Re: [Blockchain-interop] New Version Notification for draft-chen-dlt-gateway-identification-00.txt

"Chen, Shiping (Data61, Eveleigh)" <Shiping.Chen@data61.csiro.au> Sat, 19 June 2021 01:45 UTC

Return-Path: <prvs=797d71232=Shiping.Chen@data61.csiro.au>
X-Original-To: blockchain-interop@ietfa.amsl.com
Delivered-To: blockchain-interop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A13BE3A1B25 for <blockchain-interop@ietfa.amsl.com>; Fri, 18 Jun 2021 18:45:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=data61.csiro.au header.b=ghHuGWnj; dkim=pass (1024-bit key) header.d=csiroau.onmicrosoft.com header.b=gOkXYgV1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xVPe4gIvPnOA for <blockchain-interop@ietfa.amsl.com>; Fri, 18 Jun 2021 18:45:35 -0700 (PDT)
Received: from act-MTAout6.csiro.au (act-mtaout6.csiro.au [IPv6:2405:b000:e00:257::7:43]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA7443A1B1F for <blockchain-interop@ietf.org>; Fri, 18 Jun 2021 18:45:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=data61.csiro.au; i=@data61.csiro.au; q=dns/txt; s=dkim; t=1624067136; x=1655603136; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=IPQl06eudZzEkUkKBu8uj47vBLW4KWGGQzcgtjBENX4=; b=ghHuGWnjd5HTQ6+TH8QQ3o3n0IJTSh2apwYT5dBEMX0ydPYCN7AgJiHB 0DNFmeA5cXJgA/XLbS7I7FpzNgWYDuegSeTfxeLF331miTTAfRXll3+IT hQWh0fJiYkffMwBUsrbrMv3eVE9FUgTcJSgxLmYxbCOgEQ1kE/8wDNgOr E=;
IronPort-SDR: lx4lD9V23BfoXIawTPrmvcmfTItVmxu0b2zLtU1/Klr1c6dV5iTGsUF8dLqbzeKvIMJecNU54U fShBCiv5Pz0A==
X-SBRS: 5.1
IronPort-PHdr: A9a23:9W9YUx8z9eul8f9uWM3oyV9kXcBvk7nxNxQerJsql7wIdb6srNzuP03asPNqilKBHYDW8OlNhOeetaf8EXcB7pCMvDFnEtRMWhYJhN9Qk1kmB8iIWkH+JeThKS03AMoEU0VqrDm3NEFPE5P4YFvf6nS58T8VHED5Mgx4Q4a9GoPbg8mtke6o/JiGbwxUjWTkJ7hpLQ+x6wzM5aEr
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IPAS-Result: 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
Received: from exch1-cdc.nexus.csiro.au ([IPv6:2405:b000:601:13::247:31]) by act-ironport-int.csiro.au with ESMTP/TLS/ECDHE-RSA-AES256-SHA384; 19 Jun 2021 11:45:29 +1000
Received: from exch4-cdc.nexus.csiro.au (2405:b000:601:13::247:34) by exch1-cdc.nexus.csiro.au (2405:b000:601:13::247:31) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 19 Jun 2021 11:45:27 +1000
Received: from ExEdge1.csiro.au (150.229.7.34) by exch4-cdc.nexus.csiro.au (152.83.247.34) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sat, 19 Jun 2021 11:45:28 +1000
Received: from AUS01-ME3-obe.outbound.protection.outlook.com (104.47.71.236) by ExEdge1.csiro.au (150.229.7.34) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 19 Jun 2021 11:45:21 +1000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GakDbEehNLcIq1u04nFlfMTMf8K85g3krdJtotGzexwBpZldZQEcuvMw6o1ipMa00n5u16Lxllgrv0Uo7oe+dLOpKbUI1E5AEdP5f8Uwe5MKiPsyJQ5+ej6xtq1XC+IfoijUruXvF0BefMbOs/zuHXA1nqY8CKC7+OXdZtUcho2QwgkU6de/Ai+pOsuetzTQnVyQ9F0P3VKL82cnmUSaSEeikY1HA/BUufQLrps1QoxLrxEklYtyWg4jXIg7vKwUPpf+cSwQtR2rU3lmGXfqEdKYYXPluM/tjy1P/wPBZ2kEsgUwzuuaN6rVbg7Cd3HhWJRXoWvQufYlzxY8ypPd1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IPQl06eudZzEkUkKBu8uj47vBLW4KWGGQzcgtjBENX4=; b=cjD8RPJct50Guc7JcaqCK/YoLymwqUY5J52gQmBNEv6ENso8pyAuCJZxGPP5BS0Va6Qakn7koh4X5sGhVtvuXyxMAUzt45c1/57djMIE9KWqbhVNTY/fhSJHlxE6C5KWWZ3hLWiHoFIwZHPMqcFPCS78Coxb5AF/PtlqGaAQnPvQIsHgaoifqf/7Exl/Svh0L9ie54m8u/t1hlbvcH1aMSa+d9ZsCAm/EzI7SYw9UwwxnTQZeBMbXIyF+38nXa9feUlqluNcjq0L14fqOnUi4Aw+5HUDYKOChwR0Ad5F+sHGa2KIyee5yFerSjKjSIDkjWDGjKCByGghRRUe7hJkjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=data61.csiro.au; dmarc=pass action=none header.from=data61.csiro.au; dkim=pass header.d=data61.csiro.au; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CSIROAU.onmicrosoft.com; s=selector1-CSIROAU-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IPQl06eudZzEkUkKBu8uj47vBLW4KWGGQzcgtjBENX4=; b=gOkXYgV1jSnz1Vf+wzCIqnGcXVZrQSJBGP9PevEmvX5QzNsQSCj8f8579acKU6RdZlG4v30rSTGC8b1nyngrBElR2gKoHU1j78F5C2rwQ0BL5+6aeL0mzLpNp11Yv7Q6ol4+4sKIt3fSNYFXLeSAE+LgQeUEQRbQ1nggQC2nV4c=
Received: from SYBPR01MB3961.ausprd01.prod.outlook.com (2603:10c6:10:2f::16) by SYCPR01MB4189.ausprd01.prod.outlook.com (2603:10c6:10:48::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.21; Sat, 19 Jun 2021 01:45:25 +0000
Received: from SYBPR01MB3961.ausprd01.prod.outlook.com ([fe80::5d1c:cd38:74b4:b153]) by SYBPR01MB3961.ausprd01.prod.outlook.com ([fe80::5d1c:cd38:74b4:b153%6]) with mapi id 15.20.4242.022; Sat, 19 Jun 2021 01:45:25 +0000
From: "Chen, Shiping (Data61, Eveleigh)" <Shiping.Chen@data61.csiro.au>
To: Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org>, "blockchain-interop@ietf.org" <blockchain-interop@ietf.org>
CC: Thomas Hardjono <hardjono@mit.edu>
Thread-Topic: [Blockchain-interop] New Version Notification for draft-chen-dlt-gateway-identification-00.txt
Thread-Index: AQHXW6xhb/+hPkyji0SuHcLcG0DWLasIoikAgABab4CAABOqAIAQnXOAgADsEAA=
Date: Sat, 19 Jun 2021 01:45:25 +0000
Message-ID: <SYBPR01MB396122940D04B99DF5272027D10C9@SYBPR01MB3961.ausprd01.prod.outlook.com>
References: <162307738614.18121.4904884207348330572@ietfa.amsl.com> <679028cde6fd44768c4e1bbba003e705@oc11expo23.exchange.mit.edu>, <BYAPR13MB2582854CF1C847F5A3BF3C49D0389@BYAPR13MB2582.namprd13.prod.outlook.com> <b9ee603fe5b1493f80e0b487a5233306@oc11expo23.exchange.mit.edu> <a578f6f5b4e56fb253c45d7f02d4adef@tecnico.ulisboa.pt>
In-Reply-To: <a578f6f5b4e56fb253c45d7f02d4adef@tecnico.ulisboa.pt>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=data61.csiro.au;
x-originating-ip: [2405:b000:600:b0::1182]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: afd5cb0d-b513-4f81-c971-08d932c3e8a2
x-ms-traffictypediagnostic: SYCPR01MB4189:
x-microsoft-antispam-prvs: <SYCPR01MB4189FF1295D1F4F8A14047F9D10C9@SYCPR01MB4189.ausprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SYBPR01MB3961.ausprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(346002)(366004)(39840400004)(136003)(396003)(4326008)(110136005)(76116006)(71200400001)(66946007)(966005)(66574015)(186003)(316002)(66476007)(64756008)(66446008)(66556008)(53546011)(6506007)(33656002)(7696005)(8676002)(15650500001)(8936002)(45080400002)(52536014)(38100700002)(2906002)(9686003)(55016002)(166002)(478600001)(122000001)(83380400001)(5660300002)(86362001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: rzoVVVDVEjqkOncF+teUvNQ+dd+uLVCa6bSNsAEO9zgURotvkxoc2ZUlSkC161vb9yDUhpCRp6VLcWIx4G1M7+cdN6GrGmS6/inYhytVYdBxnciT+5Y0U8YxVCcmDtb6dibY1rgBhGjJ78SW3Ix9MY8ReczE4LSO8bmaFhSVkkbLakQoKImxC6EghGlUxNNyBr0NMpmci0uOjnSbRbVk8pHWE+goi9qmGOkaV4Z5jUKXZm3p0lj6Pm6z4rPs33U/FJWgUq5EncZmSEpgx59n1ju3kthgvj9poG1O8Nu1s5lzHqK2IEpbT3+z7mZQLVcQUT5N9Ng7uqzKQ2noykFq5CIwcF+ioiRAjCsGpcUl6/BcqKdicGgm5Nxap+ksHFcvhR4AuFws6yW2Xh6DLK8BTEJgiGd44LchD4LxgmV3H6Q+gVSNt2qBbMORewVixkteFReSktCME0lVxAewGcskPRZkfNT+ZN73v75FxB5WEjlcZbeYLNAnTR4Nax7wYQ1YbsbhO2YzKf4CW5dj6EdRYyoFoW3rWhehX9vuNeMlCUfY2l1aNVgL0J/Kk/x2w53+K8Z9lZ2xfg8GKIYQMoBeIAsnFNoko5UpFPloZZVX+JtMxzb2v9dMYTF0RHYtrcGqM/XFX27dqaxT80kLEx2lO5kNGdAa/+Rvb5lmWLsw6Coc2c+E4BSje1tOhVT2O1niRrCOmjztBoQ1XOO5R99mGazaDUfSglKilDraGrKkgJ8XxHhWCkh1sQB6mLm6K8YbqXS4ToNJqSS5yiKrygNIaq46zGQUYf4LDI5ENyj6ctQTqpM1ocNz/mtgij6iuiTIrTRpzO9UmsGng4bvuB+inz771a5k+94RmDd3HbXuN8HfsZUrtCalrUsCNA1osjL5pQD86Sm+vzUR5Bfy5rN4gEWGCwI79GWrHpNIyq0y7xS8S2VaXDCLS9w0kfvXmrc+/Kq4ZF/AqNiJ8vR+CRVWNiJwD4SH51Mb+peeM2p3sdak5RgoYhODI14LZEqmlHyGXFZoSM1llOiXdc+a25mYUpuWo3pIvArvtsS3GzAdCWMo1zThe92DKgJ+3fOb6vDQeCN9mWUW4WvIdW+CllmbiC7PTr2T29lzF9x5hmcLUi+a2pPOlVCwbsDrW9myJs8+F9+/zxHSk08JwrIofT+SkfMPMU2v2jRZf15khFSZVxB56znMDgTlJxjB4SVCEgsTN0kpGEow1qoJbH+Rk4+Zex85Mwxf8zdZtIKxlEG0pcFTneCVIfxH6lmHJTV6wv+lB8dPz1uIpTu2IZ90+I6ytxEES59PbgI1+fk4WNWbmSUfDiNnxcD5J4+xa6qisL2fEHvrsDz5yZbkUlbY3PoVtg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_SYBPR01MB396122940D04B99DF5272027D10C9SYBPR01MB3961ausp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SYBPR01MB3961.ausprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: afd5cb0d-b513-4f81-c971-08d932c3e8a2
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jun 2021 01:45:25.1460 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fe05593-19ac-4f98-adbf-0375fce7f160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Fl7K2K2d4G0XmIsE1PtEHuWvEWdM4knBnVf/bm1GG1xXt+oOOVKGQuqrYtgWE3di
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SYCPR01MB4189
X-OriginatorOrg: data61.csiro.au
Archived-At: <https://mailarchive.ietf.org/arch/msg/blockchain-interop/xnzc8-puoX2TClvUXMOeOI1O_pY>
Subject: Re: [Blockchain-interop] New Version Notification for draft-chen-dlt-gateway-identification-00.txt
X-BeenThere: blockchain-interop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Blockchain Gateway Interoperability Protocol <blockchain-interop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/blockchain-interop/>
List-Post: <mailto:blockchain-interop@ietf.org>
List-Help: <mailto:blockchain-interop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/blockchain-interop>, <mailto:blockchain-interop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Jun 2021 01:45:42 -0000

Thank Rafael for your comments.



Here are my 2-cents thoughts on your comments, also called comments on comments 😊



>isn't this still on the network layer, since it is relative to the participation on a DLN?



Yes, more preciously it is to bind a DLN to a specific blockchain gateway service/application operated by a specific BGSP.



>It looks like this corresponds to ODAP's first phase, on the gateway verification. Are we performing this on discovery + ODAP?



Except for the offline interactions, all the real-time interactions can be implemented/incorporated into ODAP's phase 1, I guess.



>I think we should add that gateways may not be DLN nodes but rather software components that connect to DLN nodes (e.g., Hyperledger Cactus ODAP plugin using a Fabric Connector).



It is subject to the value of the gateway service business and the corresponding trust requirement.

We can leave it to the BGSP to negotiate each other and configure their gateways as they agree.



>Essentially the verification comes up to trust a centralized party?

>The problem of verifying if a software component is indeed a gateway is deferred to those BGSPs, correct?



Yes, the same answer as the above, i.e. let markets/BGSPs decide which centralized certification party they trust, and what (network/hardware/software) level of certifications required for them to establish their business trust.







Cheers

-

Shiping





-----Original Message-----
From: Blockchain-interop <blockchain-interop-bounces@ietf.org> On Behalf Of Rafael Belchior
Sent: Friday, 18 June 2021 9:10 PM
To: blockchain-interop@ietf.org
Subject: Re: [Blockchain-interop] New Version Notification for draft-chen-dlt-gateway-identification-00.txt



Hello All,



Shipping, Thomas, thanks a lot for putting this together.



A few comments:



" (a) Application layer: At the application layer a gateway

    identification scheme is needed that permits an organization who

    participate in a given DLN to declare (advertise) one or more

    gateways into that DLN.  This permits organizations to establish

    peering agreements (contracts) based on the asset type, DLN and

    jurisdictions, identifying (specifying) the gateways that will be "



isn't this still on the network layer, since it is relative to the participation on a DLN?



On 4.1:

"  (iii) asset type transferability: verification that a remote gateway

    for a destination DLN is mechanically capable to receive the type of

    asset and that legally permitted to receive the type of asset.

"



It looks like this corresponds to ODAP's first phase, on the gateway verification. Are we performing this on discovery + ODAP?



On "Depending on the specific technical

    constraints of a given DLN (e.g. consensus model), not every node

    within the DLN may be designated to be a gateway capable of

    participating in an asset transfer between two DLNs.  As such, the

    service provider must nominate its nodes or systems specifically as

    gateways"



I think we should add that gateways may not be DLN nodes but rather software components that connect to DLN nodes (e.g., Hyperledger Cactus ODAP plugin using a Fabric Connector).



"   To ensure the safety of the transferred digital assets, blockchain

    gateway service providers (BGSP) must be trustworthy to clients who

    use the services.  As a result, they must meet a high standard to

    ensure security and trust at different levels, ranging from business

    to networking, from hardware device to software protocol.

"



Essentially the verification comes up to trust a centralized party?

The problem of verifying if a software component is indeed a gateway is deferred to those BGSPs, correct?





Cheers,









A 2021-06-07 22:26, Thomas Hardjono escreveu:

> Thanks Mike,

>

> RPKI is an good possibility, such as for cases when not all the

> Gateways (i.e. their IP addresses) are immediately visible from

> outside the network.

>

> Its certainly an easy way for an asset service provider (i.e. VASP) to

> declare ownership of a set of IP addresses for the gateways it owns.

>

>

> Best

>

> --thomas

>

> ________________________________________

> From: Michael McBride [mmcbride@futurewei.com]

> Sent: Monday, June 7, 2021 4:16 PM

> To: Thomas Hardjono; blockchain-interop@ietf.org<mailto:blockchain-interop@ietf.org>

> Subject: RE: New Version Notification for

> draft-chen-dlt-gateway-identification-00.txt

>

> Looks good Thomas.

>

> Since an AS/BGP will be required between gateways (correct? Or only

> when a BGSP is involved?) we can also leverage RPKI to help ensure the

> route being announced between gateways is coming from the legitimate

> route (and subsequent data) owner.

