Skip to content

Commit 0b88179

Browse files
committed
Add issue references per 2024-03-07 meeting
1 parent 4204d08 commit 0b88179

File tree

4 files changed

+24
-0
lines changed

4 files changed

+24
-0
lines changed

spec/did_resolution_options.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
## DID resolution options
22

3+
::: issue
4+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/6: Planned review by of this section by task force
5+
:::
6+
37
This DID method introduces a new DID resolution option called `x509chain`:
48

59
Name: `x509chain`

spec/identifier_syntax.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
## Identifier Syntax
22

3+
::: issue
4+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/5: Planned review by of this section by task force
5+
:::
6+
37
The `did:x509` ABNF definition can be found below, which uses the syntax in [RFC 5234](https://www.rfc-editor.org/rfc/rfc5234.html) and the corresponding definitions for `ALPHA` and `DIGIT`. The [W3C DID v1.0 specification](https://www.w3.org/TR/2022/REC-did-core-20220719/) contains the definition for `idchar`.
48

59
```abnf
@@ -26,6 +30,10 @@ In this draft, version is `0`.
2630

2731
The following sections define the policies and their policy-specific syntax.
2832

33+
::: issue
34+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/8: Re-evaluate Rego vs alternative descriptions of policy.
35+
:::
36+
2937
Validation of policies is formally defined using [Rego policies](https://www.openpolicyagent.org/docs/latest/policy-language/), though there is no expectation that implementations use Rego.
3038

3139
The input to the Rego engine is the JSON document `{"did": "<DID>", "chain": <CertificateChain>}`.
@@ -68,6 +76,10 @@ The overall Rego policy is assembled by concatenating the core Rego policy with
6876

6977
### Percent-encoding
7078

79+
::: issue
80+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/4: Can this section be rewritten more fully in terms of RFC 3986?
81+
:::
82+
7183
Some of the policies that are defined in subsequent sections require values to be percent-encoded. Percent-encoding is specified in [RFC 3986 Section 2.1](https://www.rfc-editor.org/rfc/rfc3986#section-2.1). All characters that are not in the allowed set defined below must be percent-encoded:
7284

7385
```abnf

spec/operations.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@ Finally, whether a `did:x509` should pin to an intermediate CA instead of a root
1818

1919
### Read
2020

21+
::: issue
22+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/10: Add discussion on timestamp of signature issuance relative to cert validity
23+
:::
24+
2125
The Read operation takes as input a DID to resolve, together with the `x509chain` DID resolution option.
2226

2327
The following steps must be used to generate a corresponding DID document:

spec/security_privacy.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22

33
### Identifier ambiguity
44

5+
::: issue
6+
https://github.com/trustoverip/tswg-did-x509-method-specification/issues/8: Review this section.
7+
:::
8+
59
This DID method maps characteristics of X.509 certificate chains to identifiers. It allows a single identifier to map to multiple certificate chains, giving the identifier stability across the expiry of individual chains. However, if the policies used in the identifier are chosen too loosely, the identifier may match too wide a set of certificate chains. This may have security implications as it may authorize an identity for actions it was not meant to be authorized for.
610

711
To mitigate this issue, the certificate authority should publish their expected usage of certificate fields and indicate which ones constitute a unique identity, versus any additional fields that may be of an informational nature. This will help users create an appropriate `did:x509` as well as consumers of signed content to decide whether it is appropriate to trust a given `did:x509`.

0 commit comments

Comments
 (0)