ucanto
ucanto copied to clipboard
Support for did:mailto
General idea is to include did:mailto -> did:key mapping inside a UCAN itself (either in fct or prf) so that received invocations may be verified.
In the initial version we'd want to embed delegation from trusted authority like service itself that authorizes did:key to represent specific did:mailto. In the future version we'd want to embed DKIM header into fct instead to remove need for trusted authority.
Just thinking out loud here
- If we want stateless UCAN verification, state must be captured inside a UCAN itself.
- We can capture
did:mailto -> did:keystate inside the UCAN to make it work. - State MUST be passed into principal parser to perform resolution (so current API needs to account for it).
- However some of this is entangled with side-loading of the UCANs which is right now domain of validator
- Permanent
did:other -> did:keyis no good as it can't be revoked- Instead we need that mapping to be a UCAN so it has expiry & can be revoked
- Checking for revocations is another thing that is part of validator and does not belong in principal domain, but we're tangling them now
- Perhaps we need whole another layer to do all of the resolution before creating non
did:keyprincipals.
- Perhaps we need whole another layer to do all of the resolution before creating non