the DID document as a verificationMethod.

      • Before thou issue the x509 need to do a challenge and response with the DID using the keypair pertaining to the x509.

  • Markus:

    • The keypair used to sign the CSR should be a public key in the DID document

    • Does it matter what verification relationship is used for this

  • Scott:

    • Don’t add something new. Minimal changes is the goal.

    • DID Cert?

 

 

 

 

5 mins

  • Assign homework for attendees to fill out sections in more detail using the “cryptographic bridge” and “non-cryptographic bridge” structure

 

 

Screenshots/Diagrams (numbered for reference in notes above)

 

Action Items:

Related content

2025-01-30 HAVID TF APAC Meeting Notes
2025-01-30 HAVID TF APAC Meeting Notes
More like this
2025-02-14 HAVID TF APAC Meeting Notes
2025-02-14 HAVID TF APAC Meeting Notes
More like this
2024-05-29 TSPTF Meeting Notes
2024-05-29 TSPTF Meeting Notes
More like this
2024-07-24 TSPTF Meeting Notes
2024-07-24 TSPTF Meeting Notes
More like this
2025-01-23 HAVID TF NA/EU Meeting Notes
2025-01-23 HAVID TF NA/EU Meeting Notes
More like this
2024-12-19 HAVID TF Meeting Notes
2024-12-19 HAVID TF Meeting Notes
More like this