Skip to content

docs(spec): add key rotation security audit draft for Issue #3#17

Merged
chrishooooo-netizen merged 2 commits into
trailprotocol:mainfrom
AmeyParle:feature/key-rotation-security-audit
May 6, 2026
Merged

docs(spec): add key rotation security audit draft for Issue #3#17
chrishooooo-netizen merged 2 commits into
trailprotocol:mainfrom
AmeyParle:feature/key-rotation-security-audit

Conversation

@AmeyParle
Copy link
Copy Markdown
Contributor

Summary

Adds a structured security audit draft for did:trail key rotation semantics.

Covers

  • compromised active-key rotation
  • stale DID Document replay / downgrade risk
  • revocation propagation timing
  • recovery path design
  • federation consistency during rotation
  • resolver freshness / cache considerations
  • registry compromise considerations
  • retired vs revoked key handling

Why

Issue #3 asks for a security review of key rotation, revocation timing, recovery scenarios, MITM during DID resolution, registry compromise, and replay attacks with stale DID Documents.

Related to #3

Copy link
Copy Markdown
Contributor

@chrishooooo-netizen chrishooooo-netizen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving — thank you for the structured audit, this is exactly the level of rigor the spec needed. The P0/P1/P2 split is clean and implementable, and the suggested spec patch in §8 is a good starting point for v1.3 work.

Particularly valuable:

  • The compromised-key vs routine-rotation distinction (§4)
  • Explicit pending/active/retired/revoked lifecycle states (P0)
  • Registry-signed checkpoint idea (P1) for federation consistency
  • The freshness/version downgrade prevention (P1)

I will track the P0 items as candidates for v1.3 and the P1 federation/freshness items for the broader v1.3/v2.0 roadmap. The open questions in §7 are good agenda items for future community discussion.

@chrishooooo-netizen chrishooooo-netizen merged commit c3a5ce7 into trailprotocol:main May 6, 2026
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants