<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-carter-high-assurance-dids-with-dns-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="hiadid">High Assurance DIDs with DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-carter-high-assurance-dids-with-dns-03"/>
    <author initials="J." surname="Carter" fullname="Jesse Carter">
      <organization>CIRA</organization>
      <address>
        <email>jesse.carter@cira.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA</organization>
      <address>
        <email>jacques.latour@cira.ca</email>
      </address>
    </author>
    <author initials="M." surname="Glaude" fullname="Mathieu Glaude">
      <organization>Northern Block</organization>
      <address>
        <email>mathieu@northernblock.ca</email>
      </address>
    </author>
    <author initials="T." surname="Bouma" fullname="Tim Bouma">
      <organization>Digital Governance Council</organization>
      <address>
        <email>tim.bouma@dgc-cgn.org</email>
      </address>
    </author>
    <date year="2024" month="April" day="09"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 87?>

<t>This document outlines a method for improving the authenticity, discoverability, and portability of Decentralized Identifiers (DIDs) by utilizing the current DNS infrastructure and its technologies. This method offers a straightforward procedure for a verifier to cryptographically cross-validate a DID using data stored in the DNS, separate from the DID document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ciralabs.github.io/high-assurance-dids-with-dns/draft-carter-high-assurance-dids-with-dns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-carter-high-assurance-dids-with-dns/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CIRALabs/high-assurance-dids-with-dns"/>.</t>
    </note>
  </front>
  <middle>
    <?line 91?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the ever-evolving digital world, the need for secure and verifiable identities is paramount. DIDs have emerged as a promising solution, providing a globally unique, persistent identifier that does not require a centralized registration authority. However, like any technology, DIDs face challenges in terms of authenticity, discoverability, and portability.</t>
      <t>This is where the Domain Name System (DNS), a well-established and globally distributed internet directory service, comes into play. By leveraging the existing DNS infrastructure, we can enhance the verification process of DIDs. Specifically, we can use Transport Layer Security Authentication (TLSA) and Uniform Resource Identifier (URI) DNS records to add an additional layer of verification and authenticity to DIDs.</t>
      <t>TLSA records in DNS allow us to associate a certificate or public key with the domain name where the record is found, thus providing a form of certificate pinning. URI records, on the other hand, provide a way to publish mappings from hostnames to URIs, such as DIDs.</t>
      <t>By storing crucial information about a DID, such as the DID itself and its Public Key Infrastructure (PKI) in these DNS records, we can provide a verifier with a simple yet effective method to cross-validate and authenticate a DID. This not only ensures the authenticity of the DID document but also allows for interaction with material signed by the DID without access to the DID document itself.</t>
      <t>In essence, the integration of DIDs with DNS, specifically through the use of TLSA and URI records, provides a robust solution to some of the challenges faced by DIDs, paving the way for a more secure and trustworthy digital identity landscape.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="securing-a-did-using-the-dns">
      <name>Securing a DID using the DNS</name>
      <t>Much like presenting two pieces of ID to provide a higher level of assurance when proving your identity or age, replicating important information about a DID into a different domain (like the DNS) enables a similar form of cross validation. This enhances the initial trust establishment between the user and the DID document, as the key information can be compared and verified across two segregated sets of infrastructure. This also acts as a form of ownership verification in a similar way to 2FA, as the implementer must have control over both the DNS zone and the DID document to properly duplicate the relevant information.</t>
      <artwork><![CDATA[
+----------------+     +----------------+
|                |     |                |
|   DNS Server   |     |   Web Server   |
|                |     |                |
|   +-------+    |     |   +-------+    |
|   |  DID  |<---+-----+-->|  DID  |    |
|   +-------+    |     |   +-------+    |
|   +-------+    |     |   +-------+    |
|   |  PKI  |<---+-----+-->|  PKI  |    |
|   +-------+    |     |   +-------+    |
|                |     |                |
+----------------+     +----------------+
]]></artwork>
      <t>The diagram above illustrates how a web server storing the DID document, and the DNS server storing the URI and TLSA records shares and links the key information about the DID across two independent sets of infrastructure.</t>
      <section anchor="specifically-for-didweb">
        <name>Specifically for did:web</name>
        <t>With did:web, there’s an inherent link between the DNS needed to resolve the associated DID document and the domain where the relevant supporting DNS records are located. This means that the domain specified by the did:web identifier (for example, did:web:<strong>example.ca</strong>) is also the location where you can find the supporting DNS records.</t>
        <section anchor="consideration-for-other-did-methods">
