Re: [Blockchain-interop] Summary Notes from IETF Blockchain Gateway Interop meeting (13 April 2021)

Luke Riley <luke.riley@quant.network> Wed, 14 April 2021 14:19 UTC

Return-Path: <luke.riley@quant.network>
X-Original-To: blockchain-interop@ietfa.amsl.com
Delivered-To: blockchain-interop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFAFC3A0D0E for <blockchain-interop@ietfa.amsl.com>; Wed, 14 Apr 2021 07:19:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=quant.network
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KymfxOTErufi for <blockchain-interop@ietfa.amsl.com>; Wed, 14 Apr 2021 07:19:52 -0700 (PDT)
Received: from GBR01-LO2-obe.outbound.protection.outlook.com (mail-eopbgr100059.outbound.protection.outlook.com [40.107.10.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEEF73A0D07 for <blockchain-interop@ietf.org>; Wed, 14 Apr 2021 07:19:51 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=n0ykCK2crDW009SDSNQSMeXou42K0PO1Wmle6Wy4BvcAg7T7+pv7ubKMu7e78dX2gLywQHBf8iR8u9o6By+/o/CSdxJ8tolA5OzNA2GF5aKmvz06TcLj1z9bQB2zV5MOSDWmaj1wG6S9MSYF/sziOeQfYneVuZkwMv9wcCiOdFJ7ZY0MGJAoeTgRhBsQkJb3Ag0WdvGQ25I6ogYjO+mMbhZaPxsmqq9ILvXBaeJ+qH/5qkZQcdhmj1e9JJ7OUZ+K4hcycU+hM+n+mkHGhN5aKRLNMTMGDxgiVt1bQP8fKMjXTftlcYZbwklF+vjnw/gm3ACzy1ly3eAGeCCFUUH2Yg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lgk9tnyuhC5vDDeDXe14jWRM1bNWiq2F3sz2jqVG1Ow=; b=SNVDHrbQLz789yMr5wZqLyrtk3q1kHFj2VxWOU/aOMra3Xj7Rp6KiCA7O0WMvksvuIVhliPFGKU5nMcX1DA9lNB6lArVKTRL8Cv9anvuv7+TCBZQF597B1M0kAaQY/mxU3XbmtrHQMvxKfRfjM04TompQofPEvpvEpH+MD3kV97JD1SHJirEHnX2Ut3PVjyfTjJTQHDMDtfBmJV/jypLq0DnBlg5RTf+xE6OgZklwCV/yKRZIDqfvbc6NaB1iHFHHG41QExvj30voopsdxSSxIwbYJsSELfD4WYvwQT2WEpUDTPRrfStAdiCKoJF6MopDQRNU57AOHwsrK2s1egxDA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=quant.network; dmarc=pass action=none header.from=quant.network; dkim=pass header.d=quant.network; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quant.network; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lgk9tnyuhC5vDDeDXe14jWRM1bNWiq2F3sz2jqVG1Ow=; b=RzpvqugS6684ycoiMZcoW7SNDxUq5RIbRe4Vbs/L+bVClxGcaC9CW1QZUKJQBivEQD9skySKOSosdCJ441YJmGakANQZ+C7w3PlswrvdLYEKk2SkVOm7D+2nEXUTnu7LgvHvtPTCMs0codnWa+MImO91Yl98Wzw3G2qGHZ99hC8=
Received: from CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM (2603:10a6:400:135::12) by CWLP123MB4356.GBRP123.PROD.OUTLOOK.COM (2603:10a6:400:d4::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.22; Wed, 14 Apr 2021 14:19:49 +0000
Received: from CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM ([fe80::878:1a97:9468:77e]) by CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM ([fe80::878:1a97:9468:77e%6]) with mapi id 15.20.4020.023; Wed, 14 Apr 2021 14:19:49 +0000
From: Luke Riley <luke.riley@quant.network>
To: Thomas Hardjono <hardjono@mit.edu>, "blockchain-interop@ietf.org" <blockchain-interop@ietf.org>
Thread-Topic: Summary Notes from IETF Blockchain Gateway Interop meeting (13 April 2021)
Thread-Index: AQHXMRYmndjrXSUbk02XhnbgvHmED6q0Cxa8
Date: Wed, 14 Apr 2021 14:19:49 +0000
Message-ID: <CWXP123MB51453676CA21D651B1E556F0874E9@CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM>
References: <59e65dda6fe84241b80da1577310cbcf@oc11expo23.exchange.mit.edu>
In-Reply-To: <59e65dda6fe84241b80da1577310cbcf@oc11expo23.exchange.mit.edu>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=quant.network;
x-originating-ip: [94.64.26.171]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 47e706ee-0910-4e91-b26e-08d8ff505cb8
x-ms-traffictypediagnostic: CWLP123MB4356:
x-microsoft-antispam-prvs: <CWLP123MB435614CF395A33741E6CDB43874E9@CWLP123MB4356.GBRP123.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(136003)(346002)(376002)(366004)(39830400003)(396003)(122000001)(9686003)(186003)(8676002)(76116006)(166002)(7696005)(66946007)(52536014)(6506007)(38100700002)(8936002)(53546011)(83380400001)(316002)(33656002)(478600001)(55016002)(66556008)(64756008)(2906002)(966005)(71200400001)(44832011)(66446008)(86362001)(26005)(5660300002)(110136005)(66574015)(66476007)(19627405001)(46492009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CWXP123MB51453676CA21D651B1E556F0874E9CWXP123MB5145GBRP_"
MIME-Version: 1.0
X-OriginatorOrg: quant.network
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CWXP123MB5145.GBRP123.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 47e706ee-0910-4e91-b26e-08d8ff505cb8
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Apr 2021 14:19:49.0621 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 70500bf4-d417-4259-8a6e-b7a550c6d120
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: C5xaX2l3Qg33u3bH0ue/5Sjy/ivbL74asJ94qN8Gbrum428wjwB6rtnMM16K/REyovQYeGKcBTVJ6GoKzlrjPoNus/Ol8TbieiVuJAHe6YY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CWLP123MB4356
Archived-At: <https://mailarchive.ietf.org/arch/msg/blockchain-interop/lI7iVLEmy2ldSEUcaB4QsifGLwo>
Subject: Re: [Blockchain-interop] Summary Notes from IETF Blockchain Gateway Interop meeting (13 April 2021)
X-BeenThere: blockchain-interop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Blockchain Gateway Interoperability Protocol <blockchain-interop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/blockchain-interop/>
List-Post: <mailto:blockchain-interop@ietf.org>
List-Help: <mailto:blockchain-interop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Apr 2021 14:19:57 -0000

Hi all,

Many thanks Thomas for the notes. I've added a few more comments in red below for extra clarifications.

Regards,

Luke

________________________________
From: Blockchain-interop <blockchain-interop-bounces@ietf.org> on behalf of Thomas Hardjono <hardjono@mit.edu>
Sent: 14 April 2021 14:53
To: blockchain-interop@ietf.org <blockchain-interop@ietf.org>
Subject: [Blockchain-interop] Summary Notes from IETF Blockchain Gateway Interop meeting (13 April 2021)

CAUTION: This email originated from outside of the organisation. Do not click links or open attachments unless you recognise the sender and know the content is safe.


Summary Notes from IETF Blockchain Gateway Interoperability group meeting

Date: Tuesday 13 April, 2021

(a) Attendees

Denis Avrilionis
John Robotham
Luke Riley
Martin Hargreaves
Mizan Chowdhury
Rafael Belchior
Mike McBride
Gilbert Verdian
Thomas Hardjono


(b) IETF Note Well slide

-- This group meeting operates under IETF IP Rules as described in RFC5378 and RFC8179.


(c) Administrative notes:

-- Given that the majority of the regular attendees and draft contributors are based in the Northern Hemisphere, the group may consider having the APAC meetings every 3rd or 4th meeting.


(d) Escrow Types and Interfaces (Luke Riley):

-- Slides from Luke are available on the GitHub repo: https://github.com/CxSci/blockchain-gateway/blob/main/docs/slides/EscrowTypes.pdf

-- The question of escrow relates to several aspects of the asset transfer from the Originator Alice on blockchain/DLT B1 (via gateway G1) to the Beneficiary Bob on blockchain/DLT B2 (via gateway G2).

-- Part of the ODAP protocol is the need for the gateway G1 to temporarily lock or escrow the asset on B1 until either the protocol completes (successful transfer) or fails (escrow reverts back) due to some event (e.g. escrow-time expires, gateway crashes, etc).

-- Luke provided a good overview/discussion regarding the state-machine model for the Lock operation (e.g. issued by G1 on the asset).

