Replies: 8 comments 42 replies
This comment has been hidden.
This comment has been hidden.
-
At its heart, the IP is little more than a message format that includes source and destination addresses, and sufficient information to allow another entity to actively do the routing necessary to get the message where it needs to go. IP defines the packet. The routing protocols above the IP layer define how the routing gets done. IP is passive, and all active participants are above or below it. The latter slides in Sam's proposal that show the contents of messages helps to understand why he is so "excited" about the IP analogy. Separating the packet format from the actions on that format is the right approach because any actor that can understand the packet format can operate on it. In that sense, all we need to specify is the packet format. Like Sam did, we ask: What is the minimum information required to verify the message sender and contents? (Answering the questions has the message been modified and is the sender who they claim to be?). It's a great start. And we're off to the races... Also, we should concentrate on what is required to establish the various levels of trust. Addressing and routing can be delegated to TCP and IP because as Sam pointed out, we can trust the message and the sender, we don't need to trust the routing. |
Beta Was this translation helpful? Give feedback.
-
Commenting on the fascinating discussion in the EU meeting about the features of the TSL. For as long as we've had the ToIP stack diagram, I've communicated that the key benefits that a Trust Spanning Layer (or DIDComm prior to that) has to offer to the trust applications above are
In my mind, there are two main components that solve these:
If this is correct, then a Trust spanning protocol should probably then have an identifier layer and a connection layer. |
Beta Was this translation helpful? Give feedback.
-
Whereas I admire the technical ingenuity of SCID and AID, I don't understand what sort of assurances they are assumed to provide. My bank requires me to re-authenticate an https-banking session after a few minutes of inactivity, as well as to confirm an internet-banking transaction. How would this be any different if SCID+AID were used? |
Beta Was this translation helpful? Give feedback.
-
Like any identifier, there can be fraud with AIDs, they could be stolen, be taken over, devices lost, access lost, etcetera. For issues with my domain name, phone or IP connectivity, I know whom I should contact. If there are issues with an AID, what could be the potential impact to the associated device, person or organization? What would a non-tech-savy citizen, consumer or employee do? Who are you going to call? |
Beta Was this translation helpful? Give feedback.
-
@Oskar-van-Deventer with respect to "authentication" in the TSP proposal of an Identifier Security Overlay there are two type or levels of authentication. The first is authentication to the crytographic identifier (pseudonuym) this authentication is essentially a digital signature. This says that the statement was issued by someone who had control of the private key or keys (for multi-sig) in order to generate the signature. This I call secure attribution to the identifier. Depending on the application the second level may happen out of band to the first level. This enables privacy protection. IF the secure attribution is not secure then the linkage to a natural person is not very useful because the natrual person may no longer be in control of the private keys. So it may be that one has to re-authenticate or relink in some circumstances. But in any event TSP provides the secure attribution as the spanning layer. Other trust mechanisms can be layered on top. |
Beta Was this translation helpful? Give feedback.
-
What do we imagine to be the preferred scope of the narrow waist of the stack that the TSP (the neck) sits atop? In Sam's proposal, the waist was shown as IP -- meaning precisely the "IP" that is the acronym for "Internet Protocol", the second half of the familiar "TCP/IP" pair and the core of the Internet Protocol Suite. I've always wondered if this is what the "IP" in ToIP is / should refer to. Do we only have trust problems over the internet proper, or do we have problems any time digital data flows to a remote party? Do we want to solve trust problems when info flows over NFC, Bluetooth, LoRa, UWB, LEO satellite transports, databases, message queues, sneakernet, short-wave radio...? Is the "IP" in ToIP intended to generally refer to digital remoting tech, with IP just being a convenient example? That list that I just gave includes some things that don't typically integrate with IP at all (NFC and Bluetooth; note that I said "typically", not "never"), some that are lower-level MAC protocols (LoRa, UWB), some that are (typically) higher level (databases and message queues), and some that are orthogonal to IP entirely (QR codes, sneakernet, ultrasound, short-wave radio...). Do we want our trust spanning protocol to work for these? One possible answer is to say: all of these are out of scope. The waist is pure "IP"; if it's not flowing over the true internet, we don't intend to provide trust for it. Another possible answer is to say: All of those examples can work, if they are (or become) part of a stack that uses IP. This is what I assume Sam's answer is. Am I right, @SmithSamuelM ? As Sam pointed out in his presentation, application-layer protocols above the TSP can always short-circuit. Two apps can communicate via a DB table without using IP, if they have a way of accessing the DB locally (sqlite?). And Sam's proposal provides authenticity in that scenario. But it's interesting to note that in these cases, the TSP neck isn't actually dependent on the proposed waist. The same is true of the cases that are orthogonal to IP (QR codes...). Protocols that are lower in the stack than IP don't interoperate; I can't send a message from a LoRa device and read it on UWB without using a router and IP. So the temptation is to say, "We don't need TSP to work over any of those. They just build up to IP and then go back down to something lower-level." This is what Sam implied (in my mind, at least) with his diagrams. But there are problems with this. The most important is that two devices that talk the same protocol that's lower-level than IP are forced into an IP dependence in order to get trust, if we say that the neck always sits above the IP waist. Two Bluetooth devices can't talk to one another and use TSP unless they have and use IP addresses, also? So much for TSP between Alice and Bob's phones when they're offline... Two NFC devices? So much for TSP as a basis of trust in payments... One of the things that the neck and waist implies is that the only stuff that has to fit underneath the neck is the stuff that fits atop the waist. I think the appropriate span of the TSP is actually bigger than that. This matters, because the breadth of what's spanned changes the appropriate tradeoffs for the spanning protocol atop that breadth. |
Beta Was this translation helpful? Give feedback.
-
@SmithSamuelM , on the image that your presented that shows the trust spanning layer: I understand that the applications above the TSP is something that need to be developed and will come up once the trust layer is being adopted. However it's not clear for me what are those platforms sitting below the TSP. Are those actual working platforms that the TSP has to be integrated with? or are those something new that should to be built after the TSP? Can you elaborate a bit on that with some concrete example. I'm trying to analyze the proposals from an implementation point of view. |
Beta Was this translation helpful? Give feedback.
-
This discussion thread is for discussion of the first proposal, presented by @SmithSamuelM in the TSPTF meetings on 2023-02-08.
Please use this discussion thread to ask any questions or make any comments about Sam's proposal. We will start separate discussions for each additional proposal.
Beta Was this translation helpful? Give feedback.
All reactions