          <name>Consideration for other DID methods</name>
          <t>In the case of other DID methods, the association between a DID and a DNS domain is still possible although less inherent than with the aforementioned did:web. This association is currently out of scope at this time.</t>
        </section>
      </section>
      <section anchor="mapping-dids-to-domains-with-uri-records">
        <name>Mapping DIDs to Domains with URI records</name>
        <t>The association to a domain stemming only from the did is unidirectional. By leveraging URI records as outlined in <xref target="DID-in-the-DNS"/>, we can create a bidirectional relationship, allowing a domain to publish their associated DID in the DNS.</t>
        <t><strong><em>Ex: _did.example-issuer.ca IN URI 1 0 “did:web:XXXXXX”</em></strong></t>
        <t>This relationship enhances security, as an entity would require control over both the DID and the domain’s DNS server to create this bidirectional association, reducing the likelihood of malicious impersonation.</t>
        <section anchor="uri-record-scoping">
          <name>URI record scoping</name>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the URI RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
          </ul>
        </section>
        <section anchor="entity-handles">
          <name>Entity Handles</name>
          <t>An implementer may have multiple sub entities operating and issuing credentials on their behalf, like the different deparments in a university issuing diplomas or publishing research. For this reason, the introduction of an entity handle, represented as a subdomain in the resource record name, provides a simple way to facilitate the distinction of DIDs, their public keys, and credentials they issue in their relationship to another entity or root authority.</t>
          <t><strong><em>Ex: _did.diplomas.example-issuer.ca IN URI 1 0 “did:web:diplomas.XXXXXX”</em></strong></t>
          <t><strong><em>Ex: _did.certificates.example-issuer.ca IN URI 1 0 “did:web:certificates.XXXXXXX”</em></strong></t>
        </section>
      </section>
      <section anchor="pki-with-tlsa-records">
        <name>PKI with TLSA records</name>
        <t>The DID to DNS mapping illustrated in section 3.2 provides a way of expressing the association between a DID and a domain, but no way of verifying that relationship. By hosting the public keys of that DID in its associated domain’s zone, we can provide a cryptographic linkage to bolster this relationship while also providing access to the DID’s public keys outside of the infrastructure where the DID document itself resides, facilitating interoperability and increasing availability.</t>
        <t>TLSA records <xref target="RFC6698"/> provide a simple way of hosting cryptographic information in the DNS. Key material can be represented in TLSA records either hashed or unhashed depending on the requirements and use case of the implementer.</t>
        <section anchor="tlsa-record-scoping-selector-field">
          <name>TLSA Record Scoping, Selector Field</name>
          <t>When public keys related to DIDs are published in the DNS as TLSA records:</t>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the TLSA RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
            <li>
              <t>The Selector Field of the TLSA record must be set to 1, SubjectPublicKeyInfo: DER-encoded binary structure as defined in <xref target="RFC5280"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="instances-of-multiple-key-pairs">
          <name>Instances of Multiple Key Pairs</name>
          <t>Depending on the needs of the implementer, it is possible they may use multiple keypairs associated with a single DID to sign and issue credentials or enable other PKI related interactions. In this case, a TLSA record will be created per <xref target="verificationMethod"/> and then be bundled into the corresponding TLSA RRset. A resolver can then parse the returned records and match the key content to the verificationMethod they wish to interact with or verify.</t>
          <t><strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "4e18ac22c00fb9...b96270a7b4"</em></strong></t>
          <t><strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "5f29bd33d11gc1...b96270a7b5"</em></strong></t>
          <section anchor="security-consideration">
            <name>Security Consideration</name>
            <t>It is <bcp14>RECOMMENDED</bcp14> implementers limit the total number of TLSA records for a given domain to 255 to mitigate DoS style attacks, such as creating a problematic number of TLSA records to then be resolved and parsed by the verifier.</t>
            <t>If the total number of TLSA records returned to a verifier exceeds this threshold, it is <bcp14>RECOMMENDED</bcp14> they abort the verification process and deem the target DID insecure.</t>
          </section>
        </section>
        <section anchor="benefits-of-public-keys-in-the-dns">
          <name>Benefits of Public Keys in the DNS</name>
          <t>Hosting the public keys in TLSA records provides a stronger mechanism for the verifier to verify a did and its associated entity with, as they are able to perform a cryptographic challenge against the DID using the corresponding TLSA records, or against the domain using the corresponding <xref target="verificationMethod"/> in the DID document. The accessibility of the public keys is also beneficial, as the verifier does not need to resolve the DID document to accesss its associated key material, enhancing interoperability.</t>
        </section>
      </section>
    </section>
