Re: [Cbor] Deterministic CBOR as a possible DISPATCH item
Christopher Allen <christophera@lifewithalacrity.com> Sun, 05 March 2023 22:43 UTC
Return-Path: <christophera@lifewithalacrity.com>
X-Original-To: cbor@ietfa.amsl.com
Delivered-To: cbor@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B9C4C14F72F for <cbor@ietfa.amsl.com>; Sun, 5 Mar 2023 14:43:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level:
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lifewithalacrity-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y-RgpfQlcmgT for <cbor@ietfa.amsl.com>; Sun, 5 Mar 2023 14:43:21 -0800 (PST)
Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47C4BC14F721 for <cbor@ietf.org>; Sun, 5 Mar 2023 14:43:21 -0800 (PST)
Received: by mail-ed1-x533.google.com with SMTP id s11so31368767edy.8 for <cbor@ietf.org>; Sun, 05 Mar 2023 14:43:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lifewithalacrity-com.20210112.gappssmtp.com; s=20210112; t=1678056199; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Az9URLj9L7mW8BGQ/4snzuuOCdKSZC9aU+8nYSPK/hU=; b=PK6n/JmMsCj5gXlgK9rLwvmdE6VPlmn6xKIHyQYrnx/Fg0Gc+pKvPClqglt3pehv8h Pwk4xzSh2V0uqo6GUf2wlyimnY885OMQPWs5OIqJ6J38MUqqR6qwIEywgSJsDBnVFvfL 6mxlzsHanR+ycbht5KZqPZX8I8YenYg3YshfaaP2wiZAypo3cauf2/8+g8VHcSAzCQyl m+Lf4zM/eHvQCKIi/SL4PVh5OTsWWkoEKFH+iFWXx/5Emk5h7GHgEx5dYyrs1WX115AU LWQrQbe995E+kkg22+5Wqk0tH5RASiD0hG92HC7AlM002O2uhZUtMoSm8LSotC0I7La5 4ujQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678056199; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Az9URLj9L7mW8BGQ/4snzuuOCdKSZC9aU+8nYSPK/hU=; b=kdTHY6NWx5eSiuHOmgBQEl6Wpwv+hJu4cCwcUIXzH+YPHK70ymLX0J744y35lNP959 l+YpwT+Vif3hXo4h7fAT+pAZP++JcputcVj5Z47rNFK75DkYyiSQB35ulGdbEBOI/5RV jIVYtlHlp8S6xd4JnlbJtNhxAXAjw1Zgo0VR+CNCkRW1FtqGU7JndEGv8hpH8qWbyTZ4 EIWCaqGOCE1i9oK9VyT3lIZjnG+p8YSu58g6T6kPlAfPZ19QPfGxEL1WY++TmUlwv8aW +s4X858Fllz3vu5x5Z8RUTbx/qguX8SvCLpxjAIpvH8FyjARjupy3KiJyKiomtaR5vsm cbUA==
X-Gm-Message-State: AO0yUKWgUf4Ag77Y68Z4OkY/afV2wQHARBUgakCcWHUp6tVadxtqEISC AjxGvU6hwmedKVKMXD69RVJwRMHSftHBdl+HDlstHg==
X-Google-Smtp-Source: AK7set/znYDYtyE1iDk1pLfO96zEr3XbhLglpPCFp4ybJQ37ZKq7w80BBV71Z60hYrrg9MzqASnYeNE+Ya0JzlOnxqE=
X-Received: by 2002:a17:906:4901:b0:8eb:27de:447c with SMTP id b1-20020a170906490100b008eb27de447cmr4091379ejq.13.1678056198929; Sun, 05 Mar 2023 14:43:18 -0800 (PST)
MIME-Version: 1.0
References: <A9CF043D-4FA9-48D4-B953-3BE7AA40D1E0@tzi.org> <D25A0C94-ADAD-4C3D-8669-AA7FE9A6B3C4@wolfmcnally.com> <FA0E2D22-37F4-4C27-B5F5-E841D13EF0CF@tzi.org> <1DA00A88-64DF-48FD-B03E-10B520934DD2@island-resort.com> <3D57170C-61E4-4192-8B5F-120134ADA964@tzi.org>
In-Reply-To: <3D57170C-61E4-4192-8B5F-120134ADA964@tzi.org>
From: Christopher Allen <christophera@lifewithalacrity.com>
Date: Sun, 05 Mar 2023 14:43:08 -0800
Message-ID: <CAAse2dFKuqmceEY7g-Uq201a6V+yLPmMdVRKeTAVE9na5HwQyQ@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Anders Rundgren <anders.rundgren.net@gmail.com>, Laurence Lundblade <lgl@island-resort.com>, Shannon.Appelcline@gmail.com, Wolf McNally <wolf@wolfmcnally.com>, cbor@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a694a705f62ee7f6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/cbor/PQ9bZw8z-xgWV7GOp9SWVIqyjog>
Subject: Re: [Cbor] Deterministic CBOR as a possible DISPATCH item
X-BeenThere: cbor@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Concise Binary Object Representation \(CBOR\)" <cbor.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cbor>, <mailto:cbor-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cbor/>
List-Post: <mailto:cbor@ietf.org>
List-Help: <mailto:cbor-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cbor>, <mailto:cbor-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Mar 2023 22:43:25 -0000
