5.8 KiB
Here’s a first draft for ASL-AUTH-HOST v0.1 — the profile for an authority node that is structurally similar to a SystemRescue node but configured for offline, auditable domain authority operations.
ASL-AUTH-HOST v0.1 — Authority Node Profile
1. Purpose
Defines the host-level profile for a Domain Authority Node (DAN) in the ASL ecosystem. This profile ensures that the authority node:
- Operates offline
- Maintains an internal ASL-HOST store
- Produces deterministic artifacts and receipts
- Supports domain admission and certificate management
- Can bootstrap new personal or group domains
2. Core Principles
- All authority state is an artifact: keys, DAM, policies, and environment claims are recorded in ASL.
- Offline-first: no network dependency for core operations.
- Deterministic snapshots: every operation is captured in a snapshot.
- Receipt-oriented: outputs are PER artifacts ready for federation or personal import.
- Minimal trusted code: authority functionality is limited to signing, sealing, and packaging artifacts.
3. Required Components
3.1 ASL-HOST Store
/asl-host/
/domains/
/<domain-id>/
/store/ # block store
/log/ # append-only log
/snapshots/ # snapshot markers
/certs/ # locally stored authority certificates
/policies/ # policy artifacts
/dam/ # Domain Admission Manifests
- Supports block and index operations according to ASL-STORE semantics.
- No external federation by default.
3.2 Authority Keys
-
Root keypair generated locally per domain.
-
Stored as:
- Public key artifact
- Private key artifact (encrypted on local storage)
-
Optionally rotated with deterministic PEL DAGs.
3.3 Offline Environment Claim
-
Records:
- Image hash
- Boot-time environment
- Installed tool versions
- Snapshot of ASL-HOST store
-
Stored as environment claim artifact.
3.4 Domain Admission Manifest (DAM)
-
Stored as an artifact.
-
Includes:
- Domain ID
- Root key fingerprint
- Policy hash
- Optional courtesy lease references
-
Signed with authority node’s root key.
3.5 PEL Programs
-
Minimal offline PEL DAGs for:
- Signing DAMs
- Generating PER receipts
- Packaging SOPS bundles
-
Executed deterministically from snapshots.
4. Operation Modes
| Mode | Description |
|---|---|
| Genesis | Create first domain for personal use; generate DAM, root keys, and policy artifacts. |
| Rescue | Accept input artifacts (old data, files, or device images) and produce PER receipts. |
| Admission | Sign DAMs and package SOPS bundles for new nodes entering the ecosystem. |
| Maintenance | Rotate keys, refresh policies, seal snapshots, audit artifacts. |
5. Snapshot and Logging
-
Every operation produces:
- New blocks for artifacts
- Append-only log entries
- Snapshot marker capturing CURRENT state
-
Snapshots are immutable and form the basis for deterministic PER generation.
6. Authority-Only Constraints
- No network communication.
- No automatic federation.
- All outputs are artifacts for later import or distribution.
- Garbage collection is disabled; nothing may be deleted from genesis snapshot onward.
7. Security Considerations
- Root private keys must remain offline.
- Environment claim artifacts allow proof of image integrity and operational reproducibility.
- Courtesy leases (optional) allow temporary storage for new personal domains under common domain supervision.
8. Output Artifacts
| Artifact Type | Description |
|---|---|
| Root key artifact | Public/private keypair for domain signing. |
| DAM artifact | Domain Admission Manifest, signed. |
| Policy artifact | Hash of accepted policies and operational contracts. |
| Environment claim artifact | Immutable claim of offline environment state. |
| PER artifact | Receipt confirming DAM or policy execution. |
| SOPS bundle | Encrypted and portable bundle for admission or personal archive. |
9. Bootstrapping Flow
- Boot ASL-AUTH-HOST image offline.
- Initialize local ASL-HOST store.
- Generate root keypair artifact.
- Create DAM artifact, sign with root key.
- Produce environment claim artifact.
- Seal snapshot (
genesis snapshot). - Generate PER receipts for DAM and environment.
- Optionally export SOPS bundle for new nodes or personal import.
10. Relationship to SystemRescue Node
-
Uses same OS image base.
-
ASL-HOST store layout is identical.
-
Only differs in:
- Authority keys presence
- Offline-only policy
- Deterministic signing and SOPS bundle generation
This draft defines the authority node as a first-class ASL-HOST, offline, deterministic, and auditable, ready to issue DAMs, PERs, and SOPS bundles for new personal domains or rescue operations.
If you want, I can draft the exact on-disk block layout for ASL-AUTH-HOST, showing directories, artifact blocks, log files, snapshots, DAMs, and policy files, similar to a precise filesystem blueprint for bootstrapping. This would make it fully tangible for your SystemRescue image.
Do you want me to do that next?