    <section anchor="role-of-dnssec-for-assurance-and-revocation">
      <name>Role of DNSSEC for Assurance and Revocation</name>
      <t>It is <bcp14>RECOMMENDED</bcp14> that all the participants in this digital identity ecosystem enable DNSSEC signing for the DNS instances they operate. See <xref target="RFC9364"/>.</t>
      <t>DNSSEC provides cryptographic assurance that the DNS records returned in response to a query are authentic and have not been tampered with. This assurance within the context of the <em>_did</em> URI and <em>_did</em> TLSA records provides another mechanism to ensure the integrity of the DID and its public keys outside of infrastructure it resides on directly from the domain of its owner.</t>
      <t>Within this use-case, DNSSEC also provides revocation checks for both DIDs and public keys. In particular, a DNS query for a specific <em>_did</em> URI record or <em>_did</em> TLSA record can return an NXDOMAIN <xref target="RFC8020"/> response if the DID or public key has been revoked. This approach can simplify the process of verifying the current validity of DIDs and public keys by reducing the need for complex revocation mechanisms or implementation specific technologies.</t>
    </section>
    <section anchor="digital-signature-and-proof-value-of-the-did-document">
      <name>Digital Signature and Proof Value of the DID Document</name>
      <t>Digital signatures ensure the integrity of the DID Document, and by extent the public keys, authentication protocols, and service endpoints necessary for initiating trustworthy interactions with the identified entity. The use of digital signatures in this context provides a robust mechanism for verifying that the DID Document has not been tampered with and indeed originates from the correct entity.</t>
      <t>In accordance with W3C specifications, we propose including a data integrity proof such as those outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>, with the mandatory inclusions of the "created" and "expires" fields. The inclusion of which acts as a lifespan for the document, similar to the TTL for a DNS record. Depending on the use case and security requirement, a longer or shorter expiry period would be used as necessary.</t>
      <artwork><![CDATA[
"proof": {
   "type": "DataIntegrityProof",
   "cryptosuite": "ecdsa-jfc-2019",
   "created": "2023-10-11T15:27:27Z",
   "expires": "2099-10-11T15:27:27Z",
   "proofPurpose": "assertionMethod",
   "verificationMethod": "did:web:trustregistry.ca#key-1",
}
]]></artwork>
      <t>The data integrity proof <bcp14>SHOULD</bcp14> be signed using a verificationMethod that has an associated TLSA record to allow for the verification of the data integrity proof using data contained outside of the DID document. This provides an added layer of authenticity, as the PKI information contained in the DID document would need to be supported across 2 different domains.</t>
      <section anchor="use-of-alternative-cryptosuites">
        <name>Use of Alternative Cryptosuites</name>
        <t>While <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/> are the cryptosuites we have chosen to highlight in this specification, it is important to note that this implementation for a high assurance did is cryptosuite agnostic. It is interoperable with any new and existing cryptosuites and associated key types as required by the implementers and verifiers.</t>
      </section>
    </section>
    <section anchor="verification-process">
      <name>Verification Process</name>
      <t>Using the new DNS records and proof object in the DID document, we enable a more secure and higher assurance verification process for the DID. It is important to note that while not strictly necessary, DNSSEC verification <bcp14>SHOULD</bcp14> be performed each time a DNS record is resolved to ensure their authenticity.</t>
      <t>The process below outlines the general steps required to complete the higher assurance did verification process;</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Verification of the DID:</strong> The user verifies the DID is represented as a URI record in the associated domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>In the case of did:web, the domain and record name to be queried is indicated by the last segment of the did. In example, <strong>did:web:example.ca</strong> would translate to a URI record with the name <strong>_did.example.ca</strong>.</t>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the PKI:</strong> With the association between the DID and the domain verified, the user would then proceed to verify the key material between the DID and the domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>The user would query for a TLSA record. Depending on the type of TLSA record/s returned, the user would verify either the hash of the verificationMethod or verificationMethod itself matches what was returned by the TLSA record content.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Note: This may require some conversion, as TLSA records store key material as hex encoded DER format, and this representation is not supported by <xref target="verificationMethod"/>. However, there are many well supported cryptography libraries in a variety of languages that facilitate the conversion process.</t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the DID document's integrity:</strong> After verifying that the did's key material matches what is represented in the TLSA records of the associated domain, the user would then verify the "proof" object to ensure the integrity of the DID document.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>This can be accomplished by using either the <xref target="verificationMethod"/> directly from the did document, or using the key material stored in the TLSA record. Using the TLSA record would provide a higher level of assurance as this confirms the key material is being accurately represented across 2 different domains, both at the DID document level and the DNS level.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Note: Unlike with matching the verificationMethod and TLSA record in step 2, DER is a widely supported encoding format for key material enabling a verifier to directly use the TLSA record content to verify the signature without having to convert the key back to its representation in the verificationMethod.</t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
