<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-latour-dns-and-digital-trust-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="TODO - Abbreviation">Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries</title>
    <seriesInfo name="Internet-Draft" value="draft-latour-dns-and-digital-trust-01"/>
    <author initials="J." surname="Carter" fullname="Jesse Carter">
      <organization>CIRA</organization>
      <address>
        <email>jesse.carter@cira.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA</organization>
      <address>
        <email>jacques.latour@cira.ca</email>
      </address>
    </author>
    <author initials="M." surname="Glaude" fullname="Mathieu Glaude">
      <organization>NorthernBlock</organization>
      <address>
        <email>mathieu@northernblock.io</email>
      </address>
    </author>
    <date year="2023" month="October" day="10"/>
    <keyword>trust registry</keyword>
    <keyword>distributed ledger</keyword>
    <keyword>did</keyword>
    <keyword>verifiable credential</keyword>
    <keyword>dns</keyword>
    <abstract>
      <?line 88?>

<t>This memo describes an architecture for digital credential verification and validation using Decentralized Identifiers (DIDs), distributed ledgers, trust registries, and the DNS. This architecture provides a verifier with a simple process by which to cryptographically verify the credential they are being presented with, verify and resolve the issuer of that credential to a domain, and verify that issuer's membership in a trust registry.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CIRALabs.github.io/DNS-Based-VCs-and-Trust-Registries-ID/draft-DNS-Based-Digital-Verifiable-Credential-Verification-and-Trust-Registry-Architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-latour-dns-and-digital-trust/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CIRALabs/DNS-Based-VCs-and-Trust-Registries-ID"/>.</t>
    </note>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the increasing adoption and deployment of digital credentials around the world, as well as the numerous different standards and implementations surrounding them, there is a strong likelihood the digital credential ecosystem will become fragmented. There all already 150+ DID Methods listed in the <xref target="DID-Specification-Registries"/>, meaning that implementers of digital credentialing solutions would have to ensure they can support the resolution of the right DID Methods that are being used in their interactions. This will present a significant burden to implementers across different nations and organizations, creating large barriers to interoperability.</t>
      <t>This memo aims to improve global interoperability between different decentralized digital identity ecosystems by ensuring that public DID owners (i.e. credential issuers and sometimes verifiers) have unique and accessible global identifiers. The memo also aims to demonstrate how trust registries can enable global interoperability by providing a layer of digital trust in the use of digital credentials, demonstrating that trust registries can facilitate a more efficient and trustworthy credential verification process. By leveraging the publicly resolvable and widely supported DNS/DNSSEC infrastructure, entities looking to make a trust decision can easily validate not only the integrity of the credential they are presented with, but also quickly associate the entity in question with a domain name and organization, as well as their authority and trustworthiness by confirming their membership in a trust registry. We will explore how this implementation can present a more decentralized approach to making trust decisions, without having to integrate directly to all trust registries, but instead letting entities involved in private transactions leverage existing internet infrastructure to facilitate their own trust decisions.</t>
      <t>We will focus this memo around a use case involving an individual or an organization receiving a verifiable credential <xref target="AnonCreds"/> <xref target="W3C-VC-Data-Model"/> from an issuer and storing it in their digital wallet. When the individual needs to provide proof of identity or other claims, they present the verifiable credential to a verifier in the form of a verifiable claim which normally includes a digital signature. The verifier then performs several steps to verify the authenticity of the credential, including extracting the issuer's DID from the credential, resolving it on a distributed ledger (Indy ledger) to obtain the issuer's DID document, verifying the signature of the credential using the public key in the issuer's DID document, verifying the issuer's domain name and public key through DNS queries using URI and TLSA records, and finally verifying the issuer through a trust registry grounded in the DNS using URI and TLSA records, while ensuring all these DNS records are properly signed and validated with DNSSEC.</t>
      <t>This process allows for the secure and decentralized verification of digital credentials in a manner that is transparent and auditable, while also existing alongside and independent of the many different decentralized identity ecosystems and implementations by grounding itself in the DNS.</t>
      <section anchor="note">
        <name>Note</name>
        <t>The standardization of the various implementations of DIDs, Verifiable Credentials, and more specifically, Trust Registries, is required to to ensure global interoperability of the diverse and emerging digital identity ecosystem.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <t><strong>Issuer</strong>: The source of credentials—every verifiable credential has an issuer. Issuers can include organizations such as government agencies (passports, verified person), financial institutions (credit cards), universities (degrees), corporations (employment IDs), churches (awards), etc. Individuals can issue themselves self-attested credentials - and depending on the governance framework of a digital credentialing ecosystem, individuals could issue credentials to others.</t>
        </li>
        <li>
          <t><strong>Holder</strong>: The recipient of digital credentials. The Holder stores their credentials inside a digital wallet and uses agent technology to interact with other entities. A Holder can be a person, an organization or a machine.</t>
        </li>
        <li>
          <t><strong>Verifier</strong>: A verifier can be anyone seeking trust assurance of some kind about the holder of a credential. Verifiers request the credentials they need and then follow their own policy to verify their authenticity and validity. For example, a TSA agent at an airport will look for specific features of a passport or driver’s license to see if it is valid, then check to ensure it is not expired.</t>
        </li>
        <li>
          <t><strong>Digital Wallet/Agent</strong>: A digital wallet, in the context of digital identity, is a secure platform or application that stores and manages an individual's personal identification and authentication credentials, such as government-issued IDs, passports, driver's licenses, and biometric data in the form of verifiable credentials. The Agent allows the subject to establish unique, confidential, private and authentic channels with other agents.</t>
        </li>
        <li>
          <t><strong>Verifiable Data Registry (VDR)</strong>: A storage location where information relating to Decentralized Identifiers (DIDs) and credential metadata are stored. Permissionless blockchains or permissioned distributed ledger networks can be used to facilitate the  discovery and resolution of DIDs and credential information.</t>
        </li>
        <li>
          <t><strong>Trust Registry</strong>: Trust registries are services that help determine the authenticity and authorization of entities in an ecosystem governance framework. They allow governing authorities to specify what actions are authorized for governed parties and enable checking if an issuer is authorized to issue a particular credential type. Essentially, trust registries serve as a trusted source for verifying the legitimacy of credential issuers, wallet apps, and verifiers.</t>
        </li>
      </ul>
    </section>
    <section anchor="mapping-a-did-to-the-dns">
      <name>Mapping a DID to the DNS</name>
      <t>The W3C DID Core spec supports multiple ways of associating a DID to a domain.</t>
      <t><strong>alsoKnownAs</strong>: The assertion that two or more DIDs (or other types of URI, such as a domain name) refer to the same DID subject can be made using the <xref target="alsoKnownAs"/> property.</t>
      <t><strong>Services</strong>: Alternatively, <xref target="services"/> are used in DID documents to express ways of communicating with the DID subject or associated entities. In this case we are referring specifically to the "LinkedDomains" service type.</t>
      <t>However, this association stemming only from the DID is unidirectional. By leveraging URI records as outlined in <xref target="DID-in-the-DNS"/>, we can create a bidirectional relationship, allowing a domain to publish their associated DIDs in the DNS.</t>
      <t><strong><em>Ex: _did.example-issuer.ca IN URI 1 0 “did:sov:XXXXXXX”</em></strong></t>
      <t>This relationship enhances security, as an entity would require control over both the DID and the domain’s DNS server to create this bidirectional association, reducing the likelihood of malicious impersonation.</t>
      <t>The ability for an organization to publish a list of their DIDs on the DNS is also beneficial as it establishes a link between the DNS, which is ubiquitously supported, and the distributed ledger (or other places) where the DID resides on which may not have the same degree of access or support, enhancing discoverability.</t>
