Manu Sporny: Spec should now be aligned with consensus from the last call. Place to put public key, authentication suites. ✪
... Compact algorithm seems to work for those involved in the calls.
Drummond Reed: So delegation is one of the open issues ✪
Manu Sporny: No method on delegation right now, will probable be method specific initially. ✪
Manu Sporny: Experimental items are marked as such in the doc. ✪
Drummond Reed: Manu, can you share links to the new registries? ✪
Drummond Reed: Example 2 Service does not have a property. Manu: That was intentional. ✪
Manu Sporny: If you have a service endpoint you can put it there, but you do not have to do that. ✪
Mike Lodder: Is the "type" optional? It seems to just be a description tag ✪
Kyle Hartog: Q - Example 10 lists encryption as experimental. Where will encryption be in DID Auth? ✪
Manu Sporny: This is still up in the air, good argument for both ways (authentication/encryption) ✪
Dave Longley: Btw, i would think we're talking about "keyAgreement" for TLS, not "encryption" ✪
Jan Camenisch: I've got a question related to pseudonyms, i.e., when a public key is a pseudonym ✪
Drummond Reed: Encryption for DID Auth protocol - it is a separate property will DID Auth end up under auth or service? If all it needed was the type and the key I'm using, these 2 entries under authentication is what that is for. ✪
Drummond Reed: Justification for separation - you don't need to define it as a service. ✪
Manu Sporny: If people want to messaging encryption as a service, it can be done in encryption. ✪
Mike Lodder: In both the service and public key, are they optional or required? ✪
Drummond Reed: The challenge with an assumption of a TLS channel for DID auth is that it requires bootstrapping decentralized identity solutions from centralized CA PKI. ✪
Dave Longley: I think we're talking about two different things ✪
Dave Longley: 2. Authenticating once you have a TLS channel ✪
Dave Longley: Where in #1 you try and do both at once ✪
Dave Longley: But with #1, that's really messy on the Web. (doing both at once) ✪
Manu Sporny: The design pattern you are pointing out christian is upgrades. ✪
Dave Longley: So combining both approaches would be more ideal, IMO. ✪
Dave Longley: And you can do #2 without doing #1 if you trust the CA system. ✪
Mike Lodder: You have to be careful with that and address two issues: the absence of forward secrecy for all data, and the replayability ✪
Drummond Reed: It does seem like including "encryption" as a defined branch of a DID document is on the bubble, and we should not include it if no one has a good use case for it. ✪
Dave Longley: +1 To using authentication or service ✪
Manu Sporny: Key agreement - Could we say that did auth or tls will either go in an auth bucket or service bucket? ✪
Markus Sabadello: Sorry I need to leave.. I don't see any big problems with this version of the spec, and I'm also looking forward to further discussing the details of DID Auth. ✪
Drummond Reed: Mike Lodder makes a good point about encryption for key agreement being something that should be done outside of the DID document. ✪
Dave Longley: (It's like certificate pinning, but putting it on the blockchain instead of in the client) ✪
Drummond Reed: Decision: take "encryption" out of the spec. ✪
Kyle Hartog: I've looked at finding a way to translate an auth key in a DID Doc into a CA. Not sure how it would be done, but if it could it wouldn't require any changes to TLS. Also not an eloquent solution to the problem. ✪
Drummond Reed: Feature discussed early on that solves a significant problem of being able to map a did doc that maps to a url. Name element (property) for a service. ✪
Dave Longley: Yeah, not elegant but would be a better "plan B" than rolling a new TLS ✪
Sam Smith: Ex 2. we have the id which is the did, then the public key with the same did. In key rotation, how do I change the auth in this example? . Earlier we only had the frag identifier. ✪
Sam Smith: With the current way that did frags are being proposed with JSON ld, would that conflict with using rfc6901 or being able to reference other parts of the did spec using rfc6901? ✪
Manu Sporny: The group wants compatibility between the two. We use identifier. When there is not an identifier, that is when it gets hairy. Need use cases for this. ✪
Dave Longley: You can have the same problem if you pick other technologies -- many technologies are mutually exclusive ✪
Sam Smith: Concern: If assume so much with JSON LD we wall off any other options. ✪
Drummond Reed: I think what Sam is proposing is that the spec say that the DID spec supports JSON Pointer. ✪
Drummond Reed: Summary - th did spec in the fragment portion, we say were going to support json pointer for syntax. Make one modifying assumption - if it references a did fragment identifier. ✪
Drummond Reed: If you follow with a slash, now your'e using a json pointer. ✪
Sam Smith: Does anyone see where that is not compatible? ✪
Manu Sporny: Accept that fragments do have some special encoding. ✪
Manu Sporny: Fragment identifier resolution is defined by the media type spec [scribe assist by Drummond Reed] ✪
Drummond Reed: Manu feels that using a "brittle" approach for addressing within a DID document (and he considers JSON Pointer such an approach) could be dangerous. ✪
Manu Sporny: If we are going to give this stuff special meaning, it means that we are talking about something that is a new media type (not json/jsonld0 ✪
Dave Longley: Actually, i don't think there would be any incompatiblity with JSON-LD libraries right now ... it would just be a layer on top you'd have to run -- and JSON-LD users would have to make sure to frame the document a certain way (and know what that frame is) ✪
Drummond Reed: This means that DID documents would need to be a separate media type. ✪