On Sun, Mar 5, 2023 at 12:58 PM Carsten Bormann <cabo@tzi.org> wrote: > On 2023-03-05, at 21:10, Laurence Lundblade <lgl@island-resort.com> wrote: > > All that said, I can still see why it might be good to have something > like dCBOR standardized in a way that 8949 doesn’t. Sometimes it is nice to > be able to do a binary comparison of two encoded structures. > > If you want to do this, you indeed need deterministic encoding. > (And, as I said, that is quite useful in test scripts. > So if you don’t need the performance of simple preferred encoding, go > ahead and make everything deterministic.) This is exactly why we are require the 4.2 subset of deterministic CBOR. Our Gordian Envelope supports a Merkle-like hash-tree encoding for complex data structures (in particular a variety of graph structures) that are signable in a form that allows for the issuer to elide/redact, or encrypt, or externally reference data, or offer a proof-of-inclusion form that offers herd-privacy to multiple subjects in the same hash-tree. The verifier can verify the signatures even when some the data is missing. But before accepting the verification still likely need to confirm some of the data in portions that are elided. This might be from data they received before, or by decrypting key portions, or out-of-band another way by a reference. All three of these the payload must be recreated by the verifier (based on their business requirements) and then confirmed against the signature. Thus our requirement for deterministic CBOR. The verifier (not the issuer) may be storing the data to be confirmed against the signer data. They might store it locally slightly differently, such as different number forms, key-pair mapping strategies, and other ambiguity in ordering from the way the issuer stored it. We believe that a solution that supports these features will be essential for modern privacy, as it supports EU and ISO principles for data minimization, enables Progessive Trust ( https://www.blockchaincommons.com/musings/musings-progressive-trust/) and Selective Disclosure ( https://www.blockchaincommons.com/musings/musings-data-minimization/) & Least Authority architectures, and makes meeting requirements of GDPR and other privacy standards easier. Gordian Envelope proves that these features are possible, and we know that ISO mDOC (used for mobile drivers licenses) is also adding hash-list-based selective disclosurefor similar reasons that we do (and is using CBOR as well). We are open to changes to Gordian Envelope, or switch to adopt a better standard, providing that they can meet our elision privacy requirements. Besides our intro article about Gordian Envelope ( https://www.blockchaincommons.com/introduction/Envelope-Intro/) you might find our docs (and videos) on Elision and Proofs of Inclusion useful: https://github.com/BlockchainCommons/Gordian/tree/master/Envelope Our internet-draft is at https://datatracker.ietf.org/doc/draft-mcnally-envelope/ and we are planning to update it to -01 this week based on feedback received to date. We would love to see the CBOR community consider taking this work item up. In the meantime, what is required to get it added to the list of “related drafts” section of this CBOR group? — Christopher Allen
- [Cbor] Deterministic CBOR as a possible DISPATCH … Anders Rundgren
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Anders Rundgren
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Wolf McNally
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Anders Rundgren
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Wolf McNally
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Laurence Lundblade
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Christopher Allen
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Laurence Lundblade
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Christopher Allen
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Carsten Bormann
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Laurence Lundblade
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Laurence Lundblade
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Christopher Allen
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Christopher Allen
- Re: [Cbor] Deterministic CBOR as a possible DISPA… Laurence Lundblade