      </ol>
      <section anchor="verification-failure">
        <name>Verification Failure</name>
        <t>If at any given step verification fails, the DID document should be deemed INSECURE. Whether it is due to the DID and DNS being out of sync with recent updates, or the DID document or DNS zone themselves being compromised, a failed verification <bcp14>MAY</bcp14> indicate malicious activity. It is then up to the verifier to determine, according to their requirements and use case, the appropriate course of action regarding interactions with the target DID until successful verification is restored.</t>
      </section>
    </section>
    <section anchor="control-requirements">
      <name>Control Requirements</name>
      <t>This section defines a simple framework to define a set of technical controls that can be implemented and mapped into levels of assurance for did:web identifiers.
To assist in decision-making and implementation, The controls are ordered in increasing level of security assurance and are grouped into levels of assurance from <strong>LOW-</strong> to <strong>HIGH+</strong>
- <strong>Issuing Authority</strong> is the entity accountable for the did:web identifier.
- <strong>Issuing Service</strong> is the entity responsible for operating the did:web identifier infrastructure.
In many cases the <strong>Issuing Authority</strong> may delegate elements of providing a high assurance did:web identifier to an <strong>Issuing Service</strong> that may be a commercial provider.
In the simplest case, the <strong>Issuing Authority</strong> can be regarded as the same as the <strong>Issuing Service</strong>.
Note that Controls 9, 10, and 11 CANNOT BE DELEGATED to an <strong>Issuing Service</strong></t>
      <t>11 technical controls are defined. These controls would be implemented in order of precedence for an increasing level of security assurance. (e.g., Control No. N would need to be implemented before implementing Control No. N+1)</t>
      <table>
        <thead>
          <tr>
            <th align="left">Control No.</th>
            <th align="left">Control Name</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">DID Resource Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the resource that generates the DID document. (i.e., website)</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">DID Document Management</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have the ability to do CRUD operations on the DID document.</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">DID Document Data Integrity</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> ensure the data integrity of the DID document by cryptographic means, typically a digital signature or other means. The use of approved or established cryptographic algorithms is HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DID Document Key Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the keys required to sign the DID document.</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DID Document Key Generation</td>
            <td align="left">With proper delegation from the Issuing Authority, the DID Document signing key <bcp14>MAY</bcp14> be generated by the Issuing Service. Otherwise, the signing key must be generated by the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Domain Zone Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have control of the domain zone (or subdomain zone).If direct control of the domain is not feasible, the use of an accredited DNS provider is HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Domain Zone Mapping</td>
            <td align="left">There <bcp14>MUST</bcp14> be domain zone records that map the necessary URI, TLSA, CERT and/or TXT records to the specified did:web identifier.</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Domain Zone Signing</td>
            <td align="left">The domain zone records <bcp14>MUST</bcp14> be signed according to DNSSEC. (RRSIG)</td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">Domain Zone Signing Key Control</td>
            <td align="left">The Issuing Authority <bcp14>MUST</bcp14> have control over the domain zone keys used for signing and delegation. (KSK and ZSK)</td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Domain Zone Signing Key Generation</td>
            <td align="left">The signing keys <bcp14>MUST</bcp14> be generated under the control of the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">Hardware Security Module</td>
            <td align="left">A FIPS 140-2 compliant hardware security module must be under the control of the Issuing Authority.</td>
          </tr>
        </tbody>
      </table>