      <section anchor="uri-record-scoping">
        <name>URI record scoping</name>
        <ul spacing="normal">
          <li>
            <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the URI RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
          </li>
        </ul>
      </section>
      <section anchor="issuer-handles">
        <name>Issuer Handles</name>
        <t>An issuer may have multiple sub entities issuing credentials on their behalf, such as the different faculties in a university issuing diplomas. Each of these entities will need to be registered separately in a trust registry and will likely have one or more DIDs of their own. For this reason, the introduction of an issuer handle, represented as a subdomain in the resource record name, provides a simple way to facilitate the distinction of DIDs, their public keys, and credentials they issue in their relationship to the issuer.</t>
        <t><strong><em>Ex: _did.diplomas.university-issuer.ca IN URI 1 0 “did:sov:XXXXXXX”</em></strong></t>
        <t><strong><em>Ex: _did.certificates.university-issuer.ca IN URI 1 0 “did:sov:XXXXXXX”</em></strong></t>
      </section>
    </section>
    <section anchor="did-public-keys-in-the-dns">
      <name>DID Public Keys in the DNS</name>
      <t>The DID to DNS mapping illustrated in section 4 provides a way of showing the association between a DID and a domain, but no way of verifying that relationship. By hosting the public keys of that DID in its related domain’s zone, we can provide a cryptographic linkage to bolster this relationship while also providing access to the DID’s public keys outside of the distributed ledger where it resides, facilitating interoperability.</t>
      <t>TLSA records <xref target="RFC6698"/> provide a simple way of hosting cryptographic information in the DNS.</t>
      <section anchor="tlsa-record-scoping-selector-field">
        <name>TLSA Record Scoping, Selector Field</name>
        <t>When public keys related to DIDs are published in the DNS as TLSA records:</t>
        <ul spacing="normal">
          <li>
            <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the TLSA RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
          </li>
          <li>
            <t>The Selector Field of the TLSA record must be set to 1, SubjectPublicKeyInfo: DER-encoded binary structure as defined in <xref target="RFC5280"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuer-handles-1">
        <name>Issuer Handles</name>
        <t>As mentioned in section 4.2, an issuer may have multiple sub entities issuing credentials on their behalf, likely with their own set or sets of keypairs. Because these keypairs will need to be registered in a trust registry, and represented in the DNS as TLSA records, the use of an issuer Handle as outlined in section 4.2 will facilitate the distinction of the different public keys in their relation to the issuer.</t>
        <t><strong><em>Ex: _did.diplomas.university-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b2”</em></strong></t>
        <t><strong><em>Ex: _did.certificates.university-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b3”</em></strong></t>
      </section>
      <section anchor="instances-of-multiple-key-pairs">
        <name>Instances of Multiple Key Pairs</name>
        <t>Depending on the needs of the issuer, it is possible they may use multiple keypairs associated with a single DID to sign and issue credentials. In this case a mechanism to differentiate which verificationMethod the public key is related to will need to be added to the name of the TLSA RRset.</t>
        <t>A simple solution would be to create a standardized naming convention by expanding the RRset name using the fragment of the target verificationMethod's ID.</t>
        <t><strong><em>Ex: _did.key-1.example-issuer.ca IN TLSA 3 1 0 "4e18ac22c00fb9...b96270a7b4"</em></strong></t>
        <t><strong><em>Ex: _did.key-2.example-issuer.ca in TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b5”</em></strong></t>
      </section>
      <section anchor="benefits-of-public-keys-in-the-dns">
        <name>Benefits of Public Keys in the DNS</name>
        <t>Hosting the public keys in TLSA records provides a stronger mechanism for the verifier to verify the issuer with, as they are able to perform a cryptographic challenge against the DID using the corresponding TLSA records, or against the domain using the corresponding <xref target="verificationMethod"/> in the DID document. The accessibility of the public keys is also beneficial, as the verifier only needs to resolve the DID document on the distributed ledger and can perform the remainder of the cryptographic verification process using data available in the DNS, potentially limiting the burden of having to interoperate with a multitude of different distributed ledger technologies and transactions for key access.</t>
      </section>
    </section>
    <section anchor="digital-credential-verification-using-dids-and-the-dns">
      <name>Digital Credential Verification using DIDs and the DNS</name>
      <t>By leveraging the records and relationships outlined above, the verifier can verify a digital credential claim by:</t>
      <ul spacing="normal">
        <li>
          <t>Looking up the credential’s issuer’s DID on a distributed ledger to resolve a DID document.</t>
        </li>
        <li>
          <t>Extracting the issuer’s domain from that DID document.</t>
        </li>
        <li>
          <t>Querying that domain for a <em>_did</em> URI record to confirm the issuer’s domain is also claiming ownership over that DID.</t>
        </li>
        <li>
          <t>Performing a verification of the credential’s signature/proof using the relevant verificationMethod in the DID document.</t>
        </li>
        <li>
          <t>Querying that domain for a <em>_did</em> TLSA record to confirm the public key expressed by the verificationMethod is also expressed by the issuer’s domain.</t>
        </li>
      </ul>
      <t>Through this process, the verifier has not only cryptographically verified the credential they are being presented with, but also associated the issuing DID to a publicly resolvable domain, confirming it’s validity both semantically and cryptographically.</t>
    </section>
    <section anchor="role-of-dnssec-for-assurance-and-revocation">
      <name>Role of DNSSEC for Assurance and Revocation</name>
      <t>It is a <bcp14>MUST</bcp14> that all the participants in this digital identity ecosystem enable DNSSEC signing for all the DNS instances they operate. See <xref target="RFC9364"/>.</t>
      <t>DNSSEC provides cryptographic assurance that the DNS records returned in response to a query are authentic and have not been tampered with. This assurance within the context of the <em>_did</em> URI and <em>_did</em> TLSA records provides another mechanism to ensure the integrity of the DID and its public keys outside of the distributed ledger it resides on directly from the domain of its owner.</t>
      <t>Within this use-case, DNSSEC also provides revocation checks for both DIDs and public keys. In particular, a DNS query for a specific <em>_did</em> URI record or <em>_did</em> TLSA record can return an NXDOMAIN <xref target="RFC8020"/> response if the DID or public key has been revoked. This approach can simplify the process of verifying the validity of DIDs and public keys by reducing the need for complex revocation mechanisms or implementation specific technologies.</t>
    </section>
    <section anchor="the-role-of-trust-registries-in-bidirectional-credential-verification">
      <name>The Role of Trust Registries in Bidirectional Credential Verification</name>
      <t>A trust registry is a decentralized system that enables the verification of the authenticity and trustworthiness of issuers of digital credentials. Trust registries can be implemented using distributed ledger technology and leverage the DNS to provide a transparent and auditable record of issuer information.</t>
      <t>When an entity is presented with a verifiable claim, there are three things they will want to ensure:</t>
      <ol spacing="normal" type="1"><li>
          <t>That a claim hasn’t been altered/falsified at any point in time, via cryptographic verifiability and Verifiable Data Registries (VDRs).</t>
        </li>
        <li>
          <t>That a claim has accurate representation via authentication, via DID Discovery &amp; mapping within DNS as described above.</t>
        </li>
        <li>
          <t>That a claim has authority, or in other words, does the issuer have authority in its issuance of credentials, via the use of trust registries (or trust lists).</t>
        </li>
      </ol>
      <t>In this memo, trust registries enable the verification of the authority of an issuer and by extent their credentials. The role of a trust registry within the context of this document is to confirm the authenticity and trustworthiness of the issuer to the verifier after they have validated the digital credential using the mechanisms described previously. This involves the trust registry taking on the role of a trust anchor for a given ecosystem, providing input for the verifier’s ultimate trust decision regarding the credential they are being presented with. The assumption is made that the trust registry would be operated under the authority of an institution or organization such that their claims and input to the trust decision would be considered significant or definitive. An example of such an organization would be a government entity in relation to the issuance of a driver’s licence.</t>
      <t>It is important to note that the DNS based trust registry mechanism described in this section is not meant to operate in place of an alternative implementation but provide an easy to implement and use mechanism to extend such a solution.</t>
      <t>This section also does not describe the process of the trust registry’s verification of an issuer, or the process of how an issuer would become accredited by or join a trust registry.</t>
      <section anchor="issuers-membership-claim-in-a-trust-registry">
        <name>Issuer's Membership Claim in a Trust Registry</name>
        <t>Once the verifier has successfully completed the credential verification process outlined in section 6, they have definitive proof that the credential they are being presented with was issued by the claimed issuer, and that issuer can be resolved to an organization’s or entity’s domain. However, this process does not provide definitive proof the issuer is to be trusted or has the authority to issue such a credential. The issuer, through use of URI records and the <em>_trustregistry</em> label, can assert the claim that they are a member of a trust registry.</t>
        <t><strong><em>Ex: _trustregistry.example-issuer.ca IN URI 0 1 “example-trustregistry.ca”</em></strong></t>
        <t>This record indicates the verifier can query the <em>example-trustregistry.ca</em> DNS based trust registry for TLSA records containing <em>example-issuer.ca's</em> public key/s, proving their membership.</t>
        <section anchor="uri-record-name-scoping">
          <name>URI Record Name Scoping</name>
          <t>When trust registry membership claims are published in the DNS</t>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global (highest-level) underscore name of the URI RRset to <em>_trustregistry</em> (0x5F 0x74 0x72 0x75 0x73 0x74 0x72 0x65 0x67 0x69 0x73 0x74 0x72 0x79)</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="trust-registry-membership-proof">
        <name>Trust Registry Membership Proof</name>
        <t>The trust registry can assert an issuer's membership using TLSA records in a similar fashion to the methods outlined by section 5.1.</t>
        <t><strong><em>Ex: _example-issuer.ca._trustregistration.example-trustregistry.ca in TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b6”</em></strong></t>
        <t>Note that the first component of the URI is the issuer’s domain, followed by the <em>_trustregistration</em> label. This combination indicates that the domain expressed is registered by this trust registry as per its governance model, and this is their public key. This association created by the TLSA record effectively has created a chain of trust, beginning at the DID’s verificationMethod, continuing to the issuer’s domain, and finally resolving at the Trust Registry.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID-Specification-Registries" target="https://www.w3.org/TR/did-spec-registries/#did-methods">
          <front>
            <title>DID Specification Registries</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="AnonCreds" target="https://hyperledger.github.io/anoncreds-spec/">
          <front>
            <title>AnonCreds Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C-VC-Data-Model" target="https://www.w3.org/TR/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="alsoKnownAs" target="https://www.w3.org/TR/did-core/#also-known-as">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="services" target="https://www.w3.org/TR/did-core/#services">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DID-in-the-DNS" target="https://datatracker.ietf.org/doc/html/draft-mayrhofer-did-dns-05#section-2">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="verificationMethod" target="https://www.w3.org/TR/did-core/#verification-methods">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ToIP_Trust_Registry_Specification" target="https://github.com/trustoverip/tswg-trust-registry-tf/blob/main/v1/docs/ToIP%20Trust%20Registry%20V1%20Specification.md">
          <front>
            <title>ToIP Trust Registry Protocol V1 Specification</title>
            <author>
              <organization>Trust Over IP (ToIP) Working Group</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Pan-Canadian_Trust_Framework" target="https://diacc.ca/wp-content/uploads/2023/03/PCTF-Trust-Registries-Component-Overview_Draft-Recomendation-V1.0.pdf">
          <front>
            <title>PCTF Trust Registries Draft Recommendation V1.0 DIACC / PCTF13</title>
            <author>
              <organization>DIACC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Self-Sovereign_Identity">
          <front>
            <title>Self-Sovereign Identity</title>
            <author initials="D." surname="Reed" fullname="Drummond Reed">
              <organization/>
            </author>
            <author initials="A." surname="Preukschat" fullname="Alex Preukschat">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISBN" value="9781617296598"/>
        </reference>
      </references>
    </references>
    <?line 267?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
