14:41:46 RRSAgent has joined #did 14:41:46 logging to https://www.w3.org/2021/09/07-did-irc 14:41:48 RRSAgent, make logs Public 14:41:50 please title this meeting ("meeting: ..."), ivan 14:42:01 Meeting: DID WG Telco 14:42:01 Chair: burn 14:42:01 Date: 2021-09-07 14:42:01 Agenda: https://lists.w3.org/Archives/Public/public-did-wg/2021Sep/0017.html 14:42:01 ivan has changed the topic to: Meeting Agenda 2021-09-07: https://lists.w3.org/Archives/Public/public-did-wg/2021Sep/0017.html 14:46:54 burn has joined #did 14:49:33 TallTed has joined #did 14:54:42 present+ 14:57:32 present+ 14:58:39 brent has joined #did 14:59:00 TallTed has joined #did 15:00:25 present+ 15:01:00 present+ 15:01:09 present+ 15:01:12 identitywoman has joined #did 15:01:15 Deborah has joined #did 15:01:16 present+ drummond 15:01:22 present+ 15:01:28 drummond has joined #did 15:01:31 present+ 15:01:33 present+ TallTed 15:01:39 present+ 15:01:56 present+ 15:02:11 scribejs, set Deborah Deborah Shands 15:03:38 guest+ Jeremie_Miller 15:03:42 Topic: Agenda Review, Introductions 15:04:01 Orie has joined #did 15:04:07 present+ 15:04:20 present+ shigeya 15:04:22 markus_sabadello has joined #did 15:04:25 present+ 15:05:18 I can scribe 15:05:46 scribe+ identitywoman 15:05:50 present+ dwaite 15:05:58 Topic: DID Rubric Status 15:06:11 @burn next item is giving status. 15:06:25 s/@burn/burn:/ 15:06:26 https://github.com/w3c/did-rubric/issues 15:06:31 https://github.com/w3c/did-rubric/pull/49 15:06:47 @burn main point is to convert DID rubric to a registry - this is an issue that is out 15:06:48 present+ pam 15:07:01 q+ 15:07:25 ack drummond 15:07:37 @burn before the existing group charter ends - important to get done before we shift to a maintenance charter. 15:07:53 s/@burn/burn:/g 15:08:13 q+ 15:08:15 drummond: more in-depth and complex 15:08:25 (is that right?) 15:08:32 ack markus_sabadello 15:08:35 Pamela has joined #did 15:08:51 q+ 15:09:04 ack ivan 15:09:08 peacekeepr: I miss-understood this proposal at first - it is just one part of it - just about adding additional criteria - I like it 15:09:39 q+ 15:09:42 zakim: I read it this morning - important to have it done as quickly as possible - so put in DID new charter that this will turn into an official registry document. 15:09:43 ack TallTed 15:09:52 +1 to Ivan's point -- we want to include this in the new charter 15:10:25 s/peacekeepr/markus_sabadello/ 15:10:33 dwaite has joined #did 15:10:45 Tallted: I had started going over this with a fine tooth comb and made a stack of suggestions - I didn't quite understand how things were flowing as documents - main author should go through my comments and then I can do - they have been sitting there for 5 days 15:10:50 s/zakim:/ivan:/ 15:10:57 Topic: DID Spec status update 15:10:58 burn: If he wants this to get in he needs to be very responsive to comments 15:11:05 burn: did spec status update 15:11:23 q+ to ask when to create the final document. 15:11:27 burn: as I think most of you know the W3C Advisory committee voted - we have had some comments and three formal objections. 15:11:42 q+ 15:11:50 q- later 15:12:16 burn: the chairs and team contact and editors have been talking with W3C leadership - we don't know what is going to happen. The chairs at this point believe that none of these objections will mean it can't be publish as a recomendation. 15:12:33 burn: if it is delayed the existing working group charter will get extended. 15:12:53 q? 15:12:59 ack ivan 15:13:01 burn: if their is a delay the new charter will be modified. 15:13:40 s/if their is a delay the new charter will be modified./we may need to modify the new charter based on the objections/ 15:13:46 ack manu 15:13:46 manu, you wanted to ask when to create the final document. 15:13:48 zakim: I was PTO last week but Philip did pick up my role and i'm greatful for that he is talking to the objectors later this week - something should come out of that 15:14:14 s/zakim:/ivan:/ 15:14:28 bumblefudge has joined #did 15:14:56 manu: do you want me to prep the document itself - we do have to create a final document and pull it. 15:14:58 q+ to ask if there may be editorial changes resulting from the objections 15:15:16 ack brent 15:15:16 brent, you wanted to ask if there may be editorial changes resulting from the objections 15:15:20 q+ 15:15:28 manu: general question is timing 15:15:37 q+ 15:15:50 present+ by_caballero 15:15:51 brent: will there be editorial feedback based on the objections 15:16:10 brent: it seems much will be into the rubric or the implementation guide 15:16:14 ack ivan 15:16:18 brent: will process the que but keep chort 15:16:48 s/brent: /burn: / 15:16:48 s/brent/burn/ 15:16:58 ivan: not generate a final status thing - just take care of the outstanding editorial PRs 15:17:01 +1 15:17:41 Topic: SRI Review of DID Spec 15:18:00 brent: would you like to give a brief introduction and then go into review 15:18:13 JoeAndrieu has joined #did 15:18:40 deborah: should I put up slides - please do and if you have a link to put chat 15:18:54 There is a PR that adds these slides to the did imp guide: https://github.com/w3c/did-imp-guide/pull/29 15:19:02 deborah: we do a lot of research of government entities 15:19:23 present+ JoeAndrieu 15:19:42 deborah: my group does some research in cybersecurity 15:19:47 dbuc has joined #did 15:19:51 present+ 15:20:39 deborah: my customer Anil John - asked me to review the DID and come up with security and privacy criteria for DID methods - I was able to spend about 100 hours on this (normally it would take a long time) 15:20:56 deborah: approach to developing the requirements - they are in the document at the back of the slides. 15:21:38 q+ 15:21:43 q- 15:21:50 deborah: I re-ordered the slides official approval to get publically released. I don't have them on the web. You can put them on your repositories on the public web. 15:21:59 ack Orie 15:22:20 also was put on ML: https://lists.w3.org/Archives/Public/public-did-wg/2021Aug/0022.html 15:22:31 orie: there is a pull request for these documents (report and slides) for the implementation guide (may not be final home) 15:23:09 -> Slides of the presentation https://lists.w3.org/Archives/Public/public-did-wg/2021Aug/att-0022/DIDSecPrivCriteriaOverview-public.pdf 15:23:27 deborah: I did a little bit of a job from the perspective of a government agency that wanted to create a high value credential and apply that to a DID. What charateristics apply that to a DID - so a government agency can apply that to a DID. 15:24:03 deborah: sketched an approach for a security and privacy approach - to illuminate to the customer - that were not garden variety issues. 15:24:11 -> Security & Privacy Assessment criteria https://lists.w3.org/Archives/Public/public-did-wg/2021Aug/att-0022/DID-Criteria-V4.0-public.pdf 15:24:26 deborah: authentication, authorization, login, identity verification etc. these are garden variety 15:25:15 deborah: I looked at versoin 1.0 core achitecture document - I knew nothing about implementation. I had opportunity to discuss some of the entities funded by Anil. 15:26:32 deborah: if you are going to do security - well established "system security engineering" two called out Common Criteria - protection profiles - specifications for security for national security - a bunch of international agreements to accept assessments of multiple labratories that are accredited. 15:26:58 deborah: these are estanblished for products. These are established for functional requirements. 15:27:29 deborah: NIST is thinking about standards for systems not just products - integration, deployment proceedures - examples of places for developing criteria. 15:27:47 deborah: we have had decades of systems security engineering 15:28:05 deborah: we don't have - a lot in a similar vein around privacy 15:28:41 deborah: found introduction to privacy engineering by NIST - maps to fair information practices and principles - they are adopted in various international contexts - (re-written some times). 15:28:59 deborah: abstracted up 15:29:16 deborah: approach to developing a criteria - small examples 15:29:38 deborah: define the system - 15:29:59 deborah: I focused on the standard - if you develop criteira against which your system will be evaluated. 15:30:21 deborah: realisitc threats - identity fraud was the one I identified. 15:30:50 deborah: define security objectives to address realistic threats. 15:31:13 deborah: separate security requirements from the objectives - what parts addressed by rest of the environment 15:31:43 deborah: supported by a vast aray of things - and list assumptions of how you rely on those things. 15:32:13 deborah: define privacy objectives and requirements - abstraction above fair information practices and principles 15:32:44 deborah: typically when you get a working group collaborating together you get a common criteria protection protocols - based on a standard. 15:33:36 deborah: different classes of technology infrasturucture that you are assuming - you could develop different criteria - then sub-set to work collaboratively to develop these types of standards. The standards are young you are still develping them they are very security critical. 15:34:13 s/develping/developing 15:34:15 deborah: then your system is evaluated by others - fair play different users - government agencies - may choose on criteria that you don't appreciate. 15:34:56 deborah: example criteria assessment 15:35:51 deborah: Blue - government agency should they create a passport - is the DID good enough from a security and privacy perspective - is the DID method strong enough for a digital passport? 15:36:11 deborah: could be verified during on boarding 15:36:27 deborah: green is good - is a DID document authentic - check a hash volume 15:36:38 deborah: brown think about suporting but not in specification. 15:37:07 deborah: Red is bad - outside of the technical space and really implossible to verify by looking at DID method software and services 15:37:12 q+ dbuc 15:37:13 deborah: looked at list 15:37:31 q+ 15:37:55 deborah: conclusion - work together to develop a really security profile 15:38:36 daborah: position what needed to be dealt with - existing common criteria protection profiles - related to DID method type systems 15:38:54 ack dbuc 15:39:29 daniel: in the red green brown - red is meant to indicate subjectivity? 15:39:44 deborah: no it was not be a subjective 15:40:23 deborah: the approach by next door - they send a post card to your physical address - you have to go type that into - a minimal external process - it is not subjective it is outside the technical process. 15:40:46 daniel: trying to understand the difference with the green 15:41:11 daniel: distinction - thirty voters - mathmatical 15:41:36 deborah: it is quite likely that a government agency will only accept a thing that is mathmatically based 15:41:45 Can Deborah (or someone) share the URL of her final set of slides? 15:41:55 deborah: there is another group at SRI working on the cryptography 15:42:14 deborah: I have not assessed these things based on if they are subjective or not 15:42:39 q+ evaluation of DIDs for VC issuer vs DID subjects 15:42:42 ack manu 15:43:27 manu: this is really fantatic stuff thanks for putting it together and sharing with teh group - some of them have seen your research for the first time here. 15:43:37 manu: the group developed some security and privacy considerations 15:43:53 manu: we also devloped some criteria for the DID rubric. 15:44:33 manu: I think some of the things that you highlighted I don't think that they are in any of the document. This has produced different types of criteria. 15:44:35 q? 15:44:55 manu: I think what you have developed will likely belong in the specification itself. 15:45:03 q+ cel to ask about evaluation of DIDs for VC issuer vs DID subjects 15:45:07 manu: how concrete does it need to be. 15:45:28 manu: talk about the concrete implications give governments or large entrprises something to look at. 15:46:01 manu: sit down and steal yourself - and go look at some of the criteria protection profiles - look at how gory the details are for the process they go through. 15:46:15 sorry last line was deborah 15:46:32 s/steal yourself/steel yourself/ 15:47:00 deborah: look at the indepth work that is done to really look at how they approach it 15:47:29 deborah: look at what happens if there is something that could go wrong - they are going to be very nit picky 15:47:54 deborah: make peace with the level of details that are needed - there are going to be operational assertions and proofs. 15:48:39 ack cel 15:48:39 cel, you wanted to ask about evaluation of DIDs for VC issuer vs DID subjects 15:48:40 burn: one more question and then go into one detail. 15:49:16 charles: I was wondering about considerations of DIDs for issuers of verifiable credentials - I wondered about that (focus on DIDs as subject of credentials). 