-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Amplification accidentally attenuates time bounds #171
Comments
Ideally one keeps the amount of capabilities per UCAN to a minimum: When delegating, you'd delegate multiple UCANs for separate capabilities. And when invoking a UCAN, you'd only collect them up in a single UCAN that refers to all the delegations in the Anyways, just chipping in with some of the things I remember from discussions in the past. In theory multiple-capabilities-per-ucan allows you to make revocations "atomic". I.e. "revoke everything or revoke nothing", but I don't think that's a use case for anyone. Just noting. |
Not taking sides here, but I do want to point out that we found a way in UCAN invocation spec to authorize multiple invocations using single cryptographic signature by signing set of CIDs been authorized. That is to say in theory we could do something similar with UCANs and authorize multiple delegations with one signature. That said it will still incur overhead of It is also worth mentioning that we have been discussing idea around dropping |
Responded here: ucan-wg/invocation#21 (comment) As Irakli cited above, amplification has been removed from Delegation since we can now express those cases in Invocations |
When two UCANs get bundled into an amplification UCAN, its time bounds must be within the intersection of the bundled UCAN time bounds, as per the spec.
This accidentally attenuates time bounds, could we avoid it?
E.g., by allowing time bounds to be derived from the proof chain, preserving original time bounds of each bundled capability.
The concept @Gozala introduced, being discussed here.
E.g., to have time bounds at the capability level, perhaps in Caveats.
E.g., to represent amplification as a collection of UCANs
Pro: preserves granularity of capabilities, allowing to manage them separately, e.g., revoking only some.
Con: these UCANs would need to be individually authorized. Something that attenuation as a bundled UCAN spares us from.
Con: and individually revoked later on, if one wishes.
The text was updated successfully, but these errors were encountered: