- From: =Drummond Reed <drummond.reed@evernym.com>
- Date: Wed, 13 Jun 2018 06:24:02 -0700
- To: "John, Anil" <anil.john@hq.dhs.gov>
- Cc: W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CAAjunnYWhtZ65AXvThVHJRy3HrPLgFv5erQ1NGFtODEZ56vomA@mail.gmail.com>
On Wed, Jun 13, 2018 at 6:08 AM, John, Anil <anil.john@hq.dhs.gov> wrote: > >I have always felt the line is quite clear: there is the DID layer of > interoperability, > > > > Could you explain what interoperability at the DID layer means? > Just that any peer can use a DID resolver to look up the DID document for any other peer. I often use the analogy (which is just an *analogy)* that it's the decentralized cryptographic equivalent of DNS. > > > >and then the "decentralized P2P protocol" level of interop, > > >i.e., the protocol that any two DID-identified peers can use to talk. > > > > I assume that one is not tied to the other? i.e. After bootstrapping from > what a DID provides, I can use existing protocols and data definition > standards for two systems to talk w/ each other? > Absolutely. That's the purpose of the service endpoint block in the DID document. Any peer can advertise the endpoint(s) and protocol(s) it supports in its DID document. > > > In an Enterprise setting with existing technology and process investments > that need to be leveraged, adding in a light-weight (DID) layer that serves > as an introduction/matching/brokering capability between disparate > systems would be of value if that is a core capability baked into the DID > specification rather than outside of it. > I think that's just what we have baked in. If you find anything missing, let us know and we'll fix it. Best, =Drummond > > > Best Regards, > > > > - Anil > > > > *From:* =Drummond Reed <drummond.reed@evernym.com> > *Sent:* Wednesday, June 13, 2018 7:56 AM > > *To:* John, Anil <anil.john@hq.dhs.gov> > *Cc:* W3C Credentials CG <public-credentials@w3.org> > *Subject:* Re: DID Use Case: Public Pointers to Private Data > > > > On Wed, Jun 13, 2018 at 4:21 AM, John, Anil <anil.john@hq.dhs.gov> wrote: > > I had help to sanity check my intent : -) > > > > Your mention of the ‘sovrin protocol’ also brings to light one of my > concerns in this area which is that there needs to be careful thought given > to what is part and parcel of the base DID spec and what is spun out to be > the responsibilities of DID enabled implementations like Sovrin or Veres > One or others. > > > > I have always felt the line is quite clear: there is the DID layer of > interoperability, and then the "decentralized P2P protocol" level of > interop, i.e., the protocol that any two DID-identified peers can use to > talk. > > > > > > I am concerned that this type of design choice conversation is not > happening in public, and that the standard response seems to be (1) We are > thinking about ANOTHER spec for THAT or (2) It is supported in the > [implementation] protocol. > > > > The Sovrin protocol is being developed very publicly by the Sovrin > Foundation <http://forum.sovrin.org/>, in part because W3C explicitly put > protocol out-of-scope when it chartered the Verifiable Claims Working > Group. There are of course other open standard P2P data exchange protocols > that could be used, including UMA and OASIS XDI, but neither of those has > been focused directly on the nuances of verifiable claims exchange, and in > particular using zero-knowledge proofs for selective disclosure. That's the > focus of the Sovrin protocol, the standard implementation of which is > available as open source code in Hyperledger Indy > <https://chat.hyperledger.org/channel/indy-agent>. > > > > Best, > > > > =Drummond > > > > > > Best Regards, > > > > - Anil > > > > *From:* =Drummond Reed <drummond.reed@evernym.com> > *Sent:* Wednesday, June 13, 2018 12:09 AM > *To:* John, Anil <anil.john@hq.dhs.gov> > *Cc:* W3C Credentials CG <public-credentials@w3.org> > *Subject:* Re: DID Use Case: Public Pointers to Private Data > > > > Anil, this is beautifully stated. I'll note that within the Sovrin > ecosystem, standardizing how access to a resource can obtained via a Sovrin > agent endpoint listed in a DID document is one of the primary purposes of > the Sovrin protocol <https://github.com/sovrin-foundation/protocol>. The > authorization method is of course based on verifiable credentials. Much > work is still to be done, but you have stated the need, the challenge, and > the distinction of the work very well. > > > > =D > > > > On Tue, Jun 12, 2018 at 11:59 AM, John, Anil <anil.john@hq.dhs.gov> wrote: > > Name > > ------------------- > > Public Pointers to Private Data > > > > > > Background > > ------------------- > > When sharing information between multiple organizations, each participant > typically segregates data that is publicly visible from data that is > considered private. It is useful for organizations to provide the public > information in a way that is cryptographically verifiable and includes the > ability to point to data stores containing associated private information. > This private information should only be accessible to authorized entities > on an automated, case by case basis. > > > > > > Need > > -------------------- > > A national customs and border authority facilitating and enforcing the > movement of goods across its border is automating and streamlining the > sharing of relevant documentation from trade organizations. The customs > authority asks each trade organization to self-issue an identifier that > enables them to create digital signatures for the purposes of signing > documentation and authenticating themselves. When a trade organization > ships goods across the border, it uses the identifier to digitally sign and > share data that is visible to the customs authority and other trade > members. When and what data was provided by the trade organization is > auditable, including pointers to private, trade-sensitive, access > controlled data. When the customs authority is performing an inspection, > (a) it reads and verifies the public data and private pointers, (b) > retrieves a cryptographic access token that only they can use to access the > private data, and (c) accesses the private data using the cryptographic > access token. > > > > > > Challenge > > ------------------- > > While the public records are accessible to the customs authority and the > trade organizations, the private records are only accessible to the customs > authority or someone that they delegate the access token to. There are > three protocols at play here: (1) accessing the public records, (2) using > the access token for private access, and (3) the mechanism used to > authenticate during the private access and the subsequent authorization to > see the relevant private data. > > > > > > Distinction > > ------------------- > > This use case identifies the notion that DIDs and DID Documents will > enable architectural models and protocols that have a public and private > component to them. The identification of each actor in the ecosystem and > all three protocols in the challenge are dependent on the authentication > and authorization mechanisms supported/referenced by DIDs and DID Documents. > > > > This use case also suggests that naturally delegatable authentication and > authorization mechanisms should be considered in order to reduce > operational overhead and avoid privilege escalation problems when accessing > these private systems. > > > > > > Best Regards, > > > > - Anil > > > > Anil John > > Cyber Security R&D Program Manager > > Science and Technology Directorate > > US Department of Homeland Security > > Washington, DC, USA > > anil.john@hq.dhs.gov > > > > Email Response Time – 24 Hours > > > > > > >
Received on Wednesday, 13 June 2018 13:24:28 UTC