trustoverip / tswg-did-x509-method-specification

https://trustoverip.github.io/tswg-did-x509-method-specification/
Other
1 stars 1 forks source link

Add discussion on timestamp of signature issuance relative to cert validity #10

Open scouten-adobe opened 8 months ago

scouten-adobe commented 8 months ago

Follow up from 2024-03-07 meeting.

See https://trustoverip.github.io/tswg-did-x509-method-specification/#read.

When a did:x509 is used in a signature capacity, need to understand whether the certificate was valid at the time of signature.

Perhaps relevant: C2PA addresses this by requiring an RFC 3161 countersignature as part of the signature.