183 lines
5.8 KiB
Markdown
183 lines
5.8 KiB
Markdown
|
|
Here’s a first draft for **ASL-AUTH-HOST v0.1** — the profile for an authority node that is structurally similar to a SystemRescue node but configured for offline, auditable domain authority operations.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
# ASL-AUTH-HOST v0.1 — Authority Node Profile
|
|||
|
|
|
|||
|
|
## 1. Purpose
|
|||
|
|
|
|||
|
|
Defines the **host-level profile** for a Domain Authority Node (DAN) in the ASL ecosystem.
|
|||
|
|
This profile ensures that the authority node:
|
|||
|
|
|
|||
|
|
* Operates **offline**
|
|||
|
|
* Maintains an **internal ASL-HOST store**
|
|||
|
|
* Produces **deterministic artifacts and receipts**
|
|||
|
|
* Supports **domain admission and certificate management**
|
|||
|
|
* Can bootstrap **new personal or group domains**
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 2. Core Principles
|
|||
|
|
|
|||
|
|
1. **All authority state is an artifact**: keys, DAM, policies, and environment claims are recorded in ASL.
|
|||
|
|
2. **Offline-first**: no network dependency for core operations.
|
|||
|
|
3. **Deterministic snapshots**: every operation is captured in a snapshot.
|
|||
|
|
4. **Receipt-oriented**: outputs are PER artifacts ready for federation or personal import.
|
|||
|
|
5. **Minimal trusted code**: authority functionality is limited to signing, sealing, and packaging artifacts.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 3. Required Components
|
|||
|
|
|
|||
|
|
### 3.1 ASL-HOST Store
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
/asl-host/
|
|||
|
|
/domains/
|
|||
|
|
/<domain-id>/
|
|||
|
|
/store/ # block store
|
|||
|
|
/log/ # append-only log
|
|||
|
|
/snapshots/ # snapshot markers
|
|||
|
|
/certs/ # locally stored authority certificates
|
|||
|
|
/policies/ # policy artifacts
|
|||
|
|
/dam/ # Domain Admission Manifests
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
* Supports block and index operations according to ASL-STORE semantics.
|
|||
|
|
* No external federation by default.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
### 3.2 Authority Keys
|
|||
|
|
|
|||
|
|
* Root keypair generated locally per domain.
|
|||
|
|
* Stored as:
|
|||
|
|
|
|||
|
|
* Public key artifact
|
|||
|
|
* Private key artifact (encrypted on local storage)
|
|||
|
|
* Optionally rotated with deterministic PEL DAGs.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
### 3.3 Offline Environment Claim
|
|||
|
|
|
|||
|
|
* Records:
|
|||
|
|
|
|||
|
|
* Image hash
|
|||
|
|
* Boot-time environment
|
|||
|
|
* Installed tool versions
|
|||
|
|
* Snapshot of ASL-HOST store
|
|||
|
|
* Stored as **environment claim artifact**.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
### 3.4 Domain Admission Manifest (DAM)
|
|||
|
|
|
|||
|
|
* Stored as an artifact.
|
|||
|
|
* Includes:
|
|||
|
|
|
|||
|
|
* Domain ID
|
|||
|
|
* Root key fingerprint
|
|||
|
|
* Policy hash
|
|||
|
|
* Optional courtesy lease references
|
|||
|
|
* Signed with authority node’s root key.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
### 3.5 PEL Programs
|
|||
|
|
|
|||
|
|
* Minimal offline PEL DAGs for:
|
|||
|
|
|
|||
|
|
* Signing DAMs
|
|||
|
|
* Generating PER receipts
|
|||
|
|
* Packaging SOPS bundles
|
|||
|
|
* Executed **deterministically** from snapshots.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 4. Operation Modes
|
|||
|
|
|
|||
|
|
| Mode | Description |
|
|||
|
|
| --------------- | ------------------------------------------------------------------------------------ |
|
|||
|
|
| **Genesis** | Create first domain for personal use; generate DAM, root keys, and policy artifacts. |
|
|||
|
|
| **Rescue** | Accept input artifacts (old data, files, or device images) and produce PER receipts. |
|
|||
|
|
| **Admission** | Sign DAMs and package SOPS bundles for new nodes entering the ecosystem. |
|
|||
|
|
| **Maintenance** | Rotate keys, refresh policies, seal snapshots, audit artifacts. |
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 5. Snapshot and Logging
|
|||
|
|
|
|||
|
|
* Every operation produces:
|
|||
|
|
|
|||
|
|
* New blocks for artifacts
|
|||
|
|
* Append-only log entries
|
|||
|
|
* Snapshot marker capturing CURRENT state
|
|||
|
|
* Snapshots are **immutable** and form the basis for deterministic PER generation.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 6. Authority-Only Constraints
|
|||
|
|
|
|||
|
|
* No network communication.
|
|||
|
|
* No automatic federation.
|
|||
|
|
* All outputs are artifacts for later import or distribution.
|
|||
|
|
* Garbage collection is disabled; nothing may be deleted from genesis snapshot onward.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 7. Security Considerations
|
|||
|
|
|
|||
|
|
* Root private keys **must** remain offline.
|
|||
|
|
* Environment claim artifacts allow **proof of image integrity** and operational reproducibility.
|
|||
|
|
* Courtesy leases (optional) allow temporary storage for new personal domains under common domain supervision.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 8. Output Artifacts
|
|||
|
|
|
|||
|
|
| Artifact Type | Description |
|
|||
|
|
| -------------------------- | ---------------------------------------------------------------- |
|
|||
|
|
| Root key artifact | Public/private keypair for domain signing. |
|
|||
|
|
| DAM artifact | Domain Admission Manifest, signed. |
|
|||
|
|
| Policy artifact | Hash of accepted policies and operational contracts. |
|
|||
|
|
| Environment claim artifact | Immutable claim of offline environment state. |
|
|||
|
|
| PER artifact | Receipt confirming DAM or policy execution. |
|
|||
|
|
| SOPS bundle | Encrypted and portable bundle for admission or personal archive. |
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 9. Bootstrapping Flow
|
|||
|
|
|
|||
|
|
1. Boot ASL-AUTH-HOST image offline.
|
|||
|
|
2. Initialize local ASL-HOST store.
|
|||
|
|
3. Generate root keypair artifact.
|
|||
|
|
4. Create DAM artifact, sign with root key.
|
|||
|
|
5. Produce environment claim artifact.
|
|||
|
|
6. Seal snapshot (`genesis snapshot`).
|
|||
|
|
7. Generate PER receipts for DAM and environment.
|
|||
|
|
8. Optionally export SOPS bundle for new nodes or personal import.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
## 10. Relationship to SystemRescue Node
|
|||
|
|
|
|||
|
|
* Uses same OS image base.
|
|||
|
|
* ASL-HOST store layout is identical.
|
|||
|
|
* Only differs in:
|
|||
|
|
|
|||
|
|
* Authority keys presence
|
|||
|
|
* Offline-only policy
|
|||
|
|
* Deterministic signing and SOPS bundle generation
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
This draft defines the **authority node as a first-class ASL-HOST**, offline, deterministic, and auditable, ready to issue DAMs, PERs, and SOPS bundles for new personal domains or rescue operations.
|
|||
|
|
|
|||
|
|
---
|
|||
|
|
|
|||
|
|
If you want, I can **draft the exact on-disk block layout for ASL-AUTH-HOST**, showing directories, artifact blocks, log files, snapshots, DAMs, and policy files, similar to a precise filesystem blueprint for bootstrapping. This would make it fully tangible for your SystemRescue image.
|
|||
|
|
|
|||
|
|
Do you want me to do that next?
|
|||
|
|
|