-
Notifications
You must be signed in to change notification settings - Fork 106
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
List all validity checks that should be performed #9
Comments
+1 |
This is not exactly true. The issuer may delegate the issuing of revocation information to a TTP. And if several issuers use a common TTP this is much better for privacy protection, as it makes it much more difficult for the issuer or the TTP to know which user/holder has contacted which inspector. Change text to "is required to check revocation via the Issuer or its delegate" Perhaps we should also recommend that revocation lists should preferably be published by TTPs that do not inform the issuer which inpsectors have contacted it, and that a TTP may merge the lists of multiple issuers. |
@David-Chadwick We're also working on Blockchain-based revocation lists to achieve the same result as using an HTTP-based TTP. |
By TTP, you mean Trusted Third Party. Can you give an example of a revocation performed by a TTP? A lot of TTP that I know of only aggregate the credentials and point the use to the source of truth, including revocation of the credential. Typically the TTP covers themselves by giving a valid period or expiration date and upon renewal, they perform a validity check before issuing a new credential. |
Yes.
Company A outsources all their credential management to Outsource B. Outsource B issues credentials under Company A's private key, and places the revocation list information in a bulk revocation list (for all customers). For example, the Department of Motor Vehicles outsources the issuance of digital drivers licenses , which are good for 7+ years. The outsourced firm maintains a revocation list for multiple DMVs, as that is their business model. |
I think the discussion gets a little into the weeds. Revocation will be checked in the manner that the credential tells the inspector to check for it. There will be multiple methods, but that doesn't change the task in the ticket, which is to list the checks that must be performed. Revocation is one of them (if the credential offers a method to check for revocation -- some may not). Here are some validity checks to consider when verifying a Verifiable Claim:
|
👍 , @dlongley. This item should be adjusted to indicate that
|
@ottonomy Could you create a PR from your proposed text so we can do a review? That's the next step here, imho. |
I'm taking this up in the spec now and authoring text to implement @ottonomy's list. |
Discussion can be found here: https://www.w3.org/2017/07/25-vcwg-minutes.html#item04 Related to #9 and #59.
Check to make sure all of these concepts are in the spec:
|
I have verified that all checks listed by @ottonomy are now in the specification. Closing this issue. |
I would request one further check please
|
Added per request by @David-Chadwick. Related to #9.
@David-Chadwick done - 0eac371 I added another one based on your comment, where the holder is able to annotate w/ usage rights as well. |
Discussion can be found here: https://www.w3.org/2017/07/25-vcwg-minutes.html#item04 Related to #9 and #59.
Added per request by @David-Chadwick. Related to #9.
We should make it clear that an inspector (e.g. corporation) is required to check revocation via the Issuer (e.g. government). In fact, there are many different types of validity checks that should be performed on data, such as the revocation status of an Issuer's signing key, the expiration date of the claim, etc.
The text was updated successfully, but these errors were encountered: