Re: [Sat] Views

Venkatraman Ramakrishna <vramakr2@in.ibm.com> Tue, 04 April 2023 15:20 UTC

Return-Path: <vramakr2@in.ibm.com>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EBFFC1522A4 for <sat@ietfa.amsl.com>; Tue, 4 Apr 2023 08:20:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, TRACKER_ID=0.1, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ibm.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZMxXosWsxMUR for <sat@ietfa.amsl.com>; Tue, 4 Apr 2023 08:20:47 -0700 (PDT)
Received: from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 485A9C14CF1F for <sat@ietf.org>; Tue, 4 Apr 2023 08:20:47 -0700 (PDT)
Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 334F7cwE015124; Tue, 4 Apr 2023 15:20:46 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : date : message-id : references : in-reply-to : content-type : mime-version : subject; s=pp1; bh=ApiMXBo6Hi0YkbIrGTBfd/6zIr6JwZ83HbaUp5Xi+cI=; b=SA7rrLV7xx6cm4+hND02/wVmoYvKN1dy2dx+mNtFKEyqUc81HlPfgs38qPX2L6hbZH8R exSulnijdiZ1s8yuHd4UlpeprHw5DS1ljbFuMzwt8X+q9nwbBzAmC51EUqjr+4T34nI8 9+anLLP3qt5NCoR2yT6+HjUM+bOS/1TDnPB5p528K7Wr2aDKd6yJgSZOtt1LNYcnVgRx p2Vq7VcxCS9basOD5YdWDhz5La2tUr8TTV17uL2S0hLKfl6DCMU7DUXcjYNQ5OdLzFr4 awSsQN7mcCU+G03BNvxg246Ux3ShuVd9uaH1hZnjItxI3uYMyeLAoNM3m3IUC6DlUilD 7g==
Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2105.outbound.protection.outlook.com [104.47.58.105]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3prp8u8d6e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Apr 2023 15:20:45 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lNLqUSjZ+GiALHeI2Eqr6/8e362wWnNy3g3za0DgllRYMWFKd08uUUNCE0v0FDpw6cLMlYIvWBacaPrq8VtNfsi8DxB9HgICyMa5PnXc+Qvx42dk21CBFAG3ZQR4jz+++FGrgnngAM/UMg8yeXH5oPvKo0fthDgKNP17gpQyDiTHrX5+bnKazttoOBR6kzkKU+UhvmAPlQ3xwCMGohAD86Kt6TsH8JTGwAXrQE2f/9duCfFhfC1RZBS3mtwyZz+C0WaBKWy16KSW9laad4FlZPn80tfJxwmv7V440omxXcWsCCLMDsNgV2uLaCeqFN07Rcg8LYgqQfT57G/rPKvTcA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tPliEO8elXVqOFMACpaxU63aL69KH5QwOXO6BFlNt+U=; b=ImRgokoqzDPf/C4zn7vdEFrhVsTMpjiFaZ5MgemZgwsFnLNSH2yYx/BHDtoL8ZBmJ4LJ4IJM/jWzhiKpOSCOikBMngW/PxLZ+P7mUMjtmUcDwL6eQNVjS7J6+//vNtKQ+9qaWIDtJhDSIc8jeIN7Ml1NyMZWjb645r0rBiOIFHUQL3ib2N8NGjL8eqZrZiDxqgl7U2FcTe8wZuQuZwyuuFbGG4GLDAwgvLTdLpTuIWBXaug13jgk68i+0c4VXp7JK2LPjWvKYqFrFhbaYnopajaWz2T38Ksj9dUYSLReyxZtLYw8K1sG/lPtMQ7cIg1CHoskOZrh6tjJx6gBHXu83Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=in.ibm.com; dmarc=pass action=none header.from=in.ibm.com; dkim=pass header.d=in.ibm.com; arc=none
Received: from BYAPR15MB2277.namprd15.prod.outlook.com (2603:10b6:a02:92::30) by CH3PR15MB5539.namprd15.prod.outlook.com (2603:10b6:610:148::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6254.26; Tue, 4 Apr 2023 15:20:43 +0000
Received: from BYAPR15MB2277.namprd15.prod.outlook.com ([fe80::4e24:17a0:3cef:948f]) by BYAPR15MB2277.namprd15.prod.outlook.com ([fe80::4e24:17a0:3cef:948f%4]) with mapi id 15.20.6254.035; Tue, 4 Apr 2023 15:20:43 +0000
From: Venkatraman Ramakrishna <vramakr2@in.ibm.com>
To: Venkatraman Ramakrishna <vramakr2@in.ibm.com>, Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>
CC: "sat@ietf.org" <sat@ietf.org>
Thread-Topic: [EXTERNAL] Re: [Sat] Views
Thread-Index: AQHZXd4VYIvezZFs80u+KalTI0mbw68bM8mAgAAfp4CAAAElAIAAAXvg
Date: Tue, 04 Apr 2023 15:20:42 +0000
Message-ID: <BYAPR15MB22774F55D179915B4DF9AF35B8939@BYAPR15MB2277.namprd15.prod.outlook.com>
References: <BYAPR15MB2277017397C6DC05471BE525B8819@BYAPR15MB2277.namprd15.prod.outlook.com> <EBF1E09B-CE48-451E-B91B-98FAEC23DB18@tecnico.ulisboa.pt> <BYAPR15MB2277534DA4D1A78BF5B30DAEB8939@BYAPR15MB2277.namprd15.prod.outlook.com> <353eaff04ab07b18730f1f04f5263ac5@tecnico.ulisboa.pt> <BYAPR15MB2277F9A93762E4237864CE55B8939@BYAPR15MB2277.namprd15.prod.outlook.com>
In-Reply-To: <BYAPR15MB2277F9A93762E4237864CE55B8939@BYAPR15MB2277.namprd15.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BYAPR15MB2277:EE_|CH3PR15MB5539:EE_
x-ms-office365-filtering-correlation-id: 6320a430-464e-4cc9-60bb-08db35202811
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR15MB2277.namprd15.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(366004)(376002)(396003)(39860400002)(136003)(451199021)(64756008)(66574015)(45080400002)(83380400001)(9686003)(6506007)(26005)(71200400001)(55016003)(66446008)(2906002)(66556008)(52536014)(5660300002)(4326008)(66476007)(86362001)(66946007)(166002)(41300700001)(76116006)(2940100002)(966005)(7696005)(478600001)(122000001)(33656002)(186003)(110136005)(53546011)(38070700005)(8676002)(8936002)(316002)(38100700002)(60764002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BYAPR15MB22774F55D179915B4DF9AF35B8939BYAPR15MB2277namp_"
X-OriginatorOrg: in.ibm.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR15MB2277.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6320a430-464e-4cc9-60bb-08db35202811
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Apr 2023 15:20:42.9920 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: fcf67057-50c9-4ad4-98f3-ffca64add9e9
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Reh2cVTZk6DocC30rjc/90sx6+/rDBL/Xi9uH3oSHW41/A7xPaidgYZxXfMwG6uvAFk1ODip3coccF4Q7d/PCQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR15MB5539
X-Proofpoint-GUID: gBeHkc2eSBwiFPkmUCvTs3uvmhUSFqwE
X-Proofpoint-ORIG-GUID: gBeHkc2eSBwiFPkmUCvTs3uvmhUSFqwE
X-Proofpoint-UnRewURL: 10 URL's were un-rewritten
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-04-04_06,2023-04-04_04,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 clxscore=1015 mlxscore=0 spamscore=0 impostorscore=0 malwarescore=0 adultscore=0 phishscore=0 mlxlogscore=999 suspectscore=0 lowpriorityscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2303200000 definitions=main-2304040139
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/eFnlNAPmpLHfNnUs-VFSiqQJ1bE>
Subject: Re: [Sat] Views
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Apr 2023 15:20:51 -0000

Forgot to add the link to the confidentiality feature spec within the Cacti project: https://github.com/hyperledger/cacti/blob/main/weaver/rfcs/models/security/confidentiality.md. The model is explained here.

Rama

From: sat <sat-bounces@ietf.org> On Behalf Of Venkatraman Ramakrishna
Sent: Tuesday, April 4, 2023 8:48 PM
To: Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>
Cc: sat@ietf.org
Subject: [EXTERNAL] Re: [Sat] Views

The network (i. e. , peer nodes) behind G2 can encrypt the data using the public key of the app within the network behind G1 that requested the data. Neither G2 nor G1 can decrypt the blob, which will be packaged into a view. Quantum-safety concerns
ZjQcmQRYFpfptBannerStart
This Message Is From an External Sender
This message came from outside your organization.
ZjQcmQRYFpfptBannerEnd
The network (i.e., peer nodes) behind G2 can encrypt the data using the public key of the app within the network behind G1 that requested the data. Neither G2 nor G1 can decrypt the blob, which will be packaged into a view. Quantum-safety concerns aside, this should be robust against MITM attacks by either gateway.

Rama

From: Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt<mailto:rafael.belchior@tecnico.ulisboa.pt>>
Sent: Tuesday, April 4, 2023 8:40 PM
To: Venkatraman Ramakrishna <vramakr2@in.ibm.com<mailto:vramakr2@in.ibm.com>>
Cc: sat@ietf.org<mailto:sat@ietf.org>
Subject: [EXTERNAL] Re: [Sat] Views

Rama, Thank you for your answers. Inline: A 2023-04-04 09: 26, Venkatraman Ramakrishna escreveu: Rafael, Sorry for replying so late to your questions. >>>Basically you are proposing an additional procedure where the network of G2 enforces
ZjQcmQRYFpfptBannerStart
This Message Is From an External Sender
This message came from outside your organization.
ZjQcmQRYFpfptBannerEnd

Rama,

Thank you for your answers. Inline:

A 2023-04-04 09:26, Venkatraman Ramakrishna escreveu:

Rafael,



Sorry for replying so late to your questions.



>>>Basically you are proposing an additional procedure where the network of G2 enforces the security regarding proof generation by G2, correct?



The network of G2 is enforcing the security by validating the proof through its consensus mechanism. The proof itself is not being generated by G2 though; it's being generated by G1 requesting its network (like how G1 currently gets lock/burn assertions from its network in SATP). G2 simply communicates the proof to an app or directly submits it to its network for validation.





>>>Are these additional functionalities and changes to the security model desired to be part of the core protocol or particular instantiations of the gateway (eg plugins)?



No, in fact the opposite. The data sharing mechanism we are drafting, and which is implemented in Weaver and Cacti, is even more paranoid than SATP w.r.t. trust in gateways; it does not trust gateways for integrity nor for confidentiality purposes. This is prevent gateways from either (1) tampering with data/assertions and proof, or (2) exfiltrating them to other external parties that the source network, which may be a permissioned network, does not wish to share authentic data and proofs with.



How can we guarantee the second property, confidentiality? In theory, a non-trusted gateway can share information with non-authorized parties.

Rafael



Rama





From: Tecnico Lisboa <rafael.belchior@tecnico.ulisboa.pt<mailto:rafael.belchior@tecnico.ulisboa.pt>>
Sent: Friday, March 24, 2023 4:50 AM
To: Venkatraman Ramakrishna <vramakr2@in.ibm.com<mailto:vramakr2@in.ibm.com>>
Cc: ladler2@bellatlantic.net<mailto:ladler2@bellatlantic.net>; sat@ietf.org<mailto:sat@ietf.org>
Subject: [EXTERNAL] Re: [Sat] Views



Hello Rama, Basically you are proposing an additional procedure where the network of G2 enforces the security regarding proof generation by G2, correct? Are these additional functionalities and changes to the security model desired to be part

ZjQcmQRYFpfptBannerStart

This Message Is From an External Sender

This message came from outside your organization.

ZjQcmQRYFpfptBannerEnd

Hello Rama,

Basically you are proposing an additional procedure where the network of G2 enforces the security regarding proof generation by G2, correct?



Are these additional functionalities and changes to the security model desired to be part of the core protocol or particular instantiations of the gateway (eg plugins)?



Rafael



On 21 Mar 2023, at 11:26, Venkatraman Ramakrishna <vramakr2@in.ibm.com<mailto:vramakr2@in.ibm.com>> wrote:

David,



Sorry for the inordinate delay in responding to you on this topic. (At least it was not pressing, as the "view" drafts are presently not within the SATP scope.)



Yes, supporting Views (and View Addresses) is meant to be an additional function for the gateways. I don't recall how well this is sketched out in the drafts I linked to, but there is more work required at G2 in a view request-response protocol. G1 simply communicates messages back and forth within minimal processing (assuming the address of G2 is embedded within the View Address) whereas G2 must submit a request and collect a response from its backing network just like G2 collects evidence for a minting in SATP. I'll try to work this out later once the SATP is more or less crystallized, but I think supporting views and addresses will require relatively minor augmentations to the features that the gateways must anyway implement for SATP.



There is a basic security problem that arises in view request and processing, but the solution for this is built into the end-to-end protocol (https://datatracker.ietf.org/doc/draft-ramakrishna-sat-data-sharing/<https://datatracker.ietf.org/doc/draft-ramakrishna-sat-data-sharing/>) in the following ways:

  1.  The gateway (G2 specifically) is not trusted either for integrity or confidentiality purposes: it simply returns a proof generated by N/W2, and it does not have the authority (or capability) to unilaterally generate a proof that G1 or N/W1 will accept. In this respect, the trust model is different from what the SATP currently assumes.
  2.  The network being requested for a view (N/W2) will run an access control check before sending a response. If N/W2 is a blockchain/DLT, for example, this will be a consensus-driven decision executed through a smart contract. The right "proof" can't be generated unless this access control check is passed by a quorum of honest peers.

I can't think of other security issues. Do you see anything that is not covered here?



Regarding the utility of this procedure: this protocol was created (and implemented) to solve a particular need for the sharing of ledger (or smart contract) state from one permissioned DLT network to another, and we just extracted a common pattern and found a mechanism to handle it. The use cases draft (https://datatracker.ietf.org/doc/draft-ramakrishna-sat-use-cases/<https://datatracker.ietf.org/doc/draft-ramakrishna-sat-use-cases/>) has examples (see Section 3).



Rama



From: sat <sat-bounces@ietf.org<mailto:sat-bounces@ietf.org>> On Behalf Of ladler2@bellatlantic.net<mailto:ladler2@bellatlantic.net>
Sent: 13 January 2023 00:54
To: sat@ietf.org<mailto:sat@ietf.org>
Subject: [EXTERNAL] [Sat] Views



Hi Rama: I am referring to your two documents linked in your Oct. 17, 2022 email. In the SATP process the only use I can see for a View is to examine the Digital Asset before it is actually transferred. However, it has been stated in the WG

ZjQcmQRYFpfptBannerStart

This Message Is From an Untrusted Sender

You have not previously corresponded with this sender.

ZjQcmQRYFpfptBannerEnd

Hi Rama:

  I am referring to your two documents linked in your Oct. 17, 2022 email.

In the SATP process the only use I can see for a View is to examine the Digital Asset

before it is actually transferred.  However, it has been stated in the WG meetings that

the details of the Digital Asset and the transfer must be specified in an agreement that

precedes the transfer.  So supporting Views is an additional function for the gateways.



Adding  the processing of Views to the gateways may be useful to support application

communications between Blockchain networks.  But the additional security problems View

processing entails is not justified unless View processing is required for SATP.

We also have a great of work to make SATP a useful protocol in the real world.



David Millman



--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat<https://www.ietf.org/mailman/listinfo/sat>


--
-- Rafael Belchior

Ph.D. student in Computer Science and Engineering, Blockchain - Técnico Lisboa
https://rafaelapb.github.io/<https://rafaelapb.github.io/>
https://www.linkedin.com/in/rafaelpbelchior/<https://www.linkedin.com/in/rafaelpbelchior/>