Re: [Cbor] Unusual map labels, dCBOR and interop

Anders Rundgren <anders.rundgren.net@gmail.com> Thu, 28 March 2024 08:23 UTC

Return-Path: <anders.rundgren.net@gmail.com>
X-Original-To: cbor@ietfa.amsl.com
Delivered-To: cbor@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E027C14F69D for <cbor@ietfa.amsl.com>; Thu, 28 Mar 2024 01:23:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vP0vJGIYYVqD for <cbor@ietfa.amsl.com>; Thu, 28 Mar 2024 01:23:22 -0700 (PDT)
Received: from mail-oa1-x30.google.com (mail-oa1-x30.google.com [IPv6:2001:4860:4864:20::30]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8A49C14F69B for <cbor@ietf.org>; Thu, 28 Mar 2024 01:23:22 -0700 (PDT)
Received: by mail-oa1-x30.google.com with SMTP id 586e51a60fabf-221a4f9557dso426187fac.2 for <cbor@ietf.org>; Thu, 28 Mar 2024 01:23:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1711614201; x=1712219001; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=R5yk4QGav06tNUk15pe+qTrth0CFBZWbgq8ZeigDqRs=; b=YcSQdgwr0lKnTQAMDG8K+rVOcq8FTdQL5GKyBXJMJ/i6vtq7ILxzE9XovfCt7bignV EBWstzqFDp9ckyszetNa5se4lTk/w5OuGiEEp0IvukCUsaBMdyFRs8sqVg/jO/943oUA d1OIkV6MEdy6hXekhepTbBmKjoBYtNS/rgNK1dZXwFSTBDRLzDkYVo9IpmbcP6XLsBtT SPaTTW7mfWsZbeH4eUU5l6uzX6EZrwbWny5DUCqX6dC+vHA0B7AO6VmG/ec1kYc7RKCo HEya57qBiZrYlT6dNEGIKHg3xx9PGmcjbFVcGKQEvdIGjLOFObnFziaebYXxnTxbIIhZ LI7g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711614201; x=1712219001; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=R5yk4QGav06tNUk15pe+qTrth0CFBZWbgq8ZeigDqRs=; b=OBRSaeHSLST7vC/EGH49gmwHJXFe2kLnBNO0sKqc3aXh7ejwezf2DNArwVFmau0PWN RHVbTvyK+ssIDpyKYWpKZSurdoJgUkVww2SkEsR+0uJFMeX8GqcYtersg/86MnkGb5FL XSb2coPSX6JxNKonqndaoy0msH9Rp00GQ3ehOCYjREITjMR+bG6PFnjFS7Mv3lUmtr/h zsXdyOhguXfRGZPfG1JnbivY+o8LqYYg4DvVNJI0y9JScYfKP877r9zn6vzfKBi8PA+7 x39AyyQn9J2aPSAMxBIVaHvZqgHg0ElyAK7TMhJFGic9fqft56E3qr3o3kwuYCGEYMzx yBUQ==
X-Gm-Message-State: AOJu0YxG56FVWSM6XyjTLDVJGhkvappt0hHzN/hmVEjy2hKdOaJ1f4SF CXFr9ENj3zAXJ5H3hMhAkwpmReyucqYI2BkSFKFgcT2I++69RH0qmOJmXxDTpQZLdx6wRIw17Sq MByJ0jtXFFzQTosFy1GbIDj334pE=
X-Google-Smtp-Source: AGHT+IF0y0h2vzLbP8e36IA36PPFkWX7hgwPydSdGYOA4mgF4yL7RyRgJy8JuCT8col8Y4MJ2n5sWfn39w0h4fa13DE=
X-Received: by 2002:a05:6871:3401:b0:22a:5629:ac2 with SMTP id nh1-20020a056871340100b0022a56290ac2mr2003420oac.37.1711614201091; Thu, 28 Mar 2024 01:23:21 -0700 (PDT)
MIME-Version: 1.0
References: <8C245824-1990-4616-AB70-FFD4FACB1AE9@island-resort.com> <11E8A8A5-D891-49FF-AF16-697C06F463B3@tzi.org> <9A0CE364-C141-4EBE-9703-292C416D12F5@island-resort.com> <3D62C4F0-D570-4EE4-AF6A-163C708AA6BE@tzi.org> <58BA8F8C-0C63-4534-9BF7-255C32D02C16@island-resort.com> <CAN8C-_KCLv_cAt-0-C_=i6DXjZFkgkmgZ8DNq48RcxcvV+jEUQ@mail.gmail.com> <437a375c-49e8-4406-a192-acb9a5e7bf31@gmail.com> <9272C2ED-432D-4D6D-AB64-38976F9297D5@wolfmcnally.com> <794fae9f-1c87-498b-aaea-4e476b0dc420@gmail.com> <C24BFA9D-D19C-4267-B0C8-54842B124452@wolfmcnally.com> <03144212-69bd-441e-8697-fdf1fd9f9689@gmail.com> <B53F373E-4997-4654-AB56-7719EF0ADD99@wolfmcnally.com>
In-Reply-To: <B53F373E-4997-4654-AB56-7719EF0ADD99@wolfmcnally.com>
From: Anders Rundgren <anders.rundgren.net@gmail.com>
Date: Thu, 28 Mar 2024 09:23:10 +0100
Message-ID: <CADEL5zt=CHZPpksVm8Qwo3NY0VTStbpSFPgfDbDMN8RgjVrJwQ@mail.gmail.com>
To: Wolf McNally <wolf@wolfmcnally.com>
Cc: CBOR <cbor@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000072dfd40614b43cca"
Archived-At: <https://mailarchive.ietf.org/arch/msg/cbor/dmI2uB-umke8MCjOWRmvGRfnFog>
Subject: Re: [Cbor] Unusual map labels, dCBOR and interop
X-BeenThere: cbor@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Concise Binary Object Representation \(CBOR\)" <cbor.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cbor>, <mailto:cbor-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cbor/>
List-Post: <mailto:cbor@ietf.org>
List-Help: <mailto:cbor-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cbor>, <mailto:cbor-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Mar 2024 08:23:27 -0000

On Thu, Mar 28, 2024, 08:00 Wolf McNally <wolf@wolfmcnally.com> wrote:

> Anders,
>
> On Mar 27, 2024, at 11:23 PM, Anders Rundgren <
> anders.rundgren.net@gmail.com> wrote:
>
> Wolf, we are in full agreement!  However, CSF (CBOR Signature Format) does
> pretty much the same things modulo "elision" as Gordian Envelopes, builds
> on CDE:
> https://test.webpki.org/csf-lab/home
>
>
> It is a mis-characterization of Gordian Envelope to compare it to a
> “signature format” even “modulo elision". Envelope is a hierarchical binary
> document format built on dCBOR, that in its simplest form (as described
> in the I-D) supports elision (useful enough in and of itself), and in
> that simplest form actually has no specified way of handling signatures at
> all.
>
> But Envelope also has various optional extensions (with reference
> implementations), many of which benefit from or rely on determinism, that
> support:
>
> - Full or partial signing (embedded or detached)
> - Holder-initiated elision (without invalidating signatures)
> - Arbitrarily deep metadata based on recursive semantic structures
> - Full or partial symmetric encryption (without invalidating signatures)
> - Full or partial public key encryption (without invalidating signatures)
> - Sharding using Shamir’s Secret Sharing (distributed/social backup)
> - Digest decorrelation
> - Inclusion proofs (progressive disclosure, herd privacy)
> - Sealed transaction protocols
> - Compression (without invalidating signatures)
> - Diffing and merging
>
> I suppose in a way I should thank you for your persistent
> mis-characterizations, because in doing so you give me the opportunity to
> introduce this technology to newcomers to the list.
>
> https://www.blockchaincommons.com/introduction/Envelope-Intro/
>

All of this is fine, but none of this is in conflict with CDE.

Anders

>
> ~ Wolf
>