      <t>In addition to the technical controls specified in the table it is advisable to add in DANE (DNS-based Authentication of Named Entities) <xref target="RFC6698"/> to secure TLS communications. TLS uses certificates to bind keys to names, which are published by public "Certification Authorities" (CAs). It is important to realize that the public CA model is fundamentally vulnerable because it allows any CA to issue a certificate for any domain name. Thus, a compromised CA can issue a fake replacement certificate which could be used to subvert TLS-protected websites. DANE offers the option to use the DNSSEC infrastructure to store and sign keys and certificates that are used by a TLS-protected website. The keys are bound to names in the Domain Name System (DNS), instead of relying on arbitrary keys and names issued in a potentially compromised certificate.</t>
    </section>
    <section anchor="levels-of-assurance">
      <name>Levels of Assurance</name>
      <t>Many trust frameworks specify levels of assurance to assist in determining which controls must be implemented.</t>
      <t>The following table is not a definitive mapping to trust framework levels of assurance. It is intended to assist in determining mappings by grouping the controls within a range from <strong>LOW-</strong> to <strong>HIGH+</strong> relating to the appropriate risk level. Note that controls are additive in nature. (i.e.,, controls of the preceding level must be fulfilled).</t>
      <table>
        <thead>
          <tr>
            <th align="left">Level of Assurance</th>
            <th align="left">Controls</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>LOW-</strong></td>
            <td align="left">Control 1</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for low risk transactions where attribution to originator is desirable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>LOW</strong></td>
            <td align="left">Control 2</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for lower risk transactions where establishing the accountability of the originator is desirable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM</strong></td>
            <td align="left">Controls 3, 4 and 5</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for medium risk commercial transactions, such as correspondence, proposals, etc.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM+</strong></td>
            <td align="left">Controls 6 and 7</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for higher risk transactions, such as signing and verifying invoices, contracts, or official/legal documentation</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH</strong></td>
            <td align="left">Controls 8, 9 and 10</td>
            <td align="left">
              <bcp14>MUST</bcp14> be high risk transactions, such as government transactions for signing and verifying licenses, certifications or identification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH+</strong></td>
            <td align="left">Control 11</td>
            <td align="left">
              <bcp14>MUST</bcp14> be used for extremely high risk transactions where there may be systemic or national security implications</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
      <artwork><![CDATA[
+---------+------------+-------------------------------------------+
| RR Type | _NODE NAME | Reference                                 |
+---------+------------+-------------------------------------------+
| TLSA    | _did       | [draft-ietf-high-assurance-dids-with-dns] |
| URI     | _did       | [draft-mayrhofer-did-dns-01]              |
+---------+------------+------------------------------------------+.
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID-Specification-Registries" target="https://www.w3.org/TR/did-spec-registries/#did-methods">
          <front>
            <title>DID Specification Registries</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C-VC-Data-Model" target="https://www.w3.org/TR/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="alsoKnownAs" target="https://www.w3.org/TR/did-core/#also-known-as">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="services" target="https://www.w3.org/TR/did-core/#services">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LinkedDomains" target="https://identity.foundation/.well-known/resources/did-configuration/#linked-domain-service-endpoint">
          <front>
            <title>Well Known DID Configuration</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DID-in-the-DNS" target="https://datatracker.ietf.org/doc/html/draft-mayrhofer-did-dns-05#section-2">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="verificationMethod" target="https://www.w3.org/TR/did-core/#verification-methods">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="issuer" target="https://www.w3.org/TR/vc-data-model-2.0/#issuer">
          <front>
            <title>Verifiable Credentials Data Model v2.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofECDSA" target="https://www.w3.org/TR/vc-di-ecdsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofEdDSA" target="https://www.w3.org/TR/vc-di-eddsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Self-Sovereign-Identity">
          <front>
            <title>Self-Sovereign Identity</title>
            <author initials="D." surname="Reed" fullname="Drummond Reed">
              <organization/>
            </author>
            <author initials="A." surname="Preukschat" fullname="Alex Preukschat">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISBN" value="9781617296598"/>
        </reference>
      </references>
    </references>
    <?line 314?>

<section anchor="w3c-considerations">
      <name>W3C Considerations</name>
      <ol spacing="normal" type="1"><li>
          <t>We propose the inclusion of an optional data integrity proof for the DID document, as outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
