Re: [Cbor] Deterministic CBOR as a possible DISPATCH item

Christopher Allen <christophera@lifewithalacrity.com> Sun, 05 March 2023 22:43 UTC

Return-Path: <christophera@lifewithalacrity.com>
X-Original-To: cbor@ietfa.amsl.com
Delivered-To: cbor@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B9C4C14F72F for <cbor@ietfa.amsl.com>; Sun, 5 Mar 2023 14:43:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level:
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lifewithalacrity-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y-RgpfQlcmgT for <cbor@ietfa.amsl.com>; Sun, 5 Mar 2023 14:43:21 -0800 (PST)
Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47C4BC14F721 for <cbor@ietf.org>; Sun, 5 Mar 2023 14:43:21 -0800 (PST)
Received: by mail-ed1-x533.google.com with SMTP id s11so31368767edy.8 for <cbor@ietf.org>; Sun, 05 Mar 2023 14:43:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lifewithalacrity-com.20210112.gappssmtp.com; s=20210112; t=1678056199; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Az9URLj9L7mW8BGQ/4snzuuOCdKSZC9aU+8nYSPK/hU=; b=PK6n/JmMsCj5gXlgK9rLwvmdE6VPlmn6xKIHyQYrnx/Fg0Gc+pKvPClqglt3pehv8h Pwk4xzSh2V0uqo6GUf2wlyimnY885OMQPWs5OIqJ6J38MUqqR6qwIEywgSJsDBnVFvfL 6mxlzsHanR+ycbht5KZqPZX8I8YenYg3YshfaaP2wiZAypo3cauf2/8+g8VHcSAzCQyl m+Lf4zM/eHvQCKIi/SL4PVh5OTsWWkoEKFH+iFWXx/5Emk5h7GHgEx5dYyrs1WX115AU LWQrQbe995E+kkg22+5Wqk0tH5RASiD0hG92HC7AlM002O2uhZUtMoSm8LSotC0I7La5 4ujQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678056199; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Az9URLj9L7mW8BGQ/4snzuuOCdKSZC9aU+8nYSPK/hU=; b=kdTHY6NWx5eSiuHOmgBQEl6Wpwv+hJu4cCwcUIXzH+YPHK70ymLX0J744y35lNP959 l+YpwT+Vif3hXo4h7fAT+pAZP++JcputcVj5Z47rNFK75DkYyiSQB35ulGdbEBOI/5RV jIVYtlHlp8S6xd4JnlbJtNhxAXAjw1Zgo0VR+CNCkRW1FtqGU7JndEGv8hpH8qWbyTZ4 EIWCaqGOCE1i9oK9VyT3lIZjnG+p8YSu58g6T6kPlAfPZ19QPfGxEL1WY++TmUlwv8aW +s4X858Fllz3vu5x5Z8RUTbx/qguX8SvCLpxjAIpvH8FyjARjupy3KiJyKiomtaR5vsm cbUA==
X-Gm-Message-State: AO0yUKWgUf4Ag77Y68Z4OkY/afV2wQHARBUgakCcWHUp6tVadxtqEISC AjxGvU6hwmedKVKMXD69RVJwRMHSftHBdl+HDlstHg==
X-Google-Smtp-Source: AK7set/znYDYtyE1iDk1pLfO96zEr3XbhLglpPCFp4ybJQ37ZKq7w80BBV71Z60hYrrg9MzqASnYeNE+Ya0JzlOnxqE=
X-Received: by 2002:a17:906:4901:b0:8eb:27de:447c with SMTP id b1-20020a170906490100b008eb27de447cmr4091379ejq.13.1678056198929; Sun, 05 Mar 2023 14:43:18 -0800 (PST)
MIME-Version: 1.0
References: <A9CF043D-4FA9-48D4-B953-3BE7AA40D1E0@tzi.org> <D25A0C94-ADAD-4C3D-8669-AA7FE9A6B3C4@wolfmcnally.com> <FA0E2D22-37F4-4C27-B5F5-E841D13EF0CF@tzi.org> <1DA00A88-64DF-48FD-B03E-10B520934DD2@island-resort.com> <3D57170C-61E4-4192-8B5F-120134ADA964@tzi.org>
In-Reply-To: <3D57170C-61E4-4192-8B5F-120134ADA964@tzi.org>
From: Christopher Allen <christophera@lifewithalacrity.com>
Date: Sun, 05 Mar 2023 14:43:08 -0800
Message-ID: <CAAse2dFKuqmceEY7g-Uq201a6V+yLPmMdVRKeTAVE9na5HwQyQ@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Anders Rundgren <anders.rundgren.net@gmail.com>, Laurence Lundblade <lgl@island-resort.com>, Shannon.Appelcline@gmail.com, Wolf McNally <wolf@wolfmcnally.com>, cbor@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a694a705f62ee7f6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/cbor/PQ9bZw8z-xgWV7GOp9SWVIqyjog>
Subject: Re: [Cbor] Deterministic CBOR as a possible DISPATCH item
X-BeenThere: cbor@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Concise Binary Object Representation \(CBOR\)" <cbor.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cbor>, <mailto:cbor-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cbor/>
List-Post: <mailto:cbor@ietf.org>
List-Help: <mailto:cbor-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cbor>, <mailto:cbor-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Mar 2023 22:43:25 -0000

On Sun, Mar 5, 2023 at 12:58 PM Carsten Bormann <cabo@tzi.org> wrote:

> On 2023-03-05, at 21:10, Laurence Lundblade <lgl@island-resort.com> wrote:
> > All that said, I can still see why it might be good to have something
> like dCBOR standardized in a way that 8949 doesn’t. Sometimes it is nice to
> be able to do a binary comparison of two encoded structures.
>
> If you want to do this, you indeed need deterministic encoding.
> (And, as I said, that is quite useful in test scripts.
> So if you don’t need the performance of simple preferred encoding, go
> ahead and make everything deterministic.)


This is exactly why we are require the 4.2 subset of deterministic CBOR.

Our Gordian Envelope supports a Merkle-like hash-tree encoding for complex
data structures (in particular a variety of graph structures) that are
signable in a form that allows for the issuer to elide/redact, or encrypt,
or externally reference data, or offer a proof-of-inclusion form that
offers herd-privacy to multiple subjects in the same hash-tree.

The verifier can verify the signatures even when some the data is missing.
But before accepting the verification still likely need to confirm some of
the data in portions that are elided. This might be from data they received
before, or by decrypting key portions, or out-of-band another way by a
reference. All three of these the payload must be recreated by the verifier
(based on their business requirements) and then confirmed against the
signature.

Thus our requirement for deterministic CBOR. The verifier (not the issuer)
may be storing the data to be confirmed against the signer data. They might
store it locally slightly differently, such as different number forms,
key-pair mapping strategies, and other ambiguity in ordering from the way
the issuer stored it.

We believe that a solution that supports these features will be essential
for modern privacy, as it supports EU and ISO principles for data
minimization, enables Progessive Trust (
https://www.blockchaincommons.com/musings/musings-progressive-trust/)
and Selective
Disclosure (
https://www.blockchaincommons.com/musings/musings-data-minimization/) &
Least Authority architectures, and makes meeting requirements of GDPR and
other privacy standards easier.

Gordian Envelope proves that these features are possible, and we know that
ISO mDOC (used for mobile drivers licenses) is also adding hash-list-based
selective disclosurefor similar reasons that we do (and is using CBOR as
well). We are open to changes to Gordian Envelope, or switch to adopt a
better standard, providing that they can meet our elision privacy
requirements.

Besides our intro article about Gordian Envelope (
https://www.blockchaincommons.com/introduction/Envelope-Intro/) you might
find our docs (and videos) on Elision and Proofs of Inclusion useful:
https://github.com/BlockchainCommons/Gordian/tree/master/Envelope

Our internet-draft is at
https://datatracker.ietf.org/doc/draft-mcnally-envelope/ and we are
planning to update it to -01 this week based on feedback received to date.

We would love to see the CBOR community consider taking this work item up.

In the meantime, what is required to get it added to the list of “related
drafts” section of this CBOR group?

— Christopher Allen