Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt
Thomas Hardjono <thomas.hardjono@outlook.com> Mon, 08 April 2024 17:37 UTC
Return-Path: <thomas.hardjono@outlook.com>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 993B9C15154E for <sat@ietfa.amsl.com>; Mon, 8 Apr 2024 10:37:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.587
X-Spam-Level:
X-Spam-Status: No, score=-1.587 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLACK=0.5, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=outlook.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tPYl4y801HlF for <sat@ietfa.amsl.com>; Mon, 8 Apr 2024 10:37:36 -0700 (PDT)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12olkn2015.outbound.protection.outlook.com [40.92.22.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2C16C15107A for <sat@ietf.org>; Mon, 8 Apr 2024 10:37:36 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FgOPbncJPGrOjBonBwTgIH9cZTD1IBgnrR5XHtk4kchLpq7r1WkqqCIW3e6ct/PIeuZE+v9IhPkZEBaBti4myP5TolLGImFh/1uqvF4MWYaRAbiOtS2nZzyULxlWoPZHUr3OYSTP7+ETiZV23KoAE7ZjRemp938YAORvZra5p9dci7gIElfNxMhRRbs4MFTSEFfU4Y7A7ffJ3Vn5YS8qeBuODpCWVbj2lp7FJHoWRQlw8DcBsp0DMZ8+Zr3xcfehLcd+SffoMHCcZxT82SLiDvLL3TMLQX2si5T7x6d7sj9iSv5MAihVVmBWUNyRcg3pPPWe1Shmu2p0eZR5EYb3aQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sM7rwZ1H2fmfdCqoOwAiDKwZdGp4q6CFIwY7R/he/hI=; b=OtFQ6+IfzNXv8SR+nJr5Nfbs2nJl5zXg+QhLlRIcUK2l5PXPfWb8jZ9WyTQ9zZmmqTRdNt9Lvs853ufmOhUQe1DWrViiUlfgwi8rAzK4vw8ZYrTTNaogYBEjaEEnKrPGaFnl6GWmGRJUJXiIMCnlVLFT6/+pSpQicWm71CS2qZJazRFp7Q7v0/p8p5o2K1o+fuAv2VgCqoJJg8brvV2W6RSuQSTlW896GVHQhoZqPC3uzuupqInT/pobcC6AYA5hqx5bQqyedkQcrnZyzeKpuUcDGw9UKh8TwKp/K3WvzG/tkBgjeep0lnH2zRMPliNgKN8mZFRPRU1MvTQqiGHPAw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sM7rwZ1H2fmfdCqoOwAiDKwZdGp4q6CFIwY7R/he/hI=; b=Qtzj4R58LqNfrXq5s7VW15t22IR4bPwfEFgQxVstBj9V1qyncvc08ms4XlCeUbFuvB9B4MnoqCBrucMxlDLAlMZFAFH4h6lr9qJj5C2L+FrUhuTrD7J6kW/dGj6xQV13zs7STzJ0Wo9sPpL9RXsfluIFsOMvkGGLVU253d8DiVS8pnkizstKuSZJ/DrBMvsXDJiTsP9UajgQUUdG2dzoKv0kcOY6e5PAzxpcXE+OA5jnEtiZVibuUKOELiex1nRjK0LZoBnW7Hownj46cpi6tIIulnXV8MicBTymvN58IHiwv1eOc3GDnZ8kbBLwNKV4ylIwwswIfrfvi7kGV26f2g==
Received: from MN0PR19MB5972.namprd19.prod.outlook.com (2603:10b6:208:380::19) by BY3PR19MB5074.namprd19.prod.outlook.com (2603:10b6:a03:365::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.55; Mon, 8 Apr 2024 17:37:33 +0000
Received: from MN0PR19MB5972.namprd19.prod.outlook.com ([fe80::6b3f:f384:aaba:ed9a]) by MN0PR19MB5972.namprd19.prod.outlook.com ([fe80::6b3f:f384:aaba:ed9a%7]) with mapi id 15.20.7409.042; Mon, 8 Apr 2024 17:37:33 +0000
From: Thomas Hardjono <thomas.hardjono@outlook.com>
To: Orie Steele <orie@transmute.industries>, Denis Avrilionis <denis=40compell.io@dmarc.ietf.org>
CC: Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org>, Martin Gfeller <mgf=40acm.org@dmarc.ietf.org>, "sat@ietf.org" <sat@ietf.org>
Thread-Topic: [Sat] I-D Action: draft-ietf-satp-core-04.txt
Thread-Index: AQHah2Tv9gSDkCJNBUG3N3/xJo7zYLFdS7gAgAEZPICAAAIrAIAABKeAgAA8MRE=
Date: Mon, 08 Apr 2024 17:37:33 +0000
Message-ID: <MN0PR19MB5972AA04820E829E82CEBFCFE5002@MN0PR19MB5972.namprd19.prod.outlook.com>
References: <171232704897.42279.16762954778818130945@ietfa.amsl.com> <CAOYrHJMc+uz4YEVvPoe7mgicQwLhWc_L50iUa_vJ=A8TUWLdBw@mail.gmail.com> <b1d77dc5d6d430413770bf0526b178b1@tecnico.ulisboa.pt> <DB9D66FB-34C3-4621-B63E-C728CE09A8D7@compell.io> <CAN8C-_L=ZDmeoKs63Kmi-VUgk2dQwWuODQ5eCd5JKfPT35uOeQ@mail.gmail.com>
In-Reply-To: <CAN8C-_L=ZDmeoKs63Kmi-VUgk2dQwWuODQ5eCd5JKfPT35uOeQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-tmn: [XUnNWEuhzg7RnV+nHrtw0nHQ3L5qsao3Y9hpwpxRNyvjJcSw4dDSrJjwZqu6C0Pz]
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN0PR19MB5972:EE_|BY3PR19MB5074:EE_
x-ms-office365-filtering-correlation-id: b2c19c74-fafe-457e-1e2c-08dc57f292e0
x-ms-exchange-slblob-mailprops: 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
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN0PR19MB5972AA04820E829E82CEBFCFE5002MN0PR19MB5972namp_"
MIME-Version: 1.0
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN0PR19MB5972.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: b2c19c74-fafe-457e-1e2c-08dc57f292e0
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2024 17:37:33.7573 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR19MB5074
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/oNOe9DDPiMoUAExEt8jZrTcEXG4>
Subject: Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Apr 2024 17:37:40 -0000
Thanks Orie, Much appreciate the review. Best --thomas From: sat <sat-bounces@ietf.org> on behalf of Orie Steele <orie@transmute.industries> Date: Monday, April 8, 2024 at 10:02 AM To: Denis Avrilionis <denis=40compell.io@dmarc.ietf.org> Cc: Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org>, Martin Gfeller <mgf=40acm.org@dmarc.ietf.org>, sat@ietf.org <sat@ietf.org> Subject: Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt (as an individual) If you do end up relaxing this constraint (UUIDv2), please keep in mind that "any UTF-8 string", might cause additional review challenges related to i18n. You might consider: https://datatracker.ietf.org/doc/html/rfc8264#section-4.2 While I'm pointing out i18n issues: Section 4.7.7 """ This payload is the actual credential of the gateway (token, certificate, string, etc.). """ Section 14.1.4: """ Specifies a resource held on the underlying network. This field must be meaningful to the network in question but is otherwise an arbitrary string. The underlying object it points to may be a network address, data block, transaction ID, alias, etc. or a future object type not yet defined. """ You might find the treatment of this topic in https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-sfbis-05#section-3.3.8 helpful. Regards, OS On Mon, Apr 8, 2024 at 8:45 AM Denis Avrilionis <denis=40compell.io@dmarc.ietf.org<mailto:40compell.io@dmarc.ietf.org>> wrote: Dear Rafael, Martin, See comments inline. On 8 Apr 2024, at 16:37, Rafael Belchior <rafael.belchior=40tecnico.ulisboa.pt@dmarc.ietf.org<mailto:40tecnico.ulisboa.pt@dmarc.ietf.org>> wrote: Dear Martin, Thank you a lot for your useful and constructive feedback. I will try my best to address it. Note that, if you wish, you can directly contribute to the draft via a PR in the following repo: https://github.com/ietf-satp/draft-ietf-satp-core I'll address the comments inline. To the ones I do not respond to, I agree: A 2024-04-07 23:50, Martin Gfeller escreveu: Dear Martin, Thomas, and Rafael The following notes refer to the Draft of SATP Core (https://datatracker.ietf.org/doc/html/draft-ietf-satp-core-04). Again, my comments may show my limited understanding or my stumbling over certain wordings. Kind regards, Martin General Is there any reference to the architecture document, which is important to the understanding of this document? You are right - we should refer to it as the theoretical foundation of the SATP core draft. I've added an issue: https://github.com/ietf-satp/draft-ietf-satp-core/issues/12 3. Terminology Client application: This is the application employed by a user to interact with a gateway. Do we need to say what we want to achieve with the application? Simply interacting could mean anything. As the introduction mentions only gateways, this is the first time "application" is used. We should make it clearer that the client application implements the end-user business logic (that requires interoperability) and interacts with a gateway via API1. Claim: An assertion made by an Entity [JWT]. By referencing [JWT], do we prescribe that Claims are encoded as JWTs? Either state more explicitly "encoded as JWT", or relax it, as "for example encoded as JWT". I do not have a strong opinion on this. By enforcing JWTs we are facilitating gateway implementations, as they now do not need to check for JWT (or other) support on Stage 0, but it is instead the canonical format for doing claims. Claim Type: Stipulates that JWT above is just one option. Perhaps always have "X type" before "X"; i.e., "claim type" before "claim" Network: Might be worthwhile to define network. Perhaps we could use ISO WG 307's definition? 4.2 SAT Model When do we speak about SAT and when about SATP? I think the model is for the protocol, so SATP Model, not SAT Model. local gateway "local" is understandable, but not actually defined. As the application is defined to interact with a gateway, a gateway is always "local" from the perspective of the application. 4.7.2 Message Type Inconsistent style - drop the "This is the " 4.7.3 Digital Asset Identifier unique identifier (UUIDv2) that uniquely identifies unique, more unique, most unique? :-) :-) I believe UUIDv2 is too restrictive. I would suggest we mention a more technology-neutral formulation, e.g. that digital asset identifiers should be globally unique and let the implementors decide how the digital asset identifiers could be defined application of the beneficiary This is the first time the application in NW2 is mentioned in an active role - in the document above this point, I understood that while the NW2 and GW2 are involved, the application of the beneficiary is not actively involved. 4.7.4 Session ID: (delete the ":") Was the Context-Id introduced? Yes, but below. Somewhat circular. Same problem noted in Architecture document. Same comment as above. UUIDv2 should be one possible mechanism for global unique identification 4.7.5 Transfer-Context ID Is the "Sequence Number" part of the Transfer-Context ID, or a possible implementation, or something additional? I believe the sequence number is part of the Transfer-Context ID. Also same comment as above - UUIDv2 should be one possible mechanism for global unique identification 4.7.8. Payload Hash Is the algo to be used intentionally left open? I believe that was the rationale. We could support the ones that NIST recommends, in a practical implementation. 4.8 Negotiation of Security Protocols and Parameters transfer initiation stage (Stage-0) Isn't that Stage-1, according to 4.4? 7-9: Stages Do we need to repeat the use of HTTP GET and POST - until the parenthetical remark about the TLS nonce for each Stage? 10.2 The purpose The purpose Repeated. 17.2 Informative References Wouldn't including references to the SATP Architecture and Use Cases documents be good? Cheers, Rafael On Fri, Apr 5, 2024 at 10:24 AM <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>> wrote: Internet-Draft draft-ietf-satp-core-04.txt is now available. It is a work item of the Secure Asset Transfer Protocol (SATP) WG of the IETF. Title: Secure Asset Transfer Protocol (SATP) Core Authors: Martin Hargreaves Thomas Hardjono Rafael Belchior Name: draft-ietf-satp-core-04.txt Pages: 39 Dates: 2024-04-05 The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-satp-core/ -- -- Rafael Belchior Ph.D. student in Computer Science and Engineering, Blockchain - Técnico Lisboa https://rafaelapb.github.io/ https://www.linkedin.com/in/rafaelpbelchior/ -- sat mailing list sat@ietf.org<mailto:sat@ietf.org> https://www.ietf.org/mailman/listinfo/sat -- sat mailing list sat@ietf.org<mailto:sat@ietf.org> https://www.ietf.org/mailman/listinfo/sat -- ORIE STEELE Chief Technology Officer www.transmute.industries [Image removed by sender.]<https://transmute.industries/>
- [Sat] I-D Action: draft-ietf-satp-core-04.txt internet-drafts
- Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt Martin Gfeller
- Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt Rafael Belchior
- Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt Denis Avrilionis
- Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt Orie Steele
- Re: [Sat] I-D Action: draft-ietf-satp-core-04.txt Thomas Hardjono