tags |
---|
KERI, IETF, Community |
Chair: Samuel M. Smith email Co-Chair: Philip Feairheller email
Meeting Bi-weekly starting on 2021-10-19 at 10 am EDT
Agenda: https://hackmd.io/-soUScAqQEaSw5MJ71899w (linked from github but edited in HackMD)
Zoom Meeting: https://us02web.zoom.us/j/89842900185?pwd=OEpXSU5pa29FR1A3OXFkUithZFNwQT09 Meeting ID: 898 4290 0185 Passcode: 300255
Calendar Invite: https://us02web.zoom.us/meeting/tZ0lc-uhrjsrEtFmV2aSfAzR015DDL-ld-hg/ics?icsToken=98tyKuGhpj8oE9SVsRGCRpx5Go-ga_PziGJcj7d7kSm3AhNVQxnEZrMXFpZTXdTU
KERI Slack: keriworld.slack.com https://join.slack.com/t/keriworld/shared_invite/zt-14326yxue-p7P~GEmAZ65luGSZvbgFAQ
Explanation of KERI development tools and techniques: KERI development environment
-
Recording https://drive.google.com/file/d/1Vnn7i428XcxeBV_-EBK1K3c74zv_VQze/view?usp=share_link
-
Reports
- CESR
- CESRox
- create suggested extension point
- dual index support to controller signatures
- KERIpy
- lots of KLI fixes under the hood
- recursive percolation of service endpoints (OOBIs) and KELs
- mailbox inspection tool
- lots of KLI fixes under the hood
- Education
- Working on Argolia search engine on white papers, specs, etc.
- Upcoming meeting this Thursday to review current progress: test the searchbar here: WOT-terms site
- Next Thursday: Ask me anything too.
- Cardano
- Ready to Demo today!
- KERIox HCF
- Extracted CESR logic from KERIox into separate repo
- https://github.com/THCLab/cesrox
- Keep
- Pending upstream changes from GLEIF fork.
- Reach out to get generic branded screen set into WebOfTrust repo
- Signify
- Initial implementation of cryptographic primitives in TypeScript
- Key generation, event signing at the edge. Encrypted key storage, Event generation, Event Validation in the cloud.
- Will convert HackMD write up to Markdown file in the repo
- https://github.com/WebOfTrust/signify-ts
-
Announcements
- GLEIF vLEI in production!
- Keri, Keripy, ACDC, CESR, vLEI, Witnesses
- currently in development branch
- GLEIF vLEI in production!
-
Topics
- Cardano Backer Demo Rodolfo
- Modification of indirecting.py and witness start command to support witness using Cardano
- Created an inception event with Cardano address in anchor, rotated every minute with witness receiving events
- Question: should we add configuration item in "c" field of inception event to indicate a Cardano ledger backer
- Do we need to include the Cardano address in every establishment event?
- Probably just in inception event unless rotating to new address
- TODO: Download the KEL from the blockchain and validate it off or the events from Cardano
- https://github.com/roots-id/keri-roots
- WebOfTrust/keripy#90
- Witness misbehaving during our run to production. How to catch it?
- Problems were with the mailbox service running on the same host as the witness
- need to break out
- Wintess itself test to resolve OOBI and then query witness
- Problems were with the mailbox service running on the same host as the witness
- Cardano Backer Demo Rodolfo
-
Recording
-
Reports
- CESR
- updated version CESR spec
- added versioning CESR protocol genus and version
- CESRox
- Updates IIW ported code from WoT repo unit tests neo
- error
- KERIpy
- Additions and modification to KLI vLEI delegated
- Education
- Argolia search meeting
- CAncelled next education meeting
- Cardano
- KERI backer POC running
- https://github.com/roots-id/keri-roots
- KeriOX HCF
- extract all the logic for CESR from KERIOX with neo branch encodiing
- Keep
- forked the WoT clean implemention GLEIF
- GLEIF brand version on GLEIF's repo
- CESR
-
Announcements
- GLEIF vLEI Root in production KERIpy AID
-
Items
- CESR Versioning
- What is the mime text/cesr should not use + json unless completely json
- HCF KERIOX Licensing Model
- thread on slack KeriOX
- HCF building components around KERI
- Summary items
- picked the UPL 1.2 not a strong copy left. Is a reciprocal license.
- with community for community
- LEI members
- UBISecure is one of largest LEI issuers
- CESR Versioning
-
Recording
-
Reports
- CESRox
- CESR
- KERIpy
- In current implementation, 2 rotations required to change control authority.
- In new rotation rules, you can rotate to new keys that aren't in the prior next key digests. You just need to reach the appropriate thresholds of prior next threshold and current signing threshold. So you now only need one rotation to change control authority.
- This change was the forcing function to require dual index codes in CESR
- KLI usability enhancements. Multisig Shell for creating multisig AIDs.
- Fixed agent endpoint for challenge response.
- KERIox
- vLEI
- Staging GLEIF Root AID, using staging GLEIF witness network.
- Working on staging GLEIF External AID and GLEIF External AID this week.
- Keep
- Fork of repository to GLEIF-IT that now has the GLEIF branding.
- Pending push to WoT repo to generic branding.
-
Items
-
DID:KERI method implementation
- BCGov Discussion how to make KERI more interoperable with DID infrastructure.
- DID Resolver
- did:keri OOBI service endpoint tunnel
- did:keri did doc with more features with local secured did resolver
- Discover from a did everything from KERI withnesses and watchers in did:doc
- Exchange Protoocol (DIF Presetntation)
- How to understand ACDC
- DID Resolver
- did:keri::?seq=4&dig=
- essentially and end verifiable did:web URL
- adding a query string to the end of the did allows for specifying key state
- did:web:http://example.com/oobi//controller
- did:web is essentially all blind OOBIs
- can easily rewrite any existing query message as a URL query string
- BCGov Discussion how to make KERI more interoperable with DID infrastructure.
-
Witness Rotation
- Forwarding responsibility of witnesses being rotated out. They are required to publish up to the last event that rotated them out.
- For lost or misbehaving witnesses, you need another mechanism to publish your key state and new witness information, like the watcher network.
- If all your witnesses go down at the same time, you have a problem. So your availability contraints drive your decision about how many witnesses/watchers you need.
- Backer registrar could have a forwarding event on the ledger to track a move to another ledger.
-
Eclipse Attack Comparison KERI vs PoW
- Primarily attacks on permissionless networks, to succeed in a double spend hack
- Assume I have a full node on a PoW network. When a full node gets a chain longer than the one they currently have (fork) the rule is to take the longer chain and throw away the shorter fork.
- Take over all the neighbor nodes of the target of the attack and share a longer, invalid chain with the "eclipsed" target node. Then double spend the resource taken from the target node. Then release the eclipse.
- The target is the gossip protocol.
