Re: [Sat] Version -02 of the SATP core protocol draft ---- FW: New Version Notification for draft-hargreaves-sat-core-02.txt

Venkatraman Ramakrishna <vramakr2@in.ibm.com> Tue, 14 March 2023 12:12 UTC

Return-Path: <vramakr2@in.ibm.com>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E01CDC13AE3C for <sat@ietfa.amsl.com>; Tue, 14 Mar 2023 05:12:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ibm.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gMgbjYxX12HP for <sat@ietfa.amsl.com>; Tue, 14 Mar 2023 05:12:51 -0700 (PDT)
Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E979CC13AE2E for <sat@ietf.org>; Tue, 14 Mar 2023 05:12:50 -0700 (PDT)
Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 32EBpDhg021160; Tue, 14 Mar 2023 12:12:47 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version : subject; s=pp1; bh=jt8LL4XwkzoDYs30+zgiRY90zaObugd/gQsj5zja8W4=; b=Jb7WlH4m4UDQVJJdX8cR1FvFIHh72KmLP2wYzWwS9Yky0Tb1Yh6gNgFq604pbIpW2n8g kcS1+Eh6oFNdkpFZ+gnUQHSgNaVMlmPEf1wfv7pC3pfPuQ4zy/QPR/qZFN2ctJ9732yV RhZnpfa78fJjTc/RcLF5jst7dHrQoRHCNWa1Cpm3BfhVinxKxVlJ7fWRbvMinJHERIP4 KaMMalUwJ1ZczBKKZa6WjthPkDTyGZQ/juyMxyyDFAOakoLMX+r7IFfvrbWUB4N9lMn6 tyPr00ktAXycdhn1GYfyx61t8dY0JJZSTH5bHChvkgRYlblNv8dc0yEuK5f2CIKvxDxT +g==
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2169.outbound.protection.outlook.com [104.47.58.169]) by mx0b-001b2d01.pphosted.com (PPS) with ESMTPS id 3papenbxsb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 14 Mar 2023 12:12:47 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Vj5H59z2/8UMU4ZMrde1AcCrKNDpmayGtQY9132zkhkUTFfl1SkszmHRuTnfjyg5oXpaQmlIp9QCAk5rjDslJAHn5XTzUZNUrmF25V7KTrVEnfWTa8FdJGFnBU8Us0aIHL0k29FNsGy6rYNY6IT2cuPhdKE0g37YOYgKPUPGa6RMo78MA8f2inwByDBVEG+j20xrKf8MfQqs3Pwoa7cp8AQ61UMQxGtYEjvcx4NtP7CRL1x7GeOicceYPJGTbLwDXIP0IC/H/dGxvcUudVwlGa5VMNoGNkYmgSBzan3HxYRDWlsw7gQdejBx3ZGmaEst2c9SIXBvstSy7av+3E8Pug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iOIHs7rMgec8TEaL5O5oiyxGQMokGVcYBVF5ybhcO3s=; b=Rnn3Xq289gM530snvkN/1eIT6CvILN1AtWCSiOMRzuoWDvJilFKC7j2s/hcKQX1U4XnAe+ZW7bCwmOR35tvSFoS8XOHPpaHFWWceazH7L4FsDUs173f0Jz6NvdoA4AmQsqTRaRke9VsLBjrNLOFISjn2s/3dQPzT1iJh8E8xysU4LYfTzqG/J+343Vd/gTPHAUhIgZBmLXLzOuMgnpTh8viqbo8HJglBac75MJDAu25dNRUy6TCsChr8XVorPI5js3ZmKGrOjUMSghthe7CkHwl0O00P9erLuCn0sQwIitxQyqEiioZJNwHdFC/xFWSyS6FJNfX4e6HQivjlfJOcbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=in.ibm.com; dmarc=pass action=none header.from=in.ibm.com; dkim=pass header.d=in.ibm.com; arc=none
Received: from BYAPR15MB2277.namprd15.prod.outlook.com (2603:10b6:a02:92::30) by MW5PR15MB5241.namprd15.prod.outlook.com (2603:10b6:303:19e::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.20; Tue, 14 Mar 2023 12:12:45 +0000
Received: from BYAPR15MB2277.namprd15.prod.outlook.com ([fe80::4e24:17a0:3cef:948f]) by BYAPR15MB2277.namprd15.prod.outlook.com ([fe80::4e24:17a0:3cef:948f%4]) with mapi id 15.20.6178.024; Tue, 14 Mar 2023 12:12:44 +0000
From: Venkatraman Ramakrishna <vramakr2@in.ibm.com>
To: Denis Avrilionis <denis@compell.io>, Thomas Hardjono <hardjono@mit.edu>
CC: "sat@ietf.org" <sat@ietf.org>, Martin Hargreaves <martin.hargreaves@quant.network>, Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>, Claire Facer <Claire.Facer@quant.network>, Wes Hardaker <wjhns1@hardakers.net>
Thread-Topic: [EXTERNAL] Re: [Sat] Version -02 of the SATP core protocol draft ---- FW: New Version Notification for draft-hargreaves-sat-core-02.txt
Thread-Index: AQHZVM5NskSkVXmyaUmddKnaXxCrBK72+A2AgAM5I3A=
Date: Tue, 14 Mar 2023 12:12:44 +0000
Message-ID: <BYAPR15MB22776309223DB56FD01FAB00B8BE9@BYAPR15MB2277.namprd15.prod.outlook.com>
References: <2dddee52ac644f0aa082e6216282b335@oc11expo23.exchange.mit.edu> <E1D2FB88-93EC-46C0-B472-F4842386A455@compell.io> <186368007b8641f4a6ec5a0470464b1a@oc11expo23.exchange.mit.edu> <5A829058-763B-4092-830D-253184447770@compell.io>
In-Reply-To: <5A829058-763B-4092-830D-253184447770@compell.io>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BYAPR15MB2277:EE_|MW5PR15MB5241:EE_
x-ms-office365-filtering-correlation-id: e5b3e7e2-b83f-4523-88a1-08db24856ada
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 5c76vMxIxd6Yp3uRnWYxYz81fXA2q2TIcxfRyJqeGPUgwSJNEiOX+jJuiLZz/OOeqq74+bJaTOLdg2eoxjiTFvCXl7FzZ2rvPsrSCsa7g7WTOClssTLkzo/dm6RZ+9V7bFIqCHpyt1ulopOzFecvJ2jh4IWhA9Ccc6DLvgF410w4d1tPNa4v8f09gJUSO7YF09597BbNP7FdDyLW7+zXccGKeWHe/1X2o13j4swumWYMJTyV4UfsDcxk/SQAk7tRmMhYo0UHH4Dgntqr7DUGKhDzbqkt9D7xT8YpgoYaapFAgA3KOImwYqERxfb/294C39SfqOKdf6UgsUvQltZEpimXIwDOIs1EgS5Fr/QREow8QD69BkfNnhTf1onDUDnQNCnF7saeELjKOoGF0qfl5F9nGYyRRmX53GpkazWfm54qWyo0q/DNILen3Ws/BYqNFdcqZPdUDmJx351TVhj5Ey04bm+3EQTW1nFiilxprNtmPpfx1QVwRPGfcbY6u6YCLCIj+TOnpHH47pOceMy9tGxOUXcGIFaXyoKAGzgRUBOO3/F8AxmzQIo0TS38GBaak0pPPxkrzMf4UzDLO7YTRwe6Hk1gAn9OHP6M624SiW97GisjQzfO3Qx57BQuLCuEHDm2TzryJG/BMhSUDRBuP2Gs8ryrjwVLZL/38k6EnahNOLF4PBV7U7SJutw2rvli6pgYUmsndNsN0nIivaZwzmcLNHWEXWWIGtucyqeQ134=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR15MB2277.namprd15.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(376002)(346002)(39860400002)(396003)(366004)(136003)(451199018)(52536014)(5660300002)(86362001)(83380400001)(66946007)(186003)(7696005)(478600001)(66574015)(53546011)(26005)(6506007)(966005)(9686003)(71200400001)(66556008)(316002)(110136005)(66446008)(64756008)(66476007)(33656002)(41300700001)(76116006)(55016003)(8936002)(38070700005)(54906003)(8676002)(38100700002)(66899018)(2906002)(4326008)(122000001)(15650500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
X-OriginatorOrg: in.ibm.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR15MB2277.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e5b3e7e2-b83f-4523-88a1-08db24856ada
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2023 12:12:44.4701 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: fcf67057-50c9-4ad4-98f3-ffca64add9e9
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dJIcv235WGCHmCSHJYK+HlBnnAPFCp2Ra/ZRvK7VtVZGP34EaL0TtUVsQgqgHtk5SMqaZfHjWU/TZBgJohVoOg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW5PR15MB5241
X-Proofpoint-ORIG-GUID: IZfP2ULMkN2vKbzpslH_rdt4R6dbYG1h
X-Proofpoint-GUID: IZfP2ULMkN2vKbzpslH_rdt4R6dbYG1h
Content-Transfer-Encoding: base64
X-Proofpoint-UnRewURL: 5 URL's were un-rewritten
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-03-14_06,2023-03-14_02,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 bulkscore=0 mlxlogscore=999 mlxscore=0 adultscore=0 phishscore=0 impostorscore=0 lowpriorityscore=0 malwarescore=0 clxscore=1015 priorityscore=1501 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2303140103
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/OWg9Kj1XNGMMRtmuHae92tbllt8>
Subject: Re: [Sat] Version -02 of the SATP core protocol draft ---- FW: New Version Notification for draft-hargreaves-sat-core-02.txt
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Mar 2023 12:12:53 -0000

Denis,
    Can you elaborate on how "optimistic locking " would work, and how it would be immune to "double spending" hazards?

Thomas,
     Do we need the equivalent of an end-to-end (i.e., App-to-App) "transaction association reference" created through an end-to-end negotiation (which would produce overhead)? Would hop-to-hop (i.e., App-to-Gateway, G2G, G2A) not suffice, especially since the initiator of the transfer and the sequence of the hops are unambiguous?

Rama

-----Original Message-----
From: sat <sat-bounces@ietf.org> On Behalf Of Denis Avrilionis
Sent: 12 March 2023 16:23
To: Thomas Hardjono <hardjono@mit.edu>
Cc: sat@ietf.org; Martin Hargreaves <martin.hargreaves@quant.network>; Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>; Claire Facer <Claire.Facer@quant.network>; Wes Hardaker <wjhns1@hardakers.net>
Subject: [EXTERNAL] Re: [Sat] Version -02 of the SATP core protocol draft ---- FW: New Version Notification for draft-hargreaves-sat-core-02.txt

> Some question:
> 
> (a) Is the contextID a common value shared only between an App and its gateway:  eg. contextID1 is shared between App1 and G1 (and contextID2 between App2 and G2).
> 
> or
> 
> (b) Is the contextID a common value known to all 4 parties (for one transfer instance there is one contextID known to App1, App2, G1 and G2).

IMO the contextID is unique for a specific transfer and encompasses the sessionID. It should be communicated to the network in order for the lock to be associated with the specific transfer of the specific Gateway (a reference to the contextID should be present inside the lock assertion). 

In a more general topic, we shall allow for implementations of “optimistic” locking for assets. Otherwise, the first gateway that locks an asset will hold the lock until SATP completes (commit or rollback). In other terms, this is a kind of pessimistic locking behaviour and in real-life cases, it would be very inefficient.  


> 
> 
> 
> One analogy that is well known to the IETF community is the Security Association (i.e. context at endpoints) using the IKE and IPsec protocols (for creating encrypted tunnels). 
> 
> In IPsec the endpoints (i.e. "VPN gateway") need to establish a Security Association (SA), which is separately negotiated using the IKE protocol. 
> 
> Part of the SA establishment is each side generating SPI values  (Security Parameter Index) for the tunnel.
> 
> Each VPN gateway then maintains their own SPI Database, which allows each endpoint to lookup in the database which key to apply to decrypt incoming traffic (encrypt outgoing traffic). There is a separate SPI for incoming traffic and for outgoing traffic.
> 
> 
> In a sense, what we are talking about here is a kind of "Transaction Association" (TA) between the endpoints (which is App2 and App2).
> 
> But this "Transaction Association" must be communicated down from the App to the gateway.

The concept of context is also largely used in distributed transaction processing aiming at synchronising different data repositories. 



> 
> 
> 
> --thomas
> 
> 
> 
> ________________________________________
> From: Denis Avrilionis [denis@compell.io]
> Sent: Sunday, March 12, 2023 3:41 AM
> To: Thomas Hardjono
> Cc: sat@ietf.org; Martin Hargreaves; Rafael Belchior; Claire Facer; 
> Wes Hardaker
> Subject: Re: [Sat] Version -02 of the SATP core protocol draft ---- 
> FW: New Version Notification for draft-hargreaves-sat-core-02.txt
> 
> Hi Thomas,
> 
> I proposed to present a message flow to cover the transfer context for our meeting 14 March.
> @claire @wes please tell me if I can have 10’ to present on Tuesday.
> 
> To my view the transaction context includes the session id so perhaps 
> we can refer to a transaction context ID throughout the flow, that 
> would be simpler than the couple <contextID, sessionID>
> 
> --
> Denis
> 
>> On 12 Mar 2023, at 00:46, Thomas Hardjono <hardjono@mit.edu> wrote:
>> 
>> 
>> 
>> Folks,
>> 
>> Attached below is the link to an update the core protocol draft.
>> 
>> 
>> (a) The major updates to the draft :
>> 
>> -- Uses the terms "Lock Assertion" and "Receipt" (instead of "Evidence").
>> 
>> -- Inclusion of an explicit "session_id" value in each message.
>> 
>> -- The addition of a new subsection on the Commit-Ready message 
>> (which previously was not in draft-01)
>> 
>> -- The message flows now matches our agreed flows in v16 of the color message-flow diagram PNG file (in our repo).
>> 
>> 
>> 
>> (b) What was not added as yet (but text may be needed):
>> 
>> The architecture draft-03 talks about a Context-ID, which is transfer-context information/parameter that App1 and App2 are assumed to have established in Stage 0 (which is out of scope for SATP). This occurs at the Application level/layer, before SATP gets kickstarted.
>> 
>> The idea is that the Context-ID value could be (should be) bound somehow to the session_id so that the Applications can always see the progress of a transfer occurring between the two gateways.
>> 
>> Because the App1 & App2 could have multiple independent transfers occurring simultaneously and some of those may be handled by the same pair of gateways G1 and G2, the combination of the <Context-ID, session_id> allows each transfer flow to be identifiable.
>> 
>> We need to discuss this more, I think.
>> 
>> 
>> 
>> Best
>> 
>> --thomas
>> 
>> 
>> ________________________________________
>> From: internet-drafts@ietf.org [internet-drafts@ietf.org]
>> Sent: Saturday, March 11, 2023 5:29 PM
>> To: Martin Hargreaves; Rafael Belchior; Thomas Hardjono
>> Subject: New Version Notification for 
>> draft-hargreaves-sat-core-02.txt
>> 
>> A new version of I-D, draft-hargreaves-sat-core-02.txt has been 
>> successfully submitted by Thomas Hardjono and posted to the IETF 
>> repository.
>> 
>> Name:           draft-hargreaves-sat-core
>> Revision:       02
>> Title:          Secure Asset Transfer Protocol (SATP)
>> Document date:  2023-03-11
>> Group:          Individual Submission
>> Pages:          29
>> URL:            https://www.ietf.org/archive/id/draft-hargreaves-sat-core-02.txt 
>> Status:         https://datatracker.ietf.org/doc/draft-hargreaves-sat-core/ 
>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-hargreaves-sat-core 
>> Diff:           https://author-tools.ietf.org/iddiff?url2=draft-hargreaves-sat-core-02 
>> 
>> Abstract:
>>  This memo This memo describes the Secure Asset Transfer (SAT)  
>> Protocol for digital assets.  SAT is a protocol operating between two  
>> gateways that conducts the transfer of a digital asset from one  
>> gateway to another.  The protocol establishes a secure channel  
>> between the endpoints and implements a 2-phase commit to ensure the  
>> properties of transfer atomicity, consistency, isolation and  
>> durability.
>> 
>> 
>> 
>> 
>> The IETF Secretariat
>> 
>> 
>> --
>> sat mailing list
>> sat@ietf.org
>> INVALID URI REMOVED
>> lman_listinfo_sat&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=r1mDXzFktk7OyWx
>> Vu-FHM6wafgkdPRwRR-Ae__aieFY&m=kZRMMSwnnVYHzqPS3JGh7IEDKJJMggxESw3WGv
>> GZluAbOowt2PR2OI5KAN6n_f97&s=e0pGXNZXCLaXw0BMGOS6qPQwzVNmyApy3e7Nz9I5
>> jKU&e=

--
sat mailing list
sat@ietf.org
https://www.ietf.org/mailman/listinfo/sat