-
Notifications
You must be signed in to change notification settings - Fork 2
Replace "challenge" and "domain" with the credential "expiry date" #20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@brianorwhatever thank you for pointing me in the direction of DIDComm's endpoint configuration: https://w3c.github.io/did-spec-registries/#didcommmessaging |
For LD-proofs the
However, increased privacy is just "One use of this field". So I find it more fitting to use |
For JWTs there's no field like Implementers are still able to use the expiration date which appears to be good enough to me. @brianorwhatever what do you think? |
Another mechanism for securing published VPs is to reference them via a did:webs URL, see https://trustoverip.github.io/tswg-did-method-webs-specification/index.html#signed-files. However, since the VP could be signed the did:webs mechanism seems to not provide much additional functionality. The use of did:webs URLs to VPs is already supported by the current version of this specification. |
Data Integrity Proofs use new terms for old ideas... Domain is "Audience", Challenge is "Nonce". Both are relevant to protocols where proof of possession is required. |
Thanks, I'll the update the spec accordingly. The "proof of possession" doesn't apply to our case, it's more a "proof of timeliness" that can be achieved for public credentials. |
@jceb the didcomm context is here https://didcomm.org/messaging/v2/index.json. Proof of timeliness can be accomplished with DI using the We should not include a nonce/challenge/domain/audience as this would not gain any security benefits in a public presentation. The only use case I could see if I really squint would be to show that a public presentation is intended for a particular audience/domain but then why would it be a public presentation? |
👍 good, let's remove the nonce/challenge/domain/audience references. |
At the upcoming call on the 11th, we can talk about it a bit more. |
In the spec call on 2023-12-14 it was pointed out that the proposed security mechanism #3 that relies on the
challenge
anddomain
properties in a proof was created with an interactive exchange of credentials in mind. Furthermore, it doesn't work with JWTs #15. Therefore, a better mechanism should be researched.The text was updated successfully, but these errors were encountered: