[Blockchain-interop] Summary Notes from IETF Blockchain Gateway Interop meeting (30 March 2021)

Thomas Hardjono <hardjono@mit.edu> Wed, 31 March 2021 13:19 UTC

Return-Path: <hardjono@mit.edu>
X-Original-To: blockchain-interop@ietfa.amsl.com
Delivered-To: blockchain-interop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 518BA3A2844 for <blockchain-interop@ietfa.amsl.com>; Wed, 31 Mar 2021 06:19:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GQkGHQNKlzck for <blockchain-interop@ietfa.amsl.com>; Wed, 31 Mar 2021 06:18:59 -0700 (PDT)
Received: from outgoing-exchange-5.mit.edu (outgoing-exchange-5.mit.edu [18.9.28.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8BB63A2840 for <blockchain-interop@ietf.org>; Wed, 31 Mar 2021 06:18:58 -0700 (PDT)
Received: from w92exedge4.exchange.mit.edu (W92EXEDGE4.EXCHANGE.MIT.EDU [18.7.73.16]) by outgoing-exchange-5.mit.edu (8.14.7/8.12.4) with ESMTP id 12VDInCF031348 for <blockchain-interop@ietf.org>; Wed, 31 Mar 2021 09:18:57 -0400
Received: from oc11expo23.exchange.mit.edu (18.9.4.88) by w92exedge4.exchange.mit.edu (18.7.73.16) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 31 Mar 2021 09:18:06 -0400
Received: from oc11expo23.exchange.mit.edu (18.9.4.88) by oc11expo23.exchange.mit.edu (18.9.4.88) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 31 Mar 2021 09:18:44 -0400
Received: from oc11expo23.exchange.mit.edu ([18.9.4.88]) by oc11expo23.exchange.mit.edu ([18.9.4.88]) with mapi id 15.00.1497.012; Wed, 31 Mar 2021 09:18:44 -0400
From: Thomas Hardjono <hardjono@mit.edu>
To: "blockchain-interop@ietf.org" <blockchain-interop@ietf.org>
Thread-Topic: Summary Notes from IETF Blockchain Gateway Interop meeting (30 March 2021)
Thread-Index: AQHXJi+thA2+0gAIV0mwX/1J3RN/HA==
Date: Wed, 31 Mar 2021 13:18:44 +0000
Message-ID: <4f8abd454f444131a1b317a0873b5840@oc11expo23.exchange.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [73.167.220.69]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/blockchain-interop/NiuCsnCFqbzkAM0iz6EAu1jLP5E>
Subject: [Blockchain-interop] Summary Notes from IETF Blockchain Gateway Interop meeting (30 March 2021)
X-BeenThere: blockchain-interop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Blockchain Gateway Interoperability Protocol <blockchain-interop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/blockchain-interop/>
List-Post: <mailto:blockchain-interop@ietf.org>
List-Help: <mailto:blockchain-interop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Mar 2021 13:19:02 -0000

Summary Notes from IETF Blockchain Gateway Interoperability group meeting

Date: Tuesday 30 March, 2021 (UK/US/EU timezone)

(a) Attendees

Claire Facer
Daniel Lilley
Denis Avrilionis
Himank Gupta
John Robotham
Luke Riley
Martin Hargreaves
Miguel Correia
Mizan Chowdhury
Peter Somogyvari
Rafael Belchior 
Shiping Chen
Thomas Hardjono
Tom McGarry     



(b) IETF Note Well slide

-- Boilerplate slide on IETF Note Well.  This meeting is operating under IETF IP Rules as described in RFC5378 and RFC8179.


(c) Rosetta APIs discussion (40 mins)

-- Rafael & Thomas introduced the topic of the Rosetta APIs (based on OpenAPI 3.1) as a model that maybe useful for a gateway G1 to interact with its blockchain B1.

-- A standard API (or an abstraction) for the back-facing interaction (G1 to B1, and G2 to B2) is needed for the Crash Recovery model.

-- In the Crash Recovery model, the gateway G2 must keep a log of the Lock Evidence Message from G2, and gateway G1 must keep a log of the Lock Evidence Response Message/Receipt from G2.

-- Luke and Martin have already studied the Rosetta model, but found that there is insufficient information obtainable from its Data API.

-- John mentioned that there numerous private blockchains out there, so it may be difficult to develop an API Abstraction that will satisfy all these blockchains.

-- Denis mentioned that we could perhaps identify the data-items that is needed by G1 from the ledger of B1 for the Lock Evidence Message. These data-items would be the minimal information that must be extracted from the ledger and be used for the Lock Evidence Message. So perhaps a JSON template (for these minimal data-items) could be developed, and for each blockchain a mapping be performed based on the template.

-- Martin & Luke mentioned that a Smart Contract could be defined (abstractly) to perform the Lock on the asset (signal the lock), writing the data-items on the ledger of the blockchain.

-- Thomas suggested that we could perhaps focus on the top 2 or 3 blockchains being used today in private deployments (e.g. Fabric, Corda).  The gateway model is intended to front Legacy systems and even monolithic databases. So it should also work for Corda.

-- Action: group will continue considering this problem.


(d) Gateway Discoverability discussion (10 mins)

-- Shiping gave a brief review on the very early look on blockchain discovery and gateway discoverability.

-- The preferred model is a simple one, re-using as much existing infrastructure as possible (e.g. DNS).

-- The IETF has a number of RFCs dealing with placing keys or certificates in DNS/DNSSEC records (e.g. RFC4034; RFC4035; RFC5702; RFC8624).

-- We will continue this thread at the next meeting.


(e) Next meeting is April 13th (Asia-Pacific timezone).


-----------------------------------------