DNSO Operations Charter
Operational procedures, service commitments, and stewardship practice for the Dillweed Namespace Stewardship Organization during the founding phase.
The Governance Framework defines who holds authority. This charter defines how that authority is exercised — the day-to-day operational practices that make the namespace trustworthy, not just governed.
Purpose
This charter defines the operational practices of the Dillweed Namespace Stewardship Organization (DNSO) — the founding steward body responsible for operating the Dillweed Namespace during the founding phase. It translates the authority structures defined in the Governance Framework into concrete procedures: how trust is attested, how keys are managed, how revocations are executed, how incidents are handled, and what operational commitments the DNSO makes to the ecosystem.
This charter is a working document. It describes what the DNSO actually does, not aspirational standards that exceed current operational capacity. Commitments stated here are commitments the founding steward can keep.
Scope and Authority Boundaries
This charter governs DNSO operational practice during the founding phase of the Dillweed Namespace Project. It operates within a defined stack of governing documents, each with distinct authority over different aspects of the project.
| Document | Authority | This Charter's Relationship |
|---|---|---|
| Governance Framework v1.0 | Authority structure, stewardship roles, amendment process, succession | Defers to. This charter does not redefine governance structure — it operationalizes it. |
| Namespace Standard v0.4 | Naming model, URI syntax, trust tier definitions | Defers to. Trust tier definitions used in this charter are those defined in the Namespace Standard. |
| Registry Specification v0.2 | Data model, signing authority, registration validation, revocation semantics | Defers to. Operational procedures in this charter implement the registry spec's requirements. |
| DillClaw Resolver Specification v0.1 | Resolution protocol, query handling, trust scoring | Informed by. Resolver behavior affects how DNSO attestation decisions propagate to consumers. |
| This Charter (DNSO Operations Charter v1.0) | Day-to-day DNSO operating procedures | Authoritative for operational practice. Does not supersede any of the above. |
2.1 Conflict Resolution
In the event of an apparent conflict between this charter and any of the above documents, the following precedence order applies: Governance Framework, then Namespace Standard, then Registry Specification, then DillClaw Resolver Specification, then this charter. Conflicts should be logged as amendment candidates for the affected document rather than resolved through informal interpretation. The founding steward is responsible for identifying and surfacing such conflicts.
The procedures in this charter apply during the founding phase as defined in the Governance Framework §4.2. As the project transitions to multi-stakeholder governance, this charter will be superseded by or incorporated into a successor operations document adopted through the formal amendment process.
DNSO Mission and Responsibilities
The DNSO is the operational steward of the Dillweed Namespace. Its mission is to maintain the namespace as a neutral, trustworthy, and durable coordination layer for AI agent capability discovery — operated in the interest of the ecosystem, not any single participant.
3.1 Core Responsibilities
- Registry operation — Maintain the authoritative Dillweed Registry at a stable endpoint, ensuring records are durably stored, cryptographically signed, and accurately served.
- Trust attestation — Review and confirm trust tier elevations to
verifiedandcanonicalfor qualifying registrants. - Key custody — Maintain exclusive custody of the DNSO Ed25519 signing keypair with appropriate security and backup procedures.
- Revocation authority — Exercise revocation authority promptly when required by governance or security events.
- Public disclosure — Maintain transparency with the ecosystem through timely disclosure of governance events, key operations, and material operational changes.
- Spec stewardship — Maintain and evolve the specification stack in accordance with the governance framework's amendment procedures.
- Neutrality preservation — Decline arrangements that would compromise the namespace's neutrality thesis, as defined in the Governance Framework §3.
Trust Tier Attestation
Trust tier attestation is the process by which the DNSO confirms that a self-declared verified or canonical tier declaration is substantiated. Until the DNSO issues attestation, such declarations are provisional and resolvers should apply weighting penalties as specified in the Registry Specification §7.
4.1 Attestation Process — Verified Tier
Attestation Request
Registrant submits an attestation request via the DNSO contact channel, referencing the registered capability by name and version, and providing evidence of operator identity (organizational domain, publicly verifiable contact).
Identity Verification
The DNSO confirms the registrant controls the domain or organizational identity associated with the capability endpoint. This may be accomplished through DNS TXT record verification, organizational contact confirmation, or equivalent mechanism.
Endpoint Review
The DNSO confirms the registered endpoint is live, responsive, and consistent with the registered schema. Minimum 30-day active registration history required.
Attestation or Decline
The DNSO issues attestation by executing POST /promote with the confirmed tier, logging the attestation event to the audit trail. If declined, the DNSO notifies the registrant with a reason and any remediation path. Evidence used to support a verified attestation is retained in the DNSO operational log for at least the lifetime of the attestation and 12 months thereafter.
4.2 Attestation Process — Canonical Tier
The canonical tier is DNSO-designated only and is not available by registrant request. The DNSO may designate a canonical capability when a clear reference implementation exists for a namespace category and no reasonable dispute about its primacy exists. Canonical designations are logged publicly and may be withdrawn if circumstances change.
4.3 Attestation Response Time
During the founding phase, the DNSO targets a response to attestation requests within 14 calendar days. This is a target, not a guarantee. See §10 for the full service level posture.
A self-declared verified or canonical record is signed by the DNSO at registration time — the signature attests that the DNSO wrote the record, not that the tier is confirmed. Resolvers distinguish attested from provisional tiers via the presence of a provisional_tier audit log entry without a corresponding promote entry.
Key Management
The DNSO Ed25519 signing keypair is the cryptographic root of trust for the entire namespace. All Capability Records are signed with the DNSO private key. Its integrity and security are the single most critical operational responsibility of the DNSO.
5.1 Key Custody Requirements
- Storage — Private key stored at file mode
0600on the registry host, outside the database, never in version control. - Backup — Minimum two encrypted backup copies on physically separate media (e.g. encrypted USB drive in a separate physical location, encrypted password manager vault). Backup integrity verified at least monthly.
- Transmission — Private key never transmitted over any network interface. Public key published at
dillweed.com/dnso_public.pemover HTTPS. - Access — Private key access restricted to the founding steward during the founding phase. Access log maintained.
5.2 Planned Key Rotation
The DNSO should perform planned key rotation at intervals no greater than 24 months. Rotation procedure:
Announce rotation
Public disclosure of planned rotation at least 30 days in advance, specifying the overlap window start and end dates.
Generate new keypair
New Ed25519 keypair generated. New public key published at dillweed.com/dnso_public.pem alongside the prior key during the overlap window.
Overlap window (minimum 30 days)
Both keys served. Resolvers that have cached the prior key continue to verify existing records while refreshing to the new key at their next scheduled cycle.
Re-sign all active records
All active Capability Records re-signed under the new key before the prior key is retired.
Retire prior key
Prior key removed from public endpoint. Rotation completion disclosed publicly. Audit log entry recorded.
5.3 Emergency Keypair Reset
If the private key is compromised or lost, an emergency keypair reset is required. This is a registry trust reset event: all existing signatures become unverifiable under the old key. The DNSO must immediately generate a new keypair, publish the new public key, re-sign all active records, and issue a public disclosure with the nature of the incident and remediation steps taken. Emergency resets are logged as critical incidents under §8.
Revocation Procedures
Revocation is the governance mechanism that makes trust tiers meaningful. The DNSO exercises revocation authority to remove bad actors, retire stale capabilities, and maintain the integrity of the namespace.
6.1 Revocation Triggers
- Endpoint failure — A registered endpoint has been unreachable for 90 consecutive days with no registrant contact.
- Identity fraud — A registrant is found to have misrepresented their organizational identity during attestation.
- Malicious capability — A registered capability is found to cause harm to consuming agents or their operators.
- Governance violation — A registrant has violated the terms under which a tier was attested.
- Registrant request — The registrant requests retirement of their own capability.
- Namespace collision — A registration is found to conflict with an existing canonical capability in a way that creates harmful ambiguity.
6.2 Revocation Process
Notice (where feasible)
Where the revocation trigger is not an emergency and registrant contact exists, the DNSO provides 7 days advance notice of intended revocation, allowing the registrant to respond or remediate.
Execute revocation
DNSO executes POST /revoke with a documented reason string. Revoked records are retained in the audit log indefinitely.
Log and disclose
Revocation is logged to the registration audit trail. Revocations for governance or security reasons are publicly disclosed per §7. Registrant-requested retirements are logged but not individually disclosed unless the registrant requests it.
6.3 Emergency Revocation
For malicious capabilities or active security incidents, the DNSO may execute immediate revocation without advance notice. Emergency revocations are disclosed publicly within 48 hours of execution.
Public Disclosure Obligations
Transparency is a core operating principle of the DNSO. The following events require timely public disclosure at dillweed.com or an equivalent canonical disclosure channel:
| Event | Disclosure Window | Required Content |
|---|---|---|
| Governance framework amendment | Prior to adoption (30-day notice) | Proposed change, rationale, effective date |
| Continuity trustee designation | Within 30 days of designation | Designation confirmed (identity need not be disclosed) |
| Planned key rotation | 30 days prior to overlap window start | Overlap window dates, rotation rationale |
| Emergency keypair reset | Within 48 hours | Nature of incident, remediation steps, new public key URL |
| Governance-triggered revocation | Within 48 hours of revocation | Capability name, revocation reason category (detail at DNSO discretion) |
| Foundation formation | Prior to execution | Proposed structure, asset arrangement, continuity role preservation |
| Major operational change | 14 days prior where feasible | Nature of change, effective date, impact on registrants |
Disclosures should be clear, factual, and timely. The goal is to give ecosystem participants the information they need to make informed decisions about their use of the namespace — not to manage reputation or minimize the appearance of problems. Honest disclosure of difficulties builds more durable trust than the appearance of smooth operation.
Incident Response
8.1 Incident Classification
| Class | Definition | Target Response |
|---|---|---|
| Critical | Private key compromise or loss; registry data corruption; active malicious capability causing harm to agents | Immediate action, public disclosure within 48 hours |
| High | Registry unavailability exceeding 4 hours; unauthorized access to write endpoints; identity fraud confirmed | Response within 24 hours, disclosure within 72 hours if public impact |
| Medium | Registry performance degradation; failed backup verification; unresolved attestation dispute | Response within 7 days |
| Low | Registrant complaint; minor operational anomaly; documentation gap | Response within 14 days |
8.2 Private Key Compromise Response
A compromised private key is the most severe incident the DNSO can face. Upon confirmed or suspected compromise:
- Take the registry offline immediately to prevent further signing under the compromised key
- Execute emergency keypair reset per §5.3
- Issue public disclosure within 48 hours including the nature of the compromise, the scope of potentially affected records, and the remediation steps taken
- Notify any known implementers or institutional partners directly
- Document the incident fully in the operational log for governance review
8.3 Registry Unavailability
DillClaw Resolvers are designed to operate from cached records during registry downtime, disclosing staleness to callers. Extended unavailability degrades the namespace's utility but does not break existing resolution. The DNSO should prioritize registry restoration and communicate status and estimated restoration time through the public disclosure channel during extended outages.
Registry Operational Standards
9.1 Backup and Durability
- Database backup frequency — Daily automated backup of
data/registry.dbto at least one off-host location. - Keypair backup — As specified in §5.1. Backup integrity verified monthly.
- Backup restoration test — Full restoration from backup tested at least once every six months. Target restoration time from the most recent verified backup is 24 hours during the founding phase.
- Audit log retention — Registration log retained indefinitely. No rows may be deleted or modified.
9.2 Software Maintenance
- Node.js runtime and
better-sqlite3dependency kept within one major version of current stable release. - Security advisories for dependencies reviewed within 7 days of publication.
- Registry software updates tested against the existing database before deployment to the production instance.
9.3 Monitoring
During the founding phase the DNSO operates with best-effort monitoring appropriate to a single-steward operation. The /health endpoint is the primary operational signal. External uptime monitoring is recommended but not required in the founding phase. As adoption grows and institutional partners appear, monitoring expectations will be formalized.
Founding-Phase Service Level Posture
The Dillweed Namespace is operated by a single founding steward. This section states the honest service level posture for the founding phase — not enterprise SLAs, but clear expectations that registrants and implementers can rely on.
and transparency over the appearance of smooth operation.
- Best-effort availability — no guaranteed uptime percentage
- No 24/7 staffed response — single steward, human response times
- Critical security incidents prioritized above all other activity
- Registry downtime disclosed publicly when exceeding 4 hours
- Attestation requests acknowledged within 14 days
- Governance revocations disclosed within 48 hours
- Backup integrity verified monthly
- Audit log retained indefinitely, never modified
- Formal uptime SLA as infrastructure partners join
- Staffed response window commensurate with adoption
- Defined attestation turnaround SLA
- External monitoring and status page
- Multi-party key custody
- TSC-reviewed operational standards
- Formal incident post-mortem process
- Participant Council operational review rights
Registrants and implementers who rely on the Dillweed Namespace deserve an accurate picture of what it is today. A namespace operated with clear, honest constraints is more trustworthy than one with ambitious commitments it cannot reliably keep. Operational expectations will tighten as adoption grows and the governance structure matures.
Communication Channels
During the founding phase, all DNSO communications are channeled through dillweed.com. The following contact categories are recognized:
- Attestation requests — Registrants seeking trust tier attestation should initiate contact through dillweed.com with the capability name, version, and evidence of operator identity as described in §4.1.
- Registration inquiries — Questions about namespace path selection, protocol compatibility, or the registration process may be directed through dillweed.com.
- Security disclosures — Responsible disclosure of security vulnerabilities or operational concerns should be sent to the DNSO contact channel. The DNSO commits to acknowledging security disclosures within 7 days.
- Institutional partnership — Organizations seeking implementer, contributor, infrastructure partner, or governance participant relationships should initiate contact through dillweed.com, referencing the Governance Framework §7 for the categories of engagement available.
- Public disclosures — Operational disclosures required under §7 will be published at dillweed.com and referenced from the governance document's disclosure log.
Charter Amendment
This charter is subject to the amendment process defined in the Governance Framework §5.6. During the founding phase, amendments require concurrence of the founding continuity seat. Once the Technical Steering Committee is constituted, amendments additionally require TSC majority concurrence and 30-day Participant Council review.
Operational changes that do not alter the charter's stated commitments or conflict with the governing documents may be implemented by the founding steward without formal amendment. Changes that reduce stated commitments, alter disclosure obligations, or affect registrant or implementer expectations require formal amendment.
The resolver defines how it is found.
The registry defines what actually exists.
The governance defines who decides.
This charter defines how they do it.