-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
added integrity field in did document specification #16
Conversation
Instead of adding the checksum in DID Doc, I propose integrity & authenticity checks be done from within the profile document itself (see comment). This has some benefits:
This also means that for this stage, when we do not have a profiles document content fixed, we don't need to solve it. We can just create a first proposal. Example spec text:
Super simple example of the profile document:
|
@a-fox I thought we discussed that the signing of the profile document is not the point here. We already have a proof section in the document. The DID Document SHOULD update it's document verification proof if the profile document updates, b/c the profile being referenced document has changed. https://github.com/trustoverip/tswg-trust-registry-service-profile/blob/main/spec.md#profile-document-sample. Profiles are static documents, not living documents, and thus, need a pointer update when the document has updated. The |
Yes, we did discuss it, but after reconsidering I think it's a useful thing, but not mandatory. That's why I added it as SHOULD instead of MUST. As the checksum / hash is also in the profiles document, it will be changed there of course. And signing prevents it to be tampered with by others. However, at this stage (IIW coming), I'm content if we add authenticity verification as a security consideration. Anyway, if we choose to go on with the checksum, then we cannot do with checksum alone, we need to reference the used algorithm. So we need to add the algorithm reference in the field and/or specify in the spec, which algorithm is used. IMO both should be done (maintaining an up to date list of algorithms is a pain though). So, instead of it should be: |
I suggest we make the field |
@TelegramSam: Generally just trust the signer, but the the problem is you don't own the document necessary. Hashlink, but not as much in adoption. Some core people not interested. Implicit choice: slow moving propagation and infrequent changes. Antti: Trust the Trust Service Profile. @talltree Hashlinks makes sense. DIDURL standard. |
Adding integrity field to the DID Document reference. Ensures profile integrity in presentation.