2.9 KiB
ASL/AUTH-HOST/1 - Authority Node Profile
Status: Draft Owner: Architecture Version: 0.1.0 SoT: No Last Updated: 2026-01-17 Tags: [ops, authority, offline]
Document ID: ASL/AUTH-HOST/1
Layer: O2 - Authority host profile
Depends on (normative):
ASL/HOST/1ASL/DAM/1ASL/POLICY-HASH/1ASL/OFFLINE-ROOT-TRUST/1
Informative references:
PEL/1-COREPEL/1-SURFENC-ASL-AUTH-HOST/1ASL/RESCUE-NODE/1
0. Conventions
The key words MUST, MUST NOT, REQUIRED, SHOULD, and MAY are to be interpreted as in RFC 2119.
ASL/AUTH-HOST/1 defines an operational profile. It does not define cryptography or artifact semantics.
1. Purpose and Scope
ASL/AUTH-HOST/1 defines the profile for an offline authority node that mints and signs domain admission artifacts. The host:
- Operates offline by default
- Maintains a local ASL/HOST store
- Produces deterministic artifacts and receipts
- Issues DAM artifacts for new domains
2. Core Principles (Normative)
- Authority state is stored as artifacts.
- Operations are deterministic and snapshot-bound.
- The host remains offline during authority operations.
- Outputs are immutable artifacts suitable for later transfer.
- Authority functionality is limited to signing, sealing, and packaging artifacts.
- Receipts (PERs) are primary outputs for auditing and later federation.
3. Required Components
An authority host MUST provide:
- ASL/HOST store for authority and domain artifacts
- Root authority key material (offline)
- PEL execution environment for deterministic receipts
- Policy hash verification for admission
4. Operation Modes
The host MAY operate in the following modes:
GENESIS- mint initial domain and keysRESCUE- ingest external artifacts and produce receiptsADMISSION- sign DAMs and policy artifactsMAINTENANCE- rotate keys, seal snapshots, audit state
5. Output Artifacts
The host MUST be able to produce:
- Root key artifacts (public, encrypted private)
- DAM artifacts and signatures
- Policy hash artifacts
- Environment claim artifacts
- PER receipts and associated TGK edges
6. Snapshot Discipline
Each authority operation MUST:
- Append log entries for new artifacts
- Seal relevant segments
- Create a snapshot marker capturing CURRENT state
Snapshots MUST be immutable once sealed.
7. Offline Constraints
- Network interfaces SHOULD be disabled.
- External input and output MUST occur via explicit operator action.
- No background services SHOULD alter authority state.
- Garbage collection SHOULD be disabled for authority domains.
8. Security Considerations
- Private keys MUST remain offline and encrypted at rest.
- Only signed outputs may leave the host.
- Operator presence is required for authority operations.
9. Versioning
Backward-incompatible profile changes MUST bump the major version.