-- Therese are summarized as follows:  Lock (Create) establishes the lock; Unlock (Claim) occurs when the recipient claims/retrieves the escrow (e.g. in hash-time lock with secrets); Unlock occurs due to cancellation or abort; Lock-Top-Up when the escrower (i.e. entity who locked the asset) adds additional assets atop the existing locked assets (e.g. in the case of fungible assets).
​---Depending on the escrow type, an escrow can be topped up by a third party (i.e. not the original escrow sender). An example for be a payment channel escrow (in an accounts based DLT).
---The LOCK/UNLOCK sub-verbs may need to be aligned with previous ODAP documentation.

-- The high level categories of escrows can be understood along on three or four dimensions (time based, type of action, permission required). Slide 12 shows a categories-tree, where the leafs indicate the various technical constructs (e.g. multisig) that are available for use today.
​--- Slide 12 placed multi-sig in multiple locations as an example to show the confusion that can arise if you do not think along these multi-dimensional lines when categorising escrow type.
---There are more escrow types than the ones mentioned on those slides, they were just some examples

-- Denis asked if the categories-tree cover both fungible and non-fungible assets. Luke explains that this question has another aspect to it, namely whether the blockchain/DLT is account-based or UTXO-based. The key difference is that in the account-based appraises escrow remains at the same state/location (even though state may change in the balance address), but in the case of UTXO there is a new address/state for the escrow.
​--- I also suggested that NFT escrows could be simpler for escrows as by definition they cannot be topped up in the same way that FT escrows can
--- To clarify, I meant that accounts-based DLT escrows remain at the same state location index even when topped up, as accounts based DLT state is indexed (at a high level) by userId (usually address). Whereas UTXO based DLT escrows will change state location index when topped up as UTXO DLT state is index by UTXOId (TransactionHash+Index) and to top up an UTXO escrow requires it to be spent and another one to be generated.

-- Slide 16 on-wards show a number of attributes that are relevant for the escrow interface. Some of these must be communicated between gateways G1 and G2 during the transfer-setup negotiations (Phase 1). For example, the ExpiryTime value is an important parameter regarding B1 that G1 needs to communicate to G2 (so that G2 can estimate if it will have enough time to finish in the transfer).
​--- Martin suggested to add more params to reflect the categories-tree. E.g. adding permissioned (boolean) and actionRequiredForUnlock (boolean). I will investigate other possibilities

-- Rafael noted that many of these attributes will also be needed for the Log for crash-recovery. For example, if gateway G2 crashes and self-heals then it will need to know these attributes that was provided by G1 in the Phase-1 of the ODAP protocol.
​--- Let me know if/when you want a separate meeting on this Rafeal

-- Rafael also noted the problem of the degree of trust accorded to the smart contracts that implement the escrow/lock. So far we have made the trust assumption that the gateway G1 and G2 are trusted and they they interact over a TLS session.  However, the gateways have no way to know whether a smart contract (in their own respective blockchains/DLTs) is implementing the escrow/lock correctly.  Denis also raises the question pertaining to the possibility that a smart contract may have other side-effects that the gateways are not able to verify.
​--- Unless the smart contract used to escrow the funds for G1 was in fact deployed by G1 and then we are back to the same trust assumptions?

-- Going forward, Thomas suggested that the work Luke is carrying out should be captured in an Informational RFC. An informational document on a "taxonomy of escrows/locks" would be useful for the IETF community broadly, since escrows and locks are very important technical constructs in blockchains/DLTs. Then for the ODAP protocol, an informed choice can be made (based on this taxonomy) for the subset of the escrows/locks to be used by ODAP.
​--- I agreed but suggested it might be good to get more feedback about how the escrow interface works in practice for the crash-recovery mechanism first (i.e. we may find a few more params missing once moving towards implementation integration)

-- The group will continue discussion on the escrow types and interfaces.


(e) Next meeting is Tuesday April 27 (US/UK/EU timezone).

------------------------------------






--
Blockchain-interop mailing list
Blockchain-interop@ietf.org
https://www.ietf.org/mailman/listinfo/blockchain-interop
This message is intended solely for the addressee and may contain privileged and confidential information. If you have received this message in error, please send it back to us, and immediately and permanently delete it. Do not use, copy or disclose the information contained in this message or in any attachment. Quant Network does not guarantee that this email has not been intercepted and amended or that it is virus free.