15:49:36 deborah: my focus was on the systems that generate and issue DIDs 15:49:51 deborah: was asked to look at wallets recently - I have been crawling through wallets 15:50:14 deborah: They can look at DID method implementation they can poke and discuss - software for DID methods 15:50:30 deborah: are they good enough - apply passport credentials to DID. 15:51:20 deborah: if I get a passport credential and decided to get a new wallet - the government agency doesn't get to pick what wallet I put the credential into - how those credentials are managed those who are subjects of credentials or hold credentials on behalf of others - that is something else. 15:51:26 Deborah's point is profoundly true. But I do expect there to be security standards for wallets. 15:52:28 burn: in our world a passport is not a DID it is more like a credential - 15:52:50 Imagine issuing a passport to an identifier that is bound to a physical harware wallet, then not being able to change wallets.... 15:53:11 deborah: so a government agency - if I provide a DID this is my identiifer - I want a passport credential assserted with me as a subject - sorry that DID was not generated by a DID method that we think is good enough. 15:53:32 deborah: stricktly focused on dids and did methods 15:53:52 deborah: one of the recomendations that I made around access control and access policy 15:54:33 deborah: you have a number of controlers that can manage a DID document - there are controlers that are not mention. recomend that you can list all the modifiers that can change the did document 15:54:51 deborah: it seems to me that any of the did controlers can modify any of the elements of a did document. 15:55:19 I disagree with identifying controllers. Circular because now how do you identify them? 15:55:36 deborah: it seems appropriate - to define the extent of a specific did controler over - limited scope of impact. 15:55:49 q+ 15:56:02 deborah: develop minimalistic policy access language - identify which did controlers are permitted to do what to the document. 15:56:31 deborah: it is a pain in the neck - a number of DID controlers can have full access to the document - this could be a real problem. 15:56:36 ack mark' 15:56:39 ack markus_sabadello 15:57:36 q+ to ask how we continue to collaborate? 15:57:38 Markus: thanks deborah for the presentation - this question of access control this varies a lot between different did methods - would your recomendation to require this in the DID core - or do you think it is acceptable to add it to the rubric and then the government could choose a did method that they want 15:57:49 Markus: where you should enforce this 15:57:50 zakim, close the queue 15:57:50 ok, burn, the speaker queue is closed 15:57:53 q- 15:58:08 We should definitely follow up with Deborah 15:58:22 Figure out how we continue to collaborate on this type of work -- it's important. 15:58:29 deborah: enforcment is always on implementation - your method will have a controler policy 15:58:55 Access control policy for DID methods is DID method specific. 15:59:28 deborah: to show you are serious about the security end of things - requiring there is a security policy with these types of things - specifying this at a high level seems like it is important in this type of thing - split this up into subsets - different styles of technology implementation 15:59:46 burn: I think there a lot of great opportunities for discussion/collaboration 15:59:58 deborah: there is e-mail we can meet again - happy to do that. 16:00:20 burn: folks are welcome to communicate with you individually 16:00:45 Thanks deborah! 16:00:49 daborah: it is a pleasure - facinating technology space 16:00:52 Thanks Deborah! 16:01:07 rrsagent, draft minutes 16:01:07 I have made the request to generate https://www.w3.org/2021/09/07-did-minutes.html ivan 16:01:22 zakim, end meeting 16:01:22 As of this point the attendees have been burn, ivan, cel, shigeya, brent, drummond, identitywoman, TallTed, manu, Deborah, Orie, markus_sabadello, dwaite, pam, by_caballero, 16:01:23 Orie -- your muted actions above should be inline comments! 16:01:26 ... JoeAndrieu, dbuc 16:01:26 RRSAgent, please draft minutes 16:01:26 I have made the request to generate https://www.w3.org/2021/09/07-did-minutes.html Zakim 16:01:28 I am happy to have been of service, ivan; please remember to excuse RRSAgent. Goodbye 16:01:32 Zakim has left #did