>

> mike

>

> -----Original Message-----

> From: Blockchain-interop <blockchain-interop-bounces@ietf.org<mailto:blockchain-interop-bounces@ietf.org>> On

> Behalf Of Thomas Hardjono

> Sent: Monday, June 07, 2021 7:53 AM

> To: blockchain-interop@ietf.org<mailto:blockchain-interop@ietf.org>

> Subject: [Blockchain-interop] FW: New Version Notification for

> draft-chen-dlt-gateway-identification-00.txt

>

>

> Folks,

>

> Here is a first-cut rough draft of the Gateway Identification &

> Discovery work.

>

> A couple of the diagrams are still missing, but will be added in the

> next revision.

>

> Best

>

>

> Shiping & Thomas

>

> ________________________________________

> From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> [internet-drafts@ietf.org]

> Sent: Monday, June 7, 2021 10:49 AM

> To: Shiping Chen; Thomas Hardjono

> Subject: New Version Notification for

> draft-chen-dlt-gateway-identification-00.txt

>

> A new version of I-D, draft-chen-dlt-gateway-identification-00.txt

> has been successfully submitted by Thomas Hardjono and posted to the

> IETF repository.

>

> Name:           draft-chen-dlt-gateway-identification

> Revision:       00

> Title:          Gateway Identification and Discovery for Decentralized

> Ledger Networks

> Document date:  2021-06-08

> Group:          Individual Submission

> Pages:          13

> URL:

> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-chen-dlt-gateway-identification-00.txt&amp;data=04%7C01%7Cmmcbride%40futurewei.com%7Cbd91c83d605b4c3881d508d929c3f4cb%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637586743887921613%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=0iyS9OXfeZzlemwyS2zq01YbrCsj1Y3Rtn7T8LapusM%3D&amp;reserved=0

> Status:

> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-chen-dlt-gateway-identification%2F&amp;data=04%7C01%7Cmmcbride%40futurewei.com%7Cbd91c83d605b4c3881d508d929c3f4cb%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637586743887921613%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=nmHNbDjw1CBAfpLzgNfRVRwOudemR7gjA5mcpDr6q28%3D&amp;reserved=0

> Htmlized:

> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-chen-dlt-gateway-identification&amp;data=04%7C01%7Cmmcbride%40futurewei.com%7Cbd91c83d605b4c3881d508d929c3f4cb%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637586743887921613%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=1TxVwx0D6gMJJrfwtYydVD1YQJEenGVL%2BFe9%2F2Ytc7M%3D&amp;reserved=0

>

>

> Abstract:

>    Today there is a growth in the number of blockchain and

> decentralized

>    ledger networks (DLN) around the world, and interoperability across

>    different networks represents a challenge for the value proposition

>    of these networks.

>

>    One approach for blockchain interoperability to be achieved is to

>    employ gateways that permit assets to flow across the relevant

>    networks of blockchains.

>

>    However, a core requirement for interoperability is the correct

>    identification of computer systems that act as gateways and the

>    correct validation of the ownership of the gateway.  A secondary

>    requirement is for a gateway to inquire as to the existence of an

>    entity address (public key) within a given decentralized ledger

>    network.

>

>    This memo discusses options with regards gateway identification and

>    verification strategies.  It looks at addressing the problem from

> the

>    application layer and from the network layer.  It also discusses

>    other options, such as relying on a third-party

> blockchain-registered

>    identifiers and resolver services

>

>

>

>

> The IETF Secretariat

>

>

> --

> Blockchain-interop mailing list

> Blockchain-interop@ietf.org<mailto:Blockchain-interop@ietf.org>

> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fblockchain-interop&amp;data=04%7C01%7Cmmcbride%40futurewei.com%7Cbd91c83d605b4c3881d508d929c3f4cb%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637586743887921613%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=6FtJXXNd0WfgssWVR%2F3Dc2nCXLiSUjgyo3rKeXCLvqc%3D&amp;reserved=0



--

-- Rafael Belchior



Ph.D. student in Computer Science and Engineering, Blockchain - Técnico

Lisboa

https://rafaelapb.github.io/

https://www.linkedin.com/in/rafaelpbelchior/



--

Blockchain-interop mailing list

Blockchain-interop@ietf.org<mailto:Blockchain-interop@ietf.org>

https://www.ietf.org/mailman/listinfo/blockchain-interop