did-resolution icon indicating copy to clipboard operation
did-resolution copied to clipboard

Add DID Resolution architecture security and privacy considerations

Open wip-abramson opened this issue 9 months ago • 6 comments

Currently security and privacy considerations section does not refer to the architecture of DID resolvers.

The architecture section - https://w3c.github.io/did-resolution/#architectures - includes some security considerations. We should add some specific security considerations to the section and reference the architecture section.

Also, might we want to add some privacy considerations aswell. Especially when accessing a remote resolver outside of your control.

wip-abramson avatar Mar 13 '25 16:03 wip-abramson

This was discussed during the #did meeting on 24 April 2025.

View the transcript

Add DID Resolution architecture security and privacy considerations #133

<ottomorac> w3c/did-resolution#133

Wip: not much more to add to it... main thing is what considerations do implementers of the resolvers need to have in mind

markus_sabadello: In the current section about architectures there are some short comments about some of these considerations
… For example there is a sentence that says when you use a remote resolver service you could use a VPN. Or some form of authentication. Or query multiple resolvers to check results
… These ideas probably need to be expanded and elaborated on so they can be added into the security considerations section

<JoeAndrieu9> RFC 3552 Guidelines for Writing RFC Text on Security Considerations

JoeAndrieu: I think we should improve our guidance for what should go in security and privacy consideration section
… In our work with Simone we have incorparated RFC 3552. I think we should point DID method implementers to this RFC or additional guidance for writing these sections


w3cbot avatar Apr 24 '25 16:04 w3cbot

This was discussed during the #did meeting on 24 July 2025.

View the transcript

DID Resolution Issue Processing

Add DID Resolution architecture security and privacy considerations #133


w3cbot avatar Jul 24 '25 16:07 w3cbot

This was discussed during the #did meeting on 24 July 2025.

View the transcript

Add DID Resolution architecture security and privacy considerations #133

w3c/did-resolution#133

What considerations do implementers of the resolvers need to have in mind. Joe had referenced &ldquo;RFC 3552 Guidelines for Writing RFC Text on Security Considerations&rdquo; indicating that in the work with Simone this was incorporated.

JoeAndrieu: Simones suggestion is that security consideration sections be done as threat model and the walk through the various types of threats....

JoeAndrieu: I am still working with Simone, so we should probably revisit later

ivan: would that kind of requirement be there for already existing recommmendations that get republished. Do we need it for DID spec as well.

Ivan: Is this something that we should do for the did spec as well?

JoeAndrieu: I think it is desirable, but perhaps not required.... The goal we have is to have a threat model framework that any spec in the W3C VC spec can fit into...

Ivan: I have some doubts about it.....

markus_sabadello: I've been thinking about security consideration. I agree we need more work. The threat modeling sounds useful.
… One thing is the specification has a section about resolver architectures. Which introduces some security related topics.
… How to read from a VDR, how to talk with a resolver, and proofs and meta data.
… So how does that relate?

JoenAdrieu: the diagrams are the right place to start the work....

S /JoenAdrieu/JoeAndrieu/

manu: Just to react to did-core consideration request. I'm not sure what the ask would be.
… I don't think it's quite there yet. It's a lot of work. I'd rather not redo that section until we have a good guidance on what to do.


w3cbot avatar Jul 24 '25 16:07 w3cbot

This was discussed during the #did meeting on 28 August 2025.

View the transcript

w3c/did-resolution#133

<dmitriz> though I think this is ok because our spec currently is very light on Controller semantics

Wip: IIUC, this issue is about providing some architecture diagram from which we can derive Security and Privacy considerations.

JoeAndrieu: that's a good description


w3cbot avatar Aug 28 '25 15:08 w3cbot

The work is to review the https://w3c.github.io/did-resolution/#architectures and add any identified security and privacy considerations to the relevant section referencing the architecture section

wip-abramson avatar Nov 11 '25 06:11 wip-abramson

This was discussed during the #did meeting on 11 November 2025.

View the transcript

w3c/did-resolution#133

wip: Threat modeling

wip: This should be addressed when we have threat modeling

joeandrieu: it's going to block us from going into security review

JoeAndrieu: The bottleneck has been figuring out what security group wants out of a threat model. We are very close to being able to share something -- once that's done, in about 3 weeks, we have three diagrams that Markus has put together, we have local/remote proxy archiectures -- we might need to do diagrams with focused threats -- threats are relatively straightforwad to do once we have diagrams.

JoeAndrieu: There are four different types of threats we want to speak to, threats in threat model, in VCs we knew tampering was a threat -- that's why we have proofs. Next is implementation threats, key compromise, issuing VCs? Have to manage keys -- but implementers have to deal with it. External threats, which we don't know a away around, but people should be aware of.

JoeAndrieu: Dependency threats -- eg. DID Resolution relies on TCP/IP and HTTP -- specify some threats on TCP/IP dependencies -- and DNS -- spoofing DNS, and get false DID Document, that's a threat -- networking layer, router might decide Joe is a bad person and is sending me over there. That's part of wy it's taken longer, but getting close to something usable by the group.

wip: we have asked Simone for a security review.

JoeAndrieu: This "needs work" -- we are going to finish the threat modelling guide -- we'll need to facilitate some conversations, special topic calls, maybe this is "to be discussed" in context of threat modelling guide.

wip: we need to be in CR before April
… Maybe we should break to talk about that

manu: I'm really concerned about this timeline
… we wanted to get through our issues and be ready for PR
… And this looks like it might take another 3 months

wip: Maybe its worth talking with Simone to understand.

JoeAndrieu: I think it's negotiating with SING -- in order to go to CR, do we need threat model today -- conversation that staff needs to think about -- is it worth extending now because we need threat model, we are making good progress, maybe we put options to staff.

manu: I'm really concerned about what this does for our timeline.

JoeAndrieu: We should discuss this with Staff and have them provide guidance on what we do next.

wip: ok. we have a section that is security considerations
… the work is to review the DID architecture section and update the Privacy Consideration sections

JoeAndrieu: I do agree with where we should put these edits -- this is not put privacy/security issues in architecture section.

JoeAndrieu: Do we mention threat model in this issue?

Wip: No, we don't.

JoeAndrieu: Ok, let's keep threat model in another issue. Our intention is to complete threat model while we're in CR, not before.

ack


w3cbot avatar Nov 11 '25 09:11 w3cbot