-
KERI resistence to Eclipse Attack
- KERI's first seen rule. Once key state is seen, it can't be unseen.
- Reconciliation mechanisms to recover an AID if duplicity is seen.
- To eclipse KERI you would have to attack the watcher network.
- The verifier is always protected because of this rule.
- The worst case in KERI of an Eclipse Attack is a denial of service.
-
Need for a published release and merge to main
- We will publish a list of upcoming changes to be merged into main on Slack and give folks time to respond
-
-
Recording
-
Reports
- CESRox
- Which repo to choose from for basis of code
- Provenant contributing a full time Rust dev
- KERIpy
- Sam: working on changes for reserve and custodial rotation logic
- Phil: Simplifyihg extending KLI scripts (KERI Command Line INterface)
- Kevin: Compact credentials stuff still TBD
- vLEI
- Schema changes all final in vLEI
- Privacy language final
- XBRL digital signature WG try to influence the use of vLEI
- Keep
- Branding updates: changes to new GLEIF green color scheme.
- Plan: fork Keep to GLEIF repo then revert branding back to non-GLEIF colors for community repo
- KERIox
- Started updating to match the new encodings (NEO)
- CESR
- Spec changes relative to the new encoding format captured in the NEO branch updates to KERIpy
- Stable codes and stable values via pre-padding before the b64 conversion
- CESRox
-
Items
- IIW
- Solid KERI / ACDC track
- KERI Breakfast Table before Opening Circle
- Each morning to plan sessions for the day
- Likeihood of US regulatory organizations standardizing on LEI
- Reporting: XBRL, etc
- Financial Data Transparency Act
- Witnesses, Watchers and Blockchain
- Indirect Replay Mode with Ledger Oracle diagram from Identifier Theory Paper
- Validator looks up the backer (via ledger address) in the KEL of the AID which provides a cryptographic commitment to the ledger being the source of truth as a backer.
- A rotation event would contain new ledger backer configuration information to change backers
- A seal could be provided back as a receipt to the KEL event to include the hash address in the ledger. This seal could be stored alongside the event to point to the place in the ledger.
- When you have a ledger backer you don't have witnesses.
- You can only have one ledger backer because you are relying on the total global ordering of the ledger.
- Anything that verifies is technically also a watcher. So a witness is also performing watcher services.
- Indirect Replay Mode with Ledger Oracle diagram from Identifier Theory Paper
- How to make any data authentic using KERI and friends -> Authentic Web
-
Authentic Web as a verifiable data structure built from signed hash chained content addressable data
-
Solves the hard problem of zero-trust architectures = signed-at-rest
- signed in motion is relatively easy because can use ephemeral identifiers with ephemeral key state for tokens
- key state at rest is hard because have to solve key rotation problem for persistent identifiers
- signed data at rest using key state at rest of persistent identifiers
- Use ephemeral identifiers as auxiliaries to persistent identifers
- Ambient verifiability: everything can be verified offline, even copies.
-
Mental model of Verifiable Data Structures all the way down
- Genealized hash chained signed data structures (provenanceable)
- hashed list.
- hash of concatenated hashes in list
- hash of cat blineded hashes in list
- Hash Graph
- Hash DAG
- Custom Hash DAG
- Merkle root hash (binary tree) Sparse Merkle Tree
- Patricia Merkle (Trie) root hash
- Signed Hash Graph
- Signed Hash DAG
- ACDC is a type of Custom signed Hash DAG iteself and distribute universal Hash DAG fragment
- Signed Hash DAG
- Cryptographic Accumulators
- Collective Signatures (BBS+)
- CL Signatures (AnonCreds)
- Hash Log
- KEL is a hash log for key state
- TEL is a hash log for every other kind of state anchored to key state
- TEL as versioned hash log
- Content Addressable (Hash indexed) Database
- De-duplication
- universaly unique identifers as indexes = secure distributable database
- SAID as index = crypto agile interoperable universally unique identifiers as indexes
- ACDC is a type of content addressable SAID database fragment, graph fragment
- B-Tree branch
- Genealized hash chained signed data structures (provenanceable)
-
Append to Extend
- permissionless data type registry
- permissionless rules registry
- ecosystem governance through permissionless but trusted (reputable) (web-of-trust) registries
-
Versioned Authentic data
- TEL transfer registry for versioned authentic data
- TEL transfer registry for NFTs
- TEL/ACDC for authentic messaging registry
- TEL/ACDC for authentic versioned document registry
- ACDCs are modeled as graph fragments.
-
BADA/RUN when not use KEL Seals for distributed authentic database
- replay attack protection through monotonicity
- replay signed date-time stamped message
- replay stale keys to newly date-time stamp and sign message
- ephemeral identifiers as auxilaries to persistent identifers
- signed at rest of auxiliary ephemeral identifier
- replay attack protection through monotonicity
-
- IIW
-
Recording
-
Reports
-
CESRox
- Define an approach to building library
- Create a beginning of a Roadmap
- Sam: Count code table contains many exploratory codes that can be ignored, recent changes to indexed signature changes
-
KERIpy
- Sam: added support for dual indexed signatures in CESR and keripy. Final step for reserve participants and custodial participants in partial rotation. Prior next key list and current signing list are no longer the same. Allows for flexibility needed for new rotation logic.
- New codes which indicate what type (single, same, different, missing) of indices exist for a give signature.
- Support for privacy preserving credentials in kli and agent
- Compact credential support being added this week
-
vLEI
- Sally reporting server - https://github.com/GLEIF-IT/sally
- example of verification service / ACDC watcher
-
Keep
- Rebranding for vLEI
-
KERIox
-
CESR
- Dual indexed signature codes
-
-
Items
-
Signify (Signing at the Edge with keys at the edge)
- Backgroud
- Only a small set of activities that need to be protected in infrastructure for key management
- key pair creation
- key pair storage
- event generating
- event signing
- event verification
- Trade off where these actions happen based on where you can secure / protect things.
- Secure code supply chain for key pair creation and event signing. Then storage is secured by encrypting where the keys are store
- Signing is another level of security because you have to USE the private keys
- What are the liabilities do a cloud host have to worry about.
- Cloud host does not want to see keys (non-repudiation). So we want to move event signing out of the cloud agent
- Key state (next digest and current signing key) come from the client.
- Cloud host ensures that the code supply chain is secure and never sees the private keys
- Think of credential signing as yet another event generation and signing
- We want to minimize what we program in the client. Simplify the client to only the things we don't want in the cloud
- key pair creation
- event signing (the problem we want to avoid)
- Key storage is stored encrypted on the client and can be backed up encrypted on the cloud so the cloud never sees the keys
- Escrow - used it protocol design to handle out of order events. Store the event and wait for the other stuff to show up and then continue processing of the event
- Firebase approach of using SSE events to ping the client that a dataset has changed and needs attention. Same approach used here to notify client that something needs to be signed or key pairs need to be created. Those would be datasets that a client can check at anytime (start up, after loss of connection, after SSE event shows up).
- Wallet - loaded term.
- Signify has nothing to attack at rest. Encrypted secrets stored in the cloud. A stateless wallet.
- How does Signify trust that what she is signing is the correct thing.
- Have to trust that the cloud provider has secured the agent code is running correctly
- Cloud host could sign everything it sends to Signify
- Only a small set of activities that need to be protected in infrastructure for key management
-Signify is a web client event signing and key pair creation app that minimizes the use of KERI on the client. The web host cloud agent never sees any of the client's private keys in the clear, these are only unlocked in memory on the client only using the client's passcode which can be used to derive an asymmetric encryption/decryption key pair. The client creates key pairs and then sends them encrypted to the cloud agent that stores them encrypted. Whenever the client needs something signed, the cloud agent does the event generation in response to the client's commands and then sends the generated event back to the client along with the necessary encrypted private signing keys. The client can then decrypt the private keys to sign and send back the signatures on the event. The client can then delete those private keys from memory. So Signify is key creation and event signing in the edge with key storage, event generation, and event verification in the cloud.
Because event verification happens in the cloud it can use full KERI ACDCs etc and all signify clients can use full-featured web agents. The edge devices running the client only need to be able to create key pairs and sign events so they don't need to actually implement any KERI Core-specific functionality. Although CESR would be nice to have. They don't do verification, they don't talk to witnesses or watchers, that is all done by the web-hosted cloud agent. This minimizes the liability of the cloud agent's web host provider because they never see private keys, and the client app is just a client app but with a back channel for decrypting and signing events generated on the agent and does key pair creation locally. It is not a wallet, The cloud agent is the cloud wallet but the private keys are only used in the edge. - Backgroud
-
We think this might be a good trade space for facilitating web clients that do not need to store anything and all the heavy lifting is done in the cloud.
Clearly, because event generation and verification are happening in the cloud an attacker who successfully attacks the cloud code supply chain can cause mischief by tricking the client into signing events that the client doesn't really want to sign. But that mischief never rises to the level of key compromise.
- Implementation
- Leverage existing KERI Agent but add a Signify API
- Change Manager of KeyStore to have a remote signing mode. Whenit gets signing requenst from cloud agent sends the request on back channel to Signify client to sign.
- Make the controller signing look like witness signing
- Escrow eventings waiting for them to collect enought signatures or receipts to meeting a threshold of acceptance.
- Store and Forward cloud agent. Client does not have to keep state from session to session. All state is kept in the cloud. Use SSE (server sent events) to notify client that state has changed.
- Stateless Wallet
-
Recording
-
Reports
- CESRox
- KERIpy
- NEO Branch merged into development. New support for stable value CESR codes. Useful for non-crypto primitives.
- Sam: working on changes to allow new rotation logic.
- Reserve signers and custodial signers. Support indices that are not the same for the current and former signer list
- Add support for dual indices to the idex code count table and Indexer class
- Kevin: Adding support for privacy preserving attributes (nonce field) as well as compact credentials
- Phil: Minor fixes and improvements for Agent interaction with the GLEIF Root of Trust roll out.
- Arshdeep's pull request for KLI Apis
- vLEI
- Kevin: Updating the vLEI schema for compact credential support and consistency across all schema
- Keep
- Support for all the GLEIF uses of the KEEP Root External and Internal
- KERIox
- CESR
- Modified code table for index signatures
- Updated CESR spec, include changes for stable values in all codes
- Provenant
- Working on becoming a QVI, technical and people dimensions.
- Standing up witnesses
- Will need and become involve in CESRox
-
Items
- Question regarding adding new code support to CESR.
- Collective signatures that have variable length
- https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/CESR-adapter-for-sophisticated-multisig.md
- Will be able to use the new variable length codes to support these new signature types
- RootsID - Encountering KERI in the wild in conversations with clients, etc.
- Article: https://www.ksoeteman.nl/2022/08/self-sovereign-identity-can-do-just-fine-blockchain-less/
- W3C TPAC Meeting. Sam attended as an invited expert to give talk on ACDC. Outcome unclear.
- Discussion about adding JSON Schema support
- Discussion about registries. Append-to-extend is ACDC solution to no registries.
- w3c/vc-data-model#934 JSON Schema
- Time to start talking about IIW presentations and collaborations.
- GLEIF - announcing the completed vLEI root of trust.
- KERI and DIDComm for DIDComm v3
- ToIP Technical Architecture v2
- Design principles being discussed at the KERI concepts meeting (edu) on Thursday
- Discussion topic: Root of trust and key management.
- Sam paper: Universal Identifier Theory.
- https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/IdentifierTheory_web.pdf
- 3 Types we care about.
-
- Cryptonomous Identifier. Self certifying. Derived from pub/priv key pairs
- Transferable vs Non-transferable identifiers (persistent vs ephemeral)
-
- Public Identfiers that are not cryptonomous. DNS domain, social security number, etc. (Non-cryptographically generated ID)
-
- Local Identifiers, Aliases. Only have meaning to a local entity. Not shared, avoids collisions.
- Pet Names: Take local identifiers and share them with "friends". Trying to solve Zooko's Triangle.
- https://en.wikipedia.org/wiki/Zooko%27s_triangle
- Can be solved with an identifier graph.
- Problem with collisions.
-
- To solve the problems with #2 you have a trust domain. You place each identifier in a trust domain resolved by the cryptonomous identifiers associated in the trust domain. This avoids the need for a centralized registry or locus of control. Because we solved the collision problem of namespacing.
- Multi-factor association of loci of control. For example, GLEIF will publish the root of trust to multiple public sources. The set of these publication has loci of control which allows us to bootstrap the root of trust.
- Sam paper: Universal Identifier Theory.
- Classification of identifiers. "Important identifiers" that hold credentials vs ephemeral identifiers used for short term communications.
- If you can afford to discard the identifier, use non-transferable identifiers, for example witnesses.
- If your identifier is going to have reputation that can't be discarded use transferable identifiers.
- Question regarding adding new code support to CESR.
-
Recording
-
Reports
-
CESRox
- Meeting on Thursday. Decided on some first steps.
- Porting some code from KERIox to CESRox in the next few weeks
-
KERIpy
neo
branch updates to CESR. New serialization mechanism. Stable codes- Should merge into development this week
- Will break any scripts or configs that rely on stable AIDs generated from salts
-
Keep
- Usability updates from lessons learned from Pilot
- GLEIF Root-of-Trust Build for production ready
- Bug Fixes
- Ubisecure
- trying to use keep multi-sig inception of root delegation
-
KERIox
- Continue work on delegation
-
CESR
- Updated spec with new serialization conversions. Bin <-> Raw <-> Text.
- CESR native versions of KERI event messages specification on the way
- CESR native version of thresholds.
- Modifications to the group codes.
- Improvements aimed at helping CESR move beyond KERI and cryptographic primitives
-
Provenant
- Working towards become a vLEI QVI.
- Working on stable deployment of witness network(s).
- Relative to Stable Net / Builder Net in blockchain world like Sovrin
- Moving into a "production mode" in infrastructure.
- Recognition that this is will be a common problem for community
-
-
Items
-
Future of the Witness Network and Watcher Network
- What will it look like in the future?
- Witnesses for "high stakes" identifiers will run on proprietary infrastructure
- Witness as a Service (WiaS). Witness hosting that can be provisioned on demand
- What will the Watcher Network look like in the future?
- Community collaboration.
- Watcher as a Service (Waas?).
- Are these networks interconnected?
- There will be gossip protocol between Watchers. Universally watches key state and detects duplicity and shares via gossip across the network. Similar to the ceritficate transparency protocol used for SSL certs. Will KERI it is either duplicity or not. No guess work.
- Is it safe to assume that the Watcher network exists?
- Sam: A verifier is a watcher. Right now in the core, watchers are dumb. If there is duplicity, it is simply discarded. In the future, watchers will report on that duplicity and share both KERLs and duplicity across other Watchers.
- Global vs Contextual Watcher networks?
- Varying layers of watcher networks... Major companies, ecosystem and global watcher networks all sharing with each other.
- The only attack on KERI is an eclipse attack so the larger your watcher network reach is the better your protection from this type of attack. The only limitation is a resource constraint.
- Where do the Judges run? AT&T vs T-Mobile. The only "fault" that is apparent is an attach on the KEL. And that can only occur via key compromise. So a successful multi-threshold attach causing duplicity is the only thing Watchers are looking for. So even competitors will want to share across the entire ecosystem. Similar to certificate transparency, all competitors in the internet hosting space share the information with each other because it is in their best interest to eliminate fraud / duplicity.
- Up to the ecosystems to cooporate on Watcher networks, controlled by the validators.
- Key compromise is very difficult, especially with multi-sig. So there should be very few dupicitous occurances(sp?) across the KERI ecosystem.
- Pub-Sub push interface for current witness code plus running a witness in promiscuous(sp?) mode to make a watcher.
- Down the road, UDP gossip interface for witnesses and watchers sharing KELs
- What will it look like in the future?
-
Relationship between DIDComm and KERI/ACDC (Daniel Hardman)
- DIDComm and KERI have complimentary emphasis.
- Significant Overlaps across DIDComm and KERI
- Presentation from Daniel (proposal for how to "combine" the communities):
- Call for members of the KERI community to join DIDComm conversation and +1 calls for using CESR encoding in DIDComm
- DIDComm v2 just ratified in DIF and the conversation for v3 is now open.
- This is the time to start working towards unification.
-
More CESR
-
-
Terms relevant in the (roll-out of) KERI watcher network:
- https://github.com/trustoverip/acdc/wiki/eclipse-attack
- https://github.com/trustoverip/acdc/wiki/promiscuous-mode
- https://github.com/trustoverip/acdc/wiki/protocol
-
Recording
-
Reports
- cesrox
- Questions
- Hackmd of what can be done: https://hackmd.io/W2Z39cuSSTmD2TovVLvAPg
- What should the scope of CESROX be?
- Where is the interface?
- Does it parse and process events or does it just parse?
- Should it be SAX like
- keriox slack channel
- Questions
- Hackmd of what can be done: https://hackmd.io/W2Z39cuSSTmD2TovVLvAPg
- keripy
- Change encoding to stable readable value element in primitives
- New count codes for better organization for collections and pipelining.
- Blind OOBI support added, all witnesses now expose a blind OOBI (https://weboftrust.github.io/ietf-oobi/draft-ssmith-oobi.html#section-6 )
- Agent updates to notifications and SSE messages
- keep
- separate ward from Keep UX
- packaging how to build and distribute for MacOX
- Cloud Agent Keripy without Keep but CLI or ReST API packaged build desktop
- rebranding GLEIF future
- KeriOx
- Delegation work
- Exn messages
- cesrox
-
Items
- Change to CESR encoding
- ToIP Tech stack
- Autonomous Identifier
- "system"
- Autonomous Identifier
-
Recording https://drive.google.com/file/d/1UFlIhg0Dg7YZWaCaoqIF1Q_XDEJAlp90/view?usp=sharing
-
Reports
- keripy
- Tholder now supports CESR signing/next thresholds
- CESR weighted threshold is variable length code (same as CESR proof path)
- Witness endpoint dissemination by controller
- Eliminates the need to configure witness pools with knowledge of each other
- Tholder now supports CESR signing/next thresholds
- caxe
- keep
- Proposed split into two repositories
- Agent and UX/UI
- Proposed split into two repositories
- keriml (CESR in Swift)
- cesrox (https://github.com/WebOfTrust/cesrox)
- (would obviate the need for CESR in Swift)
- Provenant interested in contributing after Mid September
- CESR NOM library to parse
- serdes in Rust
- keriox
- keripy
-
Agenda
-
Announcements:
-
Upcoming (Heads Up) Proposed Changes to CESR
- Support for CESR Native KERI Key Event Message Body
- New codes
- Change to encoding of fixed size primitives for enhanced readability of value portion
- useful for numeric values like numeric thresholds, and sequence numbers
- useful for non-keri useof CESR
- proposed solution to CBOR vs JSON debate in IETF standards bodies
- Support for CESR Native KERI Key Event Message Body
-
Quick questions:
- What is an 'inquisitor'
- Where can I find the (explanation of) dip, icp, di tags
- Answer: in the
development
branch of keripy in file 'src/keri/app/habbing.py'
- Answer: in the
- What do we exactly mean with 'escrow state'
-
OpenWallet Foundation
- Hyperledger Linux Foundation (consortium of supporters Ping, MS etc)
- in Opposition to proprietary Apple and Google Wallets, Open source standard wallet specification
- Different types of wallets but the concept of OpenWallet is one type
- EU also Digital Identity Wallet related
- Concerned about undesirable feature selection
- Jim St Clair is an organizer
-
RWoT Hague
- Henk Participating
-
-
Recording
-
Reports
- keripy
- No new developments. Cleanup from pilot
- caxe
- keep
- PR arshdeep
- keriml
- cesrox
- keriox
- Progress for async multi-sig
- delegation
- keripy
-
Agenda
- Announcements:
- IETF BoF 114
- SAT (Secure Asset Transfer)
- https://datatracker.ietf.org/meeting/agenda
- https://www.ietf.org/how/meetings/114/
- IETF BoF 114
- plan for a bi-weekly meeting (KERI-ACDC for noobs) that does two things: work on documentation / terms / Q&A and at the same time education / AMA sessions.
- Suggest time slot in the KERI Slack Suggestion: Thursday 10 AM ET
- XBRL signing questions:
- How generate facts file
- Announcements:
-
Recording
-
Reports
- keripy
- Finished up pilot
- Rename master to name and development (shorten to dev)
- main stable release
- dev unstable but unit tests
- Rest Scripts and CLI script updates (push to main)
- will publish new docker container
- pilot
- caxe
- keep
- vLEI ecosystem fixes enhancements
- goal to extract vLEI stuff out
- keriml
- mijo is available work on CESR
- cesrox
- keriox
- HCF
- Exposed DART,
- Time escrow expiration of events
- Async multi-sig
- HCF
- keripy
-
Agenda
-
Announcements:
-
Partial queiries of KEL. Since sequence number query supported in KERIPY
-
Cleanup Items and Questions
- Agenda items Henk:
-
What is "Merging Habery PR"? Hab comes from 'Habitat'. It's a place where multi-sigs and AIDs are linked. Habery manages a collection of Habs. A Hab is a datastructure (a Python object) The only hit (2022) in a Google search pointing to a github site 'habery DOT github DOT io' is NOT related.
-
KERI / ACDC glossary alignment with ToIP concepts-terminology-wg Example ACDC glossary and eSSIF : concepts terminologie
-
Cleaning up KERI repos on WebOfTrust GitHub ?
- Phil add to keri.readme to table of active repos
-
- Agenda items Henk:
-
Ledger Registrar Backer vs KERI Tunnel
- Discovery (KERI Tunnel)
- Resolution Infrastructure
- Service endpoints
- Witnesses
- Secondary Root-of-Trust
- Replacing witnesswith with Ledger Registrar and Ledger Oracle
- Hybrid secondary Root-of-Trust
Not anchoring every event periodic anchor
Snapshot Checkpoint KELs
- Augmented Watcher Network
- detect duplicity
- Augmented Watcher Network
- Discovery (KERI Tunnel)
-
-
Recording
-
Reports
- keripy
- keep
- kiwi
- keriml
- keriox
- HCF keriox
- Dart client https://pub.dev/packages/keri
-
Agenda
-
Developments
- Cardano Proposal for Registrar Backers
- IETF BoF in July Week of 25th
- SAT meeting on 26th 3-5 EST
- SAT secure asset transfer working group
- keri
- https://www.ietf.org/mailman/listinfo/sat
- https://web3.mit.edu
- https://datatracker.ietf.org/meeting/114/agenda
- XBRL Report Signing Pilot GLEIF annual report
- multiple signers
- partial facts signers
- multisig ACDCs authorizing signers
- cloud agent Keep demo'd
-
Issues
- Is NTRU algo worth looking at in context of "KERI meets embedded systems"?
- https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/grobschadl-lighteight-implmentation-NTRUE.pdf
- Looks like NTRUSign is broken.
- NTRUEncrypt is usable.
- pqNTRUSign uses large signature sizes so is not immediately suitable for IOT
- Too Much Crypto paper https://eprint.iacr.org/archive/2019/1492/1577734684.pdf
- pull request from Henk #19
- Cardano Backer Registrar
- metadata on cardano
- Is NTRU algo worth looking at in context of "KERI meets embedded systems"?
-
-
Recording https://drive.google.com/file/d/16Lz1Amvlio4yfbkqtSVmgZGiomAy5miX/view?usp=sharing
-
Reports
-
keripy
- Mad dash pilot vLEI ecosystem
- tests scripts for sample vLEI ecosystem
- escrows fix for delegation approval IXN
- fix for escrow of messages credential issuance
-
Keep
- Major improvements
- multiple builds
-
Keriml
- Miho PR
-
CESROX
- Anyone else interested in helping on CesrOX
- Apache2
-
KeriOx
- HCF restructuring
- Windows DLL and Unix
- Dart
- HCF restructuring
-
CAXE
- XBRL with ACDC
- Two commands
- extract XBRL facts from XBRL report
- ACDC data attestation to facts
- verification server
- ixbrl veiwer Workiva
- Arelle Plugin (ARELLE = python xbrl framework https://arelle.org/arelle/)
- extract XBRL facts from XBRL report
-
CESR4j
- scaffold for Bazel replaces Maven Apache2
-
-
Agenda
- Proposal to goto git flow like policy for KERIpy
- Two branches
- main
- stable code
- regular or upon decision by community merge dev into main
- releases PyPi off from main
- unit tests
- github actions to do releases
- docker containers
- dev
- active development
- feature branches of dev
- main
- Two branches
- How to engage in the community
-
Tests where API is stable
-
open issues to ask questions
-
learn by doing
- unit tests
- test an api and then contribute the test
- once you fully understand how to use an API because to tested it then suggest an improvement via a pull request.
-
take notes of your journey in an issue
-
Keep tests Opportunities
-
ReST framework Wrapper
- PostMan
- Paw
- Already Swagger OpenAPI
- docker contrainer with ReST API port
-
Docker Containers
-
Test is best documentation
- But documenting code with comments is always welcome
-
- Proposal to goto git flow like policy for KERIpy
-
Recording
-
Reports
-
Keripy
- promiscuous percolated discovery through OOBIs using exn messages
- lock command for secure key store to be fixed in new push move to keep
- Ruth open issue
-
Keep
- new lock/unlock
- GLEIF vLEI ecosystem use case dominant
- eventually pull out more generic capability
- Support for one-way OOBI exchanges
- Packaging
- API additions for notifications
-
Keriml
-
KeriOX
- KERIOX repo: https://github.com/THCLab/keriox
- Nodejs and Dart clients: https://github.com/THCLab/keri-bindings/tree/master/bindings
- Docker imgs: https://hub.docker.com/r/humancolossus/keriox-witness and https://hub.docker.com/r/humancolossus/keriox-watcher
- demo use case using all the infrastructure https://github.com/THCLab/dkms-demo
-
CAXE
- https://github.com/WebOfTrust/caxe
- XBRL with ACDC
-
-
Agenda
- Update on DIF: IP issue resolved
- IETF-OOBI Draft
- We currently issue as a controller the
/end/role/add
OOBI and send it to Watcher. AFAIK there's no any real usage of this OOBI (yet?) from the Watcher perspective. Shall it be understood as an introduction to Watcher AUTH mechanism? In essence this OOBI becomes an introduction OOBI from the contorller perspective to Watcher. Watchers don't accept any request, but only those that are AUTHenticated first. Thanks to that Watchers support only these controllers that "registered" themselves. (added by Michal) - Escrow Maintenance Rules
- When adding key events to various types of escrow's, how to ensure given escrow will not be fulfilled with some random events? Currently any type of key event that has proper semantics and where
d
field equals todigest(event)
may be escrowed and stay there forever (because for example the signature is missing orsn
doesn't match ). Possible solutions: - escrows have some kind of retention policy
- events in escrow have exp time
- escrows have limited capacity
- When adding key events to various types of escrow's, how to ensure given escrow will not be fulfilled with some random events? Currently any type of key event that has proper semantics and where
-
Recording
-
Reports
-
Keripy
- Python 3.10.4 support
- Packaging
-
Keriml
-
Keep
- Make files to build for each Role type of users in vLEI ecosystem
- Github actions producing .dmgs .dep
- UX/UI development
-
KeriOX
- EUPL licence next week
- NodeJS and Dart
- Async MultiSync
-
Java
-
-
Agenda
-
Kent Bull couldn't get the KeriPy demo running
-
KeriPY build issues
- refresh virtual environment to be python3.10.4 and install dependencies
- pull latest master and keep
-
RoadMap
- Hierachical Recovery Nested Delegations
- CESR versions of the KERI Messages
- Watchers
-
Ledger Registrars
- WebOfTrust/keripy#90
- Cardano Backer
-
-
Recording https://drive.google.com/file/d/147yc11kAMB-yV58zdZFmdIQLs71PKf9r/view?usp=sharing
-
Reports
- Keripy
- Keriml
- Keep
- KeriOX
- Java
-
Items
- Henk: IIW recordings available?
- IIW Report
-
Phil Feariheller Side Conversations so valuable
-
Ledgers vs. KERI If you have a reason to use a ledger besides identifiers then you could use your ledger as a backer.
-
Witnesses and Watchers discussed
-
DID:ORB ledger agnostic KERI alternative?; it's Sidetree based. A sort of KERI light? KERI is more compact. Sam suggest using KERI as a bases for ORB.
-
The demo of Philip and Kevin was very well attended
-
KERI for Muggles https://docs.google.com/presentation/d/1mO1EZa9BcjAjWEzw7DWi124uMfyNyDeM3HuajsGNoTo/edit#slide=id.ga411be7e84_0_0
-
GLEIF presence was very good as a demonstration of the maturity of KERI.
-
KERI DID Tunnel How to Build a Tunnel to KERI Island
-
VC Credential Formats
-
Kevin GRiffith first one in person
- Demo of Keep Async Multisig.
- Building of Reputation System using ACDC
- Demo KERI Tunnel
- Phil Session on KERI On Thursday
-
Janet Gonzalez
- Keep UX session
- Wow! Use Cases for KERI
- Timothy Ruff on Adoption "First usable credential anyone will have is a organization role creditial"
- KYC is more than just SSI
-
Kent Bull
- Fun to see the level of interest in KERI and SSI
- TRaining courses
- Still early in the industry making a decision vs waiting for standard. Premature optimization.
- CESR session
-
Randy Warshaw GLEIF making an early decision and going for it. GLEIF sessions use sessions
- Stephan Wolff no technical all use cases
- Huge movement of people connection into KERI
- UI Walkthorugh
- ACDC sessions
- Great to meet people been zooming with for so long
-
Alan Davies
- Credential Master - Sales Force
- First meeting
- VCs for education ACDC introduction
- Timothy's presentation: https://youtu.be/kLSLA8_VDFw -
-
DidComm KERI Tunnel
-
Syllabus for KERI
- Clone KERI experts via training
-
Separate Zoom Chat converstion NOT!
-
-
Recording https://drive.google.com/file/d/13vqXoG7QvGeAe96tj35YZaT_V7PSgs83/view?usp=sharing
-
Reports
-
Keripy Command LIne for Multisit API for viewing escrow state API for keystate. Keying repo swift interaction with keychain with local authentication python wrapper ctypes
-
Keriml Keep repackage Electron app to invoke python backend IIW demos on UX/UI
-
KeriOX development is happening on private repo EUPL private HCF
-
Java
-
-
Items
-
OOBI initiated discovery for Witness. OOBI for SSE service endpoint published in .well-known of witness controller Domain Name Leveraging web search for discovery of OOBI HTML5 SSE replacement long polling comet push to clients polling OOBI for SSE service endpoint published in .well-known of witness controller Domain Name Leveraging web search for discovery of OOBI KeyStateNotice SSE endpoint that pushed latest keystate notice reuse sequence number from keystate for SSE sequence number oobi/ksn/ WebOfTrust/keripy#110
-
WebAuth uses of KERI SKWA
-
Signature Threshold vs. Multi-Sig (software threhold)
-
BLS signatures BBS+ signatures (collective signature)
-
-
Recording https://drive.google.com/file/d/13T8QZQ0MCdRCscI0wGkbKoB3XSsXMplj/view?usp=sharing
- Recording Feb 22 also used for March 8, March 8 not available?
-
Reports from Implementors
- Keriox
- OOBI problems
- Tests for Partial Rotation
- Keripy
- Finshised Habery changes
- Command Changes synchronized with ReST API
- New APIs to support Keep (ReST)
- Metadata for contacts in addition to AID
- Signed metadata BADA
- UI support APIs for workflows
- Metadata for contacts in addition to AID
- Finshised Habery changes
- Keriml
- No updates
- Keep Kimi Kiwi
- Screens
- Documentation Efforts
- MOOC
- Keriox
-
Items
-
ACDC Spec Draft
-
Educational resources (added by Henk)
- Vid snippets & Subtitle automation
- Commit HackMD to Github every month
- Suggest Authentication for Moodle (KERI) MOOC-trials (added by Henk) https://moodle.org/plugins/browse.php?list=category&id=21 Are we able to eat our own dog food?
-
Discuss gossip dissemination protocol: Disseminatin information: Actors need something to communicate Controller resposible to disseminate to Witnesses. Witnesses gossip through gossip Watchers (Judges, Jurors) Percolation JIT NTK approach
- types of discovery from Witness or Watcher (any host with KEL Database)
- Known Specific Event Query
- Unknown but Latest Event Query
- Waiting for anticipated event (such as delegation anchor, any multisig)
- push subscribe to wait for anticipated event
- HTTP SSE
- UDP Gossip pub/sub
- types of discovery from Witness or Watcher (any host with KEL Database)
-
@startuml
autonumber
actor "DID Controller" as DID
entity "Service Provider" as Service
database "Service DB" as DB
control OOBI as OOBI
DID -> Service : Open service
note left
DID controller can verify the service provider
following same flow of DID Auth (mutal authentication)
end note
Service -> DID : Ask for DID
DID -> Service : Provide DID
Service -> DB : Stores DID and generate nounce
Service -> DID : Generate challange for given DID
note right
Challenge include a nounce generated
for that specific DID
end note
DID -> Service : Respond to the challange
note left
The challenge can be scane via QR, click the link
or any other transport.
end note
note right
Respond to the challange includes:
- OOBI
- Signed challange with private key of the DID controller
end note
Service -> OOBI : Retrive KEL of given DID
Service -> Service : verify challange
Service -> DID : Issue session token
@enduml
-
Recording https://drive.google.com/file/d/13IjKZpM_0WKVmhgIn0AHW16RxnwXvE5U/view?usp=sharing
-
Reports from Implementors
-
keripy Habery Hab architecture to support multiple AIDs per set of resources Data OOBIs Doobie. mime schema+json for JSON Schem vlei serves up json schema
-
keriml pronunced "Caramel" KIMI Keri Interactive Mobile Interface
-
keriox
- KEL changes new partial rotation field name alignment
- Ready to do interoperablity tests.
- Keriox on Android device
- Flutter (Google cross platform) Dart
-
-
Items
- Interoperbility testing
- Remote HCF into IIW interop demo
- OOBI and Doobie
- IETF spec for OOBI discovery (todo)
- OOBI Out of band Infrastructure: Internet is out-of-band infrastructure WRT KERI.
- Leverge internet web discovery mechanisms
- KERI always verifies so security of internet is not a dependency.
- OOBI infrastructure provides OOBI Introductions
- How OOBIs work
- Discover service endpoints that provide data in support of verifying an AID
- ReST endpoints
- IETF spec for OOBI discovery (todo)
- Interoperbility testing
-
Recording https://drive.google.com/file/d/11lsFNbUh6MOfGkuaWShEcWttRdeudIRn/view?usp=sharing
-
Reports from Implementors:
-
keriox apache2.0 DIF EUPL OOBI implementation - ACDC OCA OOBI Dart - Flutter for mobile
-
keripy Delegation and Multisig on Cmd Line with New Habery construct (multi-hab per shared resource set) Multi-sig delegation Partial Rotation support
-
keri-swift mit license forked to apache2 under web-of-trust for ordered serialization of maps inception event milo provenant
-
keep Being built to be a generic tool from UX perspective Also task based workflows with workflow specific terminology
-
-
Items
- Interopathon before IIW in April for KeriOX and KeriPY interoperability
- Keripy generates json versions of kel and vlei with schema to send to Keriox team
- did:auth keri:auth
- OOBI blog post
- Partial rotation support
- Interopathon before IIW in April for KeriOX and KeriPY interoperability
-
Recording https://drive.google.com/file/d/11lsFNbUh6MOfGkuaWShEcWttRdeudIRn/view?usp=sharing
-
Reports from Implementors:
-
keriox
- refactoring towards event driven architecture. Asynchronous event updates via escrows
- OOBI
-
keripy
- CLI now supports new Habery architecture.
- SWagger UI operational for ReST API
- Vacuuous bootstrap
- Current work to update delegation.
-
keri-swift
- Serder and Saidify for the Matter class and subclasses
- Default Swift JSON encoder does not preserve property creation order.
- Message Types #110
-
IETF Standards
- New publication of KERI IETF did:keri specification
- New publication of KERI PTEL
- IPEX Issuance and Presentation exchange protocol ToDo
- KERI ToDO
- Hidden Attribute Credentials (ACDC)
- XORA for one time use credentials
- https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/XORA.md
-
-
Items
-
Documentation (Henk) -> sorry, not able to able to attend today, best regards, Henk
-
Walkthrough of OpenAPI and Sphinx documentation support
-
Fundamental security difference between PKI and non PKI trust bases
- EU Wallet initiative
-
-
Recording https://drive.google.com/file/d/11TVWQAVIMqaWyY3NODJP-t7bXJ6D62Bx/view?usp=sharing
-
Reports from Implementors:
- keriox
- No new features since last time.
- Refactoring
- keripy
- Habery changes propogated through command line utils, and agent
- Changed archtecture, split shared resources from AID specific code
- Support for multiple AIDs per instance of KERIpy
- Habery changes propogated through command line utils, and agent
- keri-swift
- pushed repo
- Cross platform for iOS first eventually androic
- LLVM compiler
- IETF Standards
- CESR Proof Sigantures posted
- ACDC spec moving IETF pipeline ToIP
- PTEL spec published
- IETF did:keri spec to be published
- keriox
-
New Getting Started with keripy
- Encrypted keystore
- SwaggerUI
- OOBIs
- 2-Factor Auth with Challenge/Response
-
How do you see DEL's (duplicitous event logs)?
- How they're created/maintained?
- Basic building blocks/what kind of messages it contains?
- Duplicity notice message
- Basic logic for detecting duplicity
- monotonic logic for first seen accepted event. Once seen, always seen, never unseen. No revision possible. Detection logic upon receipt of two versions of an event at the same sn for a given AID = duplicity. Live vs Dead duplicity. Dead means one version already accepted to other is duplicitous version. Live when two version but neither has yet been accepted because not fully witnessed. Hold in escrow until one or neither is accepted. If neither then hold in escrow until a subsequent rotation designates which of the two is the valid one and so one.
- Monotonic logic protects against continuous revision eclipse attack vulnerability such as is the case for PoW ledgers.
-
Henk: Education - first draft of the KERI MOOC now backupped on github and logged-in users can edit the hackmd file.
What do you think is a good way to develop KERI knowledge, provoke adoption and develop more programming capacity? -
A rubric-based eval of did:keri - Daniel Hardman: go to https://w3c.github.io/did-rubric/ and answer all the questions about did:keri.
Decision made Feb 8: we wait until the IETF draft for DID:KERI is finalized. Henk could contribute in draft and then propose his edits to team first. -
Terms and understanding 'SAD' and 'SAID', for Europeans the difference in pronunciation of SAD and SAID is hard to grasp and reproduce. The terms are closely related so we are not very alarmed that people confuse the terms.
-
Recording: https://drive.google.com/file/d/1136sR2QXKF7tCIm3ieXLlfC1sDqyeOtT/view?usp=sharing
-
Reports from Implementers:
- KERIOX
- Digest field SAID
- escrow for witness receipts
- KERIPY
- Conversion to Habery (Habitat Factory) allows multiple Habs (Habitats) per shared resources
- OpenAPI (Swagger) for ReST endpoints refactor to be more ReSTful
- Sphinx based documentation for KERIpy on ReadTheDocs and CodeCoverage unit tests
- Working on command line changes for Habery vaccuous mode
- Passcode encrypted key store support in command line
- KIWI-KEEP UX UI Workflows plugin Task support for custom workflows
- Zipped Eletron Distribution with Mithril and Material.org UX bare
- KEEP has style guide
- Could be adapted to Rust Backend
- KERIOX
-
Witness dissemination protocol (how Witnesses promulgate receipts to Validator network) // added by Michal
- Validator requests key state from its Watchers
- Watchers request key state from other trusted watchers
- Watchers then request key state from published witnesses (after OOBI bootstrap)
- Witnesses may support push interface such as SSE so that Watchers can subscribe to witness updates of keystate
- CRitical role of watcher is monotonic view of Key state. First Seen Policy. First seen always seen never unseen.
- Enables duplicity detection
- Enables redundancy high availability
- Reconcilable duplicity
- Juror and Judge Deciders
- Juror difference between watcher is that Juror reports duplicity whereas watcher just drops
-
OOBI
-
Terms and understanding - Henk 2. 'Backer' and 'Witness', are these a 100% synonym? And if so: why not use 'backer' and keep repeating now and again that it's about a synomym. If not: what's the exact difference?
-
Roadmap:
-
Recording
-
Roadmap
- short term long term
- CESR version of KERI events
- UDP version of KERI (2nd Q)
- Gossip Protocol for KERI Receipt, KeyState, and OOBI dissemination (2nd Q)
- Recovery from delegated ID prerotated key compromise
- Presentation and Issuance exchange protocols add Ricardaian Contracts in the
r
section - OOBI discovery and validation (Watchers)
- Registrar Backer support
- new config trait
- new seal type
- Refreshing Doc strings
- Sphinx Support for doc strings
- Swagger API
- Test Coverage
- Watcher Network
- KERI and DID-Comm and IETF
- KERI and peer did
- SWift KERI Library for iOS and Android (LLVM)
-
Reports from Implementers:
- keripy
- SADification and SAIDification of attachments
- First implementation of CESR Proof Signatures, credential parsing moved to Parser
- Habery with explict multi-Habitat support (multiple prefix IDs per database) - related issue
- Keep Repo Mithril and Material UX (https://github.com/WebOfTrust/keep)
- keriox
- query mode done
- WIP:
d
in messages (issue 110)- Goldilocks crypto agility, reduce complexity
- BowTie model for reasonsing about crypto committments
- WIP: working on escrows
- keripy
-
IETF Internet Draft CESR-Proof
- practical applications of CESR-Proofs
- https://github.com/WebOfTrust/ietf-cesr-proof
-
Discuss a URN namespace spec for KERI:
- it's a good idea to invent a URN specific for KERI.
- Write a spec for it and register with IANA
- urn:NID:NSS/path?query#fragment
- Examples
- urn:aid:alblseejlske/path?query#fragment
- urn:keri:slgheilshe/path?query#fragment
-
Henk: first draft of the KERI MOOC
-
OOBI
-
SKWA (Simple KERI for Web Auth)
-
Witness dissemination protocol (how Witnesses promulgate receipts to Validator network) // added by Michal
-
Business
- Meeting cancelled on Dec 28. Next meeting Jan 11th
-
Reports from Implementers
- keripy
- CESR codes for variable length material. core.coring.Matter object class now supports variable length codes.
- encrypted content
- legacy suites
- pathing
- keriox
- Query messages development
- Reply messages
- KSN message
- TSG
- keripy
-
Discuss
did:keri
further usage (see Slack #general channel)- registrant. Need to update registered version to reference WoT repo not DIF repo
- did:keri is a very loose wrapper around the KERI prefix, it's there for adoption
- Maybe it's a good idea to invent a URN specific for KERI
-
KERI incubation within IETF: work item under some WG / WG on its own...?
- KERI presented to Blockchain WG; in the future perhaps hosted within this WG
- We have to have a draft spec first. Then you form a (work item within a) working group to discuss the spec.
-
Michal question: A lightweight protocol for streaming authentic data in environments with unstable internet connection. Would CESR make sense?
- Yes, we are able to create a UDP (asynchronous communication) version. It's easier to make UDP reliable than to make TCP scalable.
-
GLEIF MultiSig demo KLI (command line version)
- Two ways of reaching the threshold of a multisig by participant in a rotation event, is by sharing all public addresses among the group of possible signers. If you don't want to disclose pubic keys to other participants, then you could use digests of the public keys in a partial rotation event, where we only need the participating signers to reach the threshold; this subgroups needs to disclose their public keys.
-
IETF CESR variable length codes
- Pathing for CESR Proofs Attachments SADs
-
Partial Rotation
- Recording https://drive.google.com/drive/u/0/folders/1af1qa4cVw6vbuBGvqwa1sz9B2sk70ao-
- Query Msg Discussion
- New issues
- IETF CESR Draft https://datatracker.ietf.org/doc/draft-ssmith-cesr/
- Distributed multi-sig protocol
-
KERI
-
- rpy message
- d field for said
- exp message
- d field for said
- qry message
- d field for said
- All keri key event messages icp rot dip drt ixn to add d field for said of message. ( WebOfTrust/keripy#110 )
- p field will be said of prior message
- Query Message keriox (michal pietrus)
- how handling query and reply
- New partial rotation WebOfTrust/keripy#118
- Where we chat in realtime
- Issue update readme with status of features
- Call-to-order
- Review Licensing Terms and Participation
- progress updates from
- keripy team
- ksn query get the current state existing key for identifier query for KEL to update
- escrow query to get BADA (Best Available Data Logic)
- HCF team
- Leverage time stamping authority point in time that you trust
- DIF update nothing new still trying to figure out what to do working group
- Sam invite keriox and kerijs to attend this working group
- keripy team
- Witness network
- clarification of receipts
- count code #B indexed witness signatures is more compact than #C which is couplets
- #B is useful if many witnesses
- Witnesses as highly disposable entities with NonTrans AIDs
- Listen on two ports TCP and HTTP
- If TCP then assumes direct mode
- IF HTTP then assumes indirect mode
- Witness Hosts also provide a MailBox service with HTTP SSE (server sent events)
- Controller of witnesses subscribes to SSE stream on Mailbox to read responses to its witness queries
- Kubernetes pod
- HTTP API is wrapper of keripy CESR message and unwraps to send to Parser: HTTP requests to Parsable CESR messages
- Listen on two ports TCP and HTTP
- delegation issues with witnesses WebOfTrust/keripy#100
- clarification of receipts
- New change to ledger registrars as backers
- WebOfTrust/keripy#90
- registrar backer allows some to use a ledger registrar backer and ledger oracle instead of a witness pool as the secondary root of trust. Registrar may also provide an oracle or may have multiple oracles not specified.
- Witness KAACE algorithm provides a distributed consensus agreement.
- TimeStamp of watchers is authoritative for validator Judge role
- Call-to-order
- Review Licensing Terms and Participation
- Apache2, Inbound=Outbound, Developer Certicate of Origin, IETF Submission
- Discuss Progress on IETF draft submissions and IETF process
- keripy update
- Other agenda items
- How to not fork KERI
- some would like to keep in DIF
- Options
- DIF not able to do KERI Spec without KERIpy group
- Split KERI in pieces and have pieces in DIF
- Political issues especially with respect to statements about IP.