Re: [Trans] Verifying inclusion proof

Phillip Hallam-Baker <ietf@hallambaker.com> Mon, 29 June 2015 19:17 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E285E1B2CCB for <trans@ietfa.amsl.com>; Mon, 29 Jun 2015 12:17:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CKfA4mpmKFch for <trans@ietfa.amsl.com>; Mon, 29 Jun 2015 12:17:35 -0700 (PDT)
Received: from mail-la0-x233.google.com (mail-la0-x233.google.com [IPv6:2a00:1450:4010:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C9D01B2CC9 for <trans@ietf.org>; Mon, 29 Jun 2015 12:17:35 -0700 (PDT)
Received: by laar3 with SMTP id r3so75504427laa.0 for <trans@ietf.org>; Mon, 29 Jun 2015 12:17:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=4t1Tnh/yFnhejLwPtxVNDER8JKs6g4sTaBixPpPReaY=; b=LBrJtUs9P53MnRTkZV7vvqh0k3tjJXBFG5DE2QfNVfRoqvTxeXtjpxwHwpwFMpFVQp zcFIfv4A4PI0N6sXu0G1CEMhQ2UOf4nDSKFJVSh+DfzguaJIpY2RmxOFkb1feYaXVcT8 mIsvhaVQejxppJMfF8ll/Y7DQW9Z3qez7G50uJQXzVmkBispOZxEKgNB78yi4GaktK7A eR0lMP6JOJr496aAdXlGLAgdkirqXfPTsz5Lthi1H7W5AmqZJj5VBap5yShcVnUqMfBh lwXjBgxMP3DWY/2fZWcy2+9O1t8inClcPqBA7aOqiOKji1V/y1joetXxMCtGpuD3/ECz +c9g==
MIME-Version: 1.0
X-Received: by 10.152.197.2 with SMTP id iq2mr15797485lac.103.1435605453823; Mon, 29 Jun 2015 12:17:33 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.203.163 with HTTP; Mon, 29 Jun 2015 12:17:33 -0700 (PDT)
In-Reply-To: <55918C93.2040805@bbn.com>
References: <558D61DE.8020402@nic.cz> <CACM=_OeTnNCk+VSiQ1E5T2_a7YkxwxZ2w8HJSg13wtVc2wQUfA@mail.gmail.com> <55900D1D.2030009@bbn.com> <CABrd9SQV6tybHwgo=ZATEPjhsV64=5=O-fi10pcwHnAHCyArDA@mail.gmail.com> <55918C93.2040805@bbn.com>
Date: Mon, 29 Jun 2015 15:17:33 -0400
X-Google-Sender-Auth: QvY5tDPWRKHQFUYyTm6eMG0llus
Message-ID: <CAMm+Lwh4ufADf3tLBVarn3K0bE_G9TqUUtW8rZQPG16EVOZOVw@mail.gmail.com>
From: Phillip Hallam-Baker <ietf@hallambaker.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary="001a11340b061ce8610519acf1db"
Archived-At: <http://mailarchive.ietf.org/arch/msg/trans/CtXm62cjo9BByyKjlzOvP3OewBM>
Cc: "trans@ietf.org" <trans@ietf.org>
Subject: Re: [Trans] Verifying inclusion proof
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jun 2015 19:17:37 -0000

On Mon, Jun 29, 2015 at 2:21 PM, Stephen Kent <kent@bbn.com> wrote:

> Ben,
>
>  On 28 June 2015 at 16:05, Stephen Kent<kent@bbn.com>  wrote:
>>
>>> IETF standards need to be unambiguous. Code is very helpful, but it is
>>> not a
>>> substitute
>>> for a rigorous description of how to resolve the issue that Onderj
>>> raised.
>>>
>> Whilst I am not necessarily opposed to that, there has to be a point
>> at which you stop explaining what can be worked out given existing
>> information. The RFC does state how the hash is calculated, from which
>> it is clear what the placement of each node is in the hash
>> calculation.
>>
> My comment is based on the question that was posed by someone for
> whom it was not clear. If most other (independent) implementers find
> the text clear enough, OK.
>
> Citing a tech paper is not the preferred approach for IETF docs. We
> often reproduce info that is available via other means, so that RFCs
> are as self-contained as possible.


As a general rule, placement and organization does not matter.

If someone gives you the apex value of the tree and the sequence of branch
values and whether they are left or right, you have all the info required
to verify.


While the spec says 'Merkle tree', all that is required for interop is to
deliver the correct branches.