-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to integrate certificates with DIDs? #69
Comments
Many useful legacy systems rely on certificates, not raw public keys: https://www.cs.bham.ac.uk/~mdr/teaching/modules/security/lectures/PGP.html https://github.com/Netflix/bless https://learn.hashicorp.com/vault/secrets-management/sm-pki-engine#steps So far, the It seems to me that the
One concern I have is that since certificates often contain information other than raw key material, there is a risk of PII leakage (from email embedded in PGP keys for example). I have heard rumors of a did-x509 integration work, I would love to see more examples of using certificates added to the spec. |
We should consider closing this issue, if certificates are not useful or nobody has opinions about this topic, I'm not enough of an expert to solo this concept. |
I would advocate not using certificates in our data structures (other than TLS certificates, which are part of the Web infrastructure). We should be exclusively using JSON data representations, barring compelling reasons to do otherwise. |
@selfissued thanks for your view! https://tools.ietf.org/id/draft-miller-jose-pkix-key-00.html " PKIX certificates have a number of advantages, such as an established process of certification and attribution of entities. It is also sometimes desirable for JSON-based cryptographic operations to support the existing and widespread deployment of PKIX-based technologies. seems like choosing JWK would enable this sort of thing, that would be my preference. Id rather not see many certificate formats, like we currently see with public key types. |
But I'm also fine making the recommendation not include certs in DID Docs, that was my main hope in raising this issue. We would get a hard yes (and here is how) or a hard no, with reasons why. |
To be clear, JWKs already support including certificate chains using the "x5c" parameter. See https://tools.ietf.org/html/rfc7517#section-4.7. So we wouldn't need any new standards to include them. I'm just personally advocating as a best practice that we not use them. |
Here is an example of what embedding x5c cert in BTCR publicKey might look like:
We could add specific language to the publicKey section advising users not to use this functionality. |
Extend your context, do what you want. |
Is the publicKey field to be used for certificates as well? I'm eager to define potential mappings between GPG / SSH / x509 and DIDs.
The text was updated successfully, but these errors were encountered: