Re: [icnrg] This view on web3has some interesting ties to ICN

Dirk Kutscher <ietf@dkutscher.net> Tue, 11 January 2022 09:45 UTC

Return-Path: <ietf@dkutscher.net>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5BE23A20F4 for <icnrg@ietfa.amsl.com>; Tue, 11 Jan 2022 01:45:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.896
X-Spam-Level:
X-Spam-Status: No, score=-6.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5DkA6gvIzELp for <icnrg@ietfa.amsl.com>; Tue, 11 Jan 2022 01:45:45 -0800 (PST)
Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 231E13A20F2 for <icnrg@irtf.org>; Tue, 11 Jan 2022 01:45:44 -0800 (PST)
Received: from [192.168.1.50] ([95.89.114.110]) by mrelayeu.kundenserver.de (mreue011 [212.227.15.167]) with ESMTPSA (Nemesis) id 1MacjC-1mWWK33DEA-00c5mn; Tue, 11 Jan 2022 10:45:21 +0100
From: Dirk Kutscher <ietf@dkutscher.net>
To: "David R. Oran" <daveoran@orandom.net>
Cc: icnrg <icnrg@irtf.org>
Date: Tue, 11 Jan 2022 10:45:19 +0100
X-Mailer: MailMate (1.14r5852)
Message-ID: <88BCFEA9-9FEA-4AB2-A4B8-8718A84F05B9@dkutscher.net>
In-Reply-To: <0BA97ECA-A99D-4594-A8E5-83B02D348539@orandom.net>
References: <FDAFD852-1109-4A49-9840-4C76716A8ECA@orandom.net> <08289530-AE53-4797-923D-2E49B1F7F9D8@dkutscher.net> <0BA97ECA-A99D-4594-A8E5-83B02D348539@orandom.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=_MailMate_8849F86D-6611-4335-BC4A-002610FB9508_="; micalg=sha-256; protocol="application/pkcs7-signature"
X-Provags-ID: V03:K1:V17W1i0UWJKvsQxWEAdPOWQ8+QpZrLviaSt/TLz5gdftF/pDUEy i4fEtDW1CAzuMkmLaCORbwK9t83kQ5LeL9Ks8ZAeTGQPmNces+x6hKvJPOIzsDVklABM7Px RMgeAX8030TqTHqb7FO9ZHKgPaizBPu0yAeSzFBoXxjSYgnZTn2YSrBjXbT7AcwQk37HgaY AHbx7XM7PpdfQrI3prvFQ==
X-UI-Out-Filterresults: notjunk:1;V03:K0:OQAlytvqpEQ=:b9jRbd5hQuaJlpXQIKEZ49 vz7gEsjroLqtjG9Ci19vl2nPuGGOAVeTLWVPi4WzwgJGo9JHDWp7WgHSo61bBNULwWcZoXWhR gIfrkL8tk1tEEk/VjqRgXitRdTCWKjKMa0Z+R2aDcwVzOqsHuNLa6H5/e6AI3Ay3j7wnby3a0 6KN54vqHj+5YwgAzAntGBksZQ08kNhJrxL9xgajHwVj7UH2/T4oqNzcW+nmthSxU4d0CwUIsD QPhGud0OrIdmWHFsqCZNHJOZxmEy5O7TYnjcPgSKithROSxY9cqc9I3H+Cxt9ydOyLZXrfRxH JqDu81B4dw5wQAeWlbL0nh3UT+zF04dUcGm6TPU+rYQY1o6WWWPTvaOMEW+IBbQmBj/nVz3wO l4Pf16gWu2ew9jMkepJKQ8IbjeXpdnDWZRUeCL6OpKZs6QFqZybCHBEGTmgZi9WtRFv4/vJGT a/iCNs24N2PQ5uR+1k23++4aQmoXNaSeyuCBJD0/v0disCjtyllXxco9COo9HtzSASHK3EU7/ dR4Kgau7YTIN5gUNWUU6emxSLHb1lasipbbKRYdZDxG/GvLiWiG2ZRSfd2ze6QA6xfkQsFT3m 9E2EzHv+coIRGaNdpPmoWjd+DcGUe4uJjJJBEBvsWHmLfdSVC//kezqHaj5FamtQ401bBFg1v bTH6mxvv3K0wsqoqHC1E657z8Md8jqvWCgxbelKlfUhCuTnefH7U7XnmvnW+j8H8G18M=
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/BSuuUCn6-P1m4p-7AgSgFrlvq4s>
Subject: Re: [icnrg] This view on web3has some interesting ties to ICN
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2022 09:45:47 -0000

> - I’m increasingly convinced that a first order deterrent to this kind of decentralization is the very small number of entities any individual is able to assess trust in. I suspect it’s somewhere between 5 and 25; not thousands or millions. Sure, I don’t want to be forced to trust just one or two financial institutions, or just my national government bureaucracy, or the small set of Google/Microsoft/Amazon/Alibaba, etc. but how to I navigate assessing a giant number of trust roots? It seems at least superficially that web-of-trust approaches should work swimmingly well here, but we have 30 years of abject failure (e.g. PGP/GPG) in getting these adopted and maintained in practice.

Yes, I agree – we have to move beyond simplistic scenarios or the assumption that simply applying web of trust concepts will save us.

> - If you find the point above modestly convincing, then current proven and reasonably efficient K-out-of-N keying schemes for enabling modestly-sized trusted intermediary sets, and Byzantine fault tolerant agreement protocols for distributed databases seem quite sufficient for all these use cases.
>
> Nice New Year ICN discussion topic, no?

Absolutely. The devil is going to be in the details, e.g., robustness against all kinds of attacks, but I'd love to see more research in this space.

Dirk