Skip to content

UniKey RFC 4001

Title: UniKey Operational Compliance Checklist

Status: Stable

Category: Standards Track

Version: 1.0

Date: February 2026

Authors: Swoop Engineering Team

Previously published as: RFC-005 (Swoop Series)

Canonical URL: /rfc-4001

 


Abstract

 

This document provides a normative framework for evaluating the compliance of UniKey implementations. It serves as the primary checklist for acquirers, auditors, and ecosystem partners to ensure that a given system adheres to the core security invariants of the UniKey protocol suite. A system is deemed “UniKey Compliant” only if it satisfies all requirements across Trust Packet construction, DNS discovery, hardened validation, and delegation enforcement.



1. Introduction

To maintain a global decentralized trust fabric, all participants—Issuers, Delegates, and Verifiers—must operate under a unified set of compliance rules. This document consolidates the normative requirements from the 1000, 2000, and 3000 series into a single, auditable checklist.

 

2. Trust Packet Compliance (Ref: RFC 2001)

The core cryptographic container must be evaluated against the following:

  • [ ] Canonicalization: Does the implementation match the unikey-json-v1 lexicographical ordering?
  • [ ] Deterministic Verification: Can the same packet be verified with identical results across different environments?
  • [ ] Replay Protection: Are nonce uniqueness and issued_at/expires_at windows strictly enforced?
  • [ ] Fail-Closed Behavior: Does the system reject the transaction if any single signature or claim is ambiguous?

 

3. Key Discovery & DKIM Profile (Ref: RFC 3002)


Public key discovery must adhere to the hardened DKIM profile:

  • [ ] Pathing: Are keys discovered exclusively via the <selector>._domainkey DNS path?
  • [ ] Tag Filtering: Does the verifier reject records containing disallowed tags (e.g., g=, h=)?
  • [ ] Cryptographic Floor: Are RSA keys < 2048-bit or ECC keys below P-256 automatically rejected?
  • [ ] Revocation: Does the system immediately invalidate trust when a DNS record is nullified (p=)?

 

4. DNS Hardening Requirements (Ref: RFC 3001)


The discovery process must resist network-layer attacks:

  • [ ] N-Resolver Consensus: Does the verifier query $\geq 3$ independent resolvers and require bitwise equality?
  • [ ] TTL Monitoring: Are sudden drops in TTL flagged as suspicious events?
  • [ ] DNSSEC Integration: Is DNSSEC treated as an additive confidence signal rather than a total replacement for multi-path validation?

 

5. Delegation Enforcement (Ref: RFC 1200)


Chained authority must be strictly “caged”:

  • [ ] Hash Chaining: Does every delegated packet correctly reference the parent’s TPH?
  • [ ] Monotonic Scope: Is it mathematically proven that the Delegate’s scope is equal to or smaller than the Issuer’s?
  • [ ] Chain Validity: Does an expired or revoked root packet invalidate all downstream actions?

 

6. Operational & Audit Controls

  • [ ] Incident Response: Is there a documented procedure for key rotation in the event of a suspected TEE/Hardware compromise?
  • [ ] Decision Logging: Are verification failures logged with specific UniKey error codes (e.g., TP-002, DS-001)?
  • [ ] Reproducibility: Can a third-party auditor reproduce a verification decision using only the Trust Packet and historical DNS logs?

 

7. Attestation and Certification


Implementations claiming compliance MAY issue a signed attestation statement:

“This system conforms to the UniKey RFC 4001 Operational Compliance Checklist covering Trust Packet, DKIM/DNS Profile, and Delegation specifications.”

 

8. Non-Compliance and Trust Revocation

The UniKey protocol suite is an “All-or-Nothing” framework. Failure to satisfy any unchecked item in this document constitutes a Trust Violation. Verifiers MUST NOT grant “Partial Trust” to non-compliant implementations.