Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt

Thomas Hardjono <thomas.hardjono@outlook.com> Mon, 08 April 2024 17:37 UTC

Return-Path: <thomas.hardjono@outlook.com>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 993B9C15154E for <sat@ietfa.amsl.com>; Mon, 8 Apr 2024 10:37:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.587
X-Spam-Level:
X-Spam-Status: No, score=-1.587 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLACK=0.5, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=outlook.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tPYl4y801HlF for <sat@ietfa.amsl.com>; Mon, 8 Apr 2024 10:37:36 -0700 (PDT)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12olkn2015.outbound.protection.outlook.com [40.92.22.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2C16C15107A for <sat@ietf.org>; Mon, 8 Apr 2024 10:37:36 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FgOPbncJPGrOjBonBwTgIH9cZTD1IBgnrR5XHtk4kchLpq7r1WkqqCIW3e6ct/PIeuZE+v9IhPkZEBaBti4myP5TolLGImFh/1uqvF4MWYaRAbiOtS2nZzyULxlWoPZHUr3OYSTP7+ETiZV23KoAE7ZjRemp938YAORvZra5p9dci7gIElfNxMhRRbs4MFTSEFfU4Y7A7ffJ3Vn5YS8qeBuODpCWVbj2lp7FJHoWRQlw8DcBsp0DMZ8+Zr3xcfehLcd+SffoMHCcZxT82SLiDvLL3TMLQX2si5T7x6d7sj9iSv5MAihVVmBWUNyRcg3pPPWe1Shmu2p0eZR5EYb3aQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sM7rwZ1H2fmfdCqoOwAiDKwZdGp4q6CFIwY7R/he/hI=; b=OtFQ6+IfzNXv8SR+nJr5Nfbs2nJl5zXg+QhLlRIcUK2l5PXPfWb8jZ9WyTQ9zZmmqTRdNt9Lvs853ufmOhUQe1DWrViiUlfgwi8rAzK4vw8ZYrTTNaogYBEjaEEnKrPGaFnl6GWmGRJUJXiIMCnlVLFT6/+pSpQicWm71CS2qZJazRFp7Q7v0/p8p5o2K1o+fuAv2VgCqoJJg8brvV2W6RSuQSTlW896GVHQhoZqPC3uzuupqInT/pobcC6AYA5hqx5bQqyedkQcrnZyzeKpuUcDGw9UKh8TwKp/K3WvzG/tkBgjeep0lnH2zRMPliNgKN8mZFRPRU1MvTQqiGHPAw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sM7rwZ1H2fmfdCqoOwAiDKwZdGp4q6CFIwY7R/he/hI=; b=Qtzj4R58LqNfrXq5s7VW15t22IR4bPwfEFgQxVstBj9V1qyncvc08ms4XlCeUbFuvB9B4MnoqCBrucMxlDLAlMZFAFH4h6lr9qJj5C2L+FrUhuTrD7J6kW/dGj6xQV13zs7STzJ0Wo9sPpL9RXsfluIFsOMvkGGLVU253d8DiVS8pnkizstKuSZJ/DrBMvsXDJiTsP9UajgQUUdG2dzoKv0kcOY6e5PAzxpcXE+OA5jnEtiZVibuUKOELiex1nRjK0LZoBnW7Hownj46cpi6tIIulnXV8MicBTymvN58IHiwv1eOc3GDnZ8kbBLwNKV4ylIwwswIfrfvi7kGV26f2g==
Received: from MN0PR19MB5972.namprd19.prod.outlook.com (2603:10b6:208:380::19) by BY3PR19MB5074.namprd19.prod.outlook.com (2603:10b6:a03:365::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.55; Mon, 8 Apr 2024 17:37:33 +0000
Received: from MN0PR19MB5972.namprd19.prod.outlook.com ([fe80::6b3f:f384:aaba:ed9a]) by MN0PR19MB5972.namprd19.prod.outlook.com ([fe80::6b3f:f384:aaba:ed9a%7]) with mapi id 15.20.7409.042; Mon, 8 Apr 2024 17:37:33 +0000
From: Thomas Hardjono <thomas.hardjono@outlook.com>
To: Orie Steele <orie@transmute.industries>, Denis Avrilionis <denis=40compell.io@dmarc.ietf.org>
CC: Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org>, Martin Gfeller <mgf=40acm.org@dmarc.ietf.org>, "sat@ietf.org" <sat@ietf.org>
Thread-Topic: [Sat] I-D Action: draft-ietf-satp-core-04.txt
Thread-Index: AQHah2Tv9gSDkCJNBUG3N3/xJo7zYLFdS7gAgAEZPICAAAIrAIAABKeAgAA8MRE=
Date: Mon, 08 Apr 2024 17:37:33 +0000
Message-ID: <MN0PR19MB5972AA04820E829E82CEBFCFE5002@MN0PR19MB5972.namprd19.prod.outlook.com>
References: <171232704897.42279.16762954778818130945@ietfa.amsl.com> <CAOYrHJMc+uz4YEVvPoe7mgicQwLhWc_L50iUa_vJ=A8TUWLdBw@mail.gmail.com> <b1d77dc5d6d430413770bf0526b178b1@tecnico.ulisboa.pt> <DB9D66FB-34C3-4621-B63E-C728CE09A8D7@compell.io> <CAN8C-_L=ZDmeoKs63Kmi-VUgk2dQwWuODQ5eCd5JKfPT35uOeQ@mail.gmail.com>
In-Reply-To: <CAN8C-_L=ZDmeoKs63Kmi-VUgk2dQwWuODQ5eCd5JKfPT35uOeQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-tmn: [XUnNWEuhzg7RnV+nHrtw0nHQ3L5qsao3Y9hpwpxRNyvjJcSw4dDSrJjwZqu6C0Pz]
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN0PR19MB5972:EE_|BY3PR19MB5074:EE_
x-ms-office365-filtering-correlation-id: b2c19c74-fafe-457e-1e2c-08dc57f292e0
x-ms-exchange-slblob-mailprops: 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
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN0PR19MB5972AA04820E829E82CEBFCFE5002MN0PR19MB5972namp_"
MIME-Version: 1.0
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN0PR19MB5972.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: b2c19c74-fafe-457e-1e2c-08dc57f292e0
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2024 17:37:33.7573 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR19MB5074
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/oNOe9DDPiMoUAExEt8jZrTcEXG4>
Subject: Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Apr 2024 17:37:40 -0000

Thanks Orie,

Much appreciate the review.


Best

--thomas



From: sat <sat-bounces@ietf.org> on behalf of Orie Steele <orie@transmute.industries>
Date: Monday, April 8, 2024 at 10:02 AM
To: Denis Avrilionis <denis=40compell.io@dmarc.ietf.org>
Cc: Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org>, Martin Gfeller <mgf=40acm.org@dmarc.ietf.org>, sat@ietf.org <sat@ietf.org>
Subject: Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt
(as an individual)

If you do end up relaxing this constraint (UUIDv2), please keep in mind that "any UTF-8 string", might cause additional review challenges related to i18n.

You might consider: https://datatracker.ietf.org/doc/html/rfc8264#section-4.2

While I'm pointing out i18n issues:

Section 4.7.7

"""
   This payload is the actual credential of the gateway (token,
   certificate, string, etc.).
"""

Section 14.1.4:

"""
   Specifies a resource held on the underlying network.  This field must
   be meaningful to the network in question but is otherwise an
   arbitrary string.  The underlying object it points to may be a
   network address, data block, transaction ID, alias, etc. or a future
   object type not yet defined.
"""

You might find the treatment of this topic in https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-sfbis-05#section-3.3.8 helpful.

Regards,

OS

On Mon, Apr 8, 2024 at 8:45 AM Denis Avrilionis <denis=40compell.io@dmarc.ietf.org<mailto:40compell.io@dmarc.ietf.org>> wrote:
Dear Rafael, Martin,

See comments inline.


On 8 Apr 2024, at 16:37, Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org<mailto:40tecnico.ulisboa.pt@dmarc.ietf.org>> wrote:


Dear Martin,

Thank you a lot for your useful and constructive feedback. I will try my best to address it. Note that, if you wish, you can directly contribute to the draft via a PR in the following repo: https://github.com/ietf-satp/draft-ietf-satp-core

I'll address the comments inline. To the ones I do not respond to, I agree:

A 2024-04-07 23:50, Martin Gfeller escreveu:
Dear Martin, Thomas, and Rafael

The following notes refer to the Draft of SATP Core (https://datatracker.ietf.org/doc/html/draft-ietf-satp-core-04).

Again, my comments may show my limited understanding or my stumbling over certain wordings.

Kind regards, Martin

General

    Is there any reference to the architecture document, which is important to the
    understanding of this document?


You are right - we should refer to it as the theoretical foundation of the SATP core draft. I've added an issue: https://github.com/ietf-satp/draft-ietf-satp-core/issues/12




3. Terminology

    Client application: This is the application employed by a user to interact with a gateway.


        Do we need to say what we want to achieve with the application? Simply interacting
       could mean anything.
        As the introduction mentions only gateways, this is the first time "application" is used.


We should make it clearer that the client application implements the end-user business logic (that requires interoperability) and interacts with a gateway via API1.



    Claim: An assertion made by an Entity [JWT].

        By referencing [JWT], do we prescribe that Claims are encoded as JWTs?
        Either state more explicitly "encoded as JWT", or relax it, as "for example encoded
        as JWT".

I do not have a strong opinion on this. By enforcing JWTs we are facilitating gateway implementations, as they now do not need to check for JWT (or other) support on Stage 0, but it is instead the canonical format for doing claims.



    Claim Type:

        Stipulates that JWT above is just one option. Perhaps always have "X type" before "X";
         i.e., "claim type" before "claim"

    Network:
        Might be worthwhile to define network.


Perhaps we could use ISO WG 307's definition?




4.2 SAT Model

    When do we speak about SAT and when about SATP?

        I think the model is for the protocol, so SATP Model, not SAT Model.

    local gateway

        "local" is understandable, but not actually defined. As the application is defined
         to interact with a gateway, a gateway is always "local" from the perspective of
        the application.

4.7.2 Message Type

    Inconsistent style - drop the  "This is the "

4.7.3 Digital Asset Identifier

    unique identifier (UUIDv2) that uniquely identifies

        unique, more unique, most unique? :-)

:-)

I believe UUIDv2 is too restrictive. I would suggest we mention a more technology-neutral formulation, e.g. that digital asset identifiers should be globally unique and let the implementors decide how the digital asset identifiers could be defined




    application of the beneficiary

        This is the first time the application in NW2 is mentioned in an active role - in
        the document above this point, I understood that while the NW2 and GW2 are involved,
        the application of the beneficiary is not actively involved.

4.7.4 Session ID: (delete the ":")

        Was the Context-Id introduced? Yes, but below. Somewhat circular. Same problem
        noted in Architecture document.

Same comment as above.  UUIDv2 should be one possible mechanism for global unique identification



4.7.5 Transfer-Context ID

        Is the "Sequence Number" part of the Transfer-Context ID, or a possible implementation,
        or something additional?

I believe the sequence number is part of the Transfer-Context ID. Also same comment as above -  UUIDv2 should be one possible mechanism for global unique identification





4.7.8.  Payload Hash

        Is the algo to be used intentionally left open?


I believe that was the rationale. We could support the ones that NIST recommends, in a practical implementation.



4.8  Negotiation of Security Protocols and Parameters

    transfer initiation stage (Stage-0)

        Isn't that Stage-1, according to 4.4?

7-9: Stages

    Do we need to repeat the use of HTTP GET and POST - until the parenthetical remark
    about the TLS nonce for each Stage?

10.2

        The purpose The purpose

    Repeated.

17.2 Informative References

    Wouldn't including references to the SATP Architecture and Use Cases documents be good?

Cheers,

Rafael




On Fri, Apr 5, 2024 at 10:24 AM <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>> wrote:
Internet-Draft draft-ietf-satp-core-04.txt is now available. It is a work item
of the Secure Asset Transfer Protocol (SATP) WG of the IETF.

   Title:   Secure Asset Transfer Protocol (SATP) Core
   Authors: Martin Hargreaves
            Thomas Hardjono
            Rafael Belchior
   Name:    draft-ietf-satp-core-04.txt
   Pages:   39
   Dates:   2024-04-05

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-satp-core/




--
-- Rafael Belchior

Ph.D. student in Computer Science and Engineering, Blockchain - Técnico Lisboa
https://rafaelapb.github.io/
https://www.linkedin.com/in/rafaelpbelchior/
--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat

--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat


--



ORIE STEELE
Chief Technology Officer
www.transmute.industries

[Image removed by sender.]<https://transmute.industries/>