Internet-Draft dCBOR March 2023
McNally & Allen Expires 9 September 2023 [Page]
Workgroup:
Network Working Group
Internet-Draft:
draft-mcnally-deterministic-cbor-00
Published:
Intended Status:
Experimental
Expires:
Authors:
W. McNally
Blockchain Commons
C. Allen
Blockchain Commons

dCBOR: Deterministic CBOR Implementation Practices

Abstract

CBOR has many advantages over other data serialization formats. One of its strengths is specifications and guidelines for serializing data deterministically, such that multiple agents serializing the same data automatically achieve consensus on the exact byte-level form of that serialized data. Nonetheless, determinism is an opt-in feature of the specification, and most existing CBOR codecs put the primary burden of correct deterministic serialization and validation of deterministic encoding during deserialization on the engineer. This document specifies a set of norms and practices for CBOR codec implementors intended to support deterministic CBOR ("dCBOR") at the codec API level.

Discussion Venues

This note is to be removed before publishing as an RFC.

Source for this draft and an issue tracker can be found at https://github.com/BlockchainCommons/WIPs-IETF-draft-dcbor.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 9 September 2023.

Table of Contents

1. Introduction

The goal of determinism in data encoding is that multiple agents serializing the same data will automatically achieve consensus on the byte-level form of that serialized data. Many data serialization formats give developers wide latitude on the serialized form, for example:

Each of these choices made differently by separate agents yield different binary serializations that cannot be compared based on their hash values, and which therefore must be separately parsed and validated semantically field-by-field to decide whether they are identical. Such fast comparison for identicality using hashes is important in certain classes of application, where the hash is published or incorporated into other documents, hence "freezing" the form of the document. Where the hash is known or fixed, it is impossible to substitute a different document for the original that differs by even a single bit.

The CBOR standard addresses this problem in [RFC8949] §4.2, by narrowing the scope of choices available for encoding various values, but does not specify a set of norms and practices for CBOR codec implementors who value the benefits of deterministic CBOR, hereinafter called "dCBOR".

This document's goal is to specify such a set of norms and practices for dCBOR codec implementors.

It is important to stress that dCBOR is not a new dialect of CBOR, and that all dCBOR is well-formed CBOR that can be read by existing CBOR codecs.

Nonetheless, many existing implementations give little or no guidance at the API level as to whether the CBOR being read conforms to the dCBOR specification, for example by emitting errors or warnings at deserialization time. Conversely, many existing implementations do not carry any burden of ensuring that CBOR is serialized in conformance with the dCBOR specification, again putting that burden on developers.

The authors of this document believe that for applications where dCBOR correctness is important, the codec itself should carry as much of this burden as possible. This is important both to minimize cognitive load during development, and help ensure interoperability between implementations.

This document is segmented into three categories. They include norms and practices that:

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

This specification makes use of the following terminology:

byte

Used in its now-customary sense as a synonym for "octet".

codec

"coder-decoder", a software suite that both encodes (serializes) and decodes (deserializes) a data format.

dCBOR

"deterministic CBOR" encoded in conformance with the CBOR specifications §4.2 [RFC8949].

3. Serialization Level

This section defines requirements and practices falling in the purview of the dCBOR codec.

3.1. General Practices for dCBOR Codecs

dCBOR codecs SHOULD:

  • Make it easy to emit compliant dCBOR.
  • Make it hard to emit non-compliant dCBOR.
  • Make it an error to read non-compliant dCBOR.

3.2. Base Requirements

dCBOR encoders MUST only emit CBOR conforming to the requirements of [RFC8949] §4.2.1. To summarize:

  • Variable-length integers MUST be as short as possible.
  • Floating-point values MUST use the shortest form that preseves the value.
  • Indefinite-length arrays and maps MUST NOT be used.
  • Map keys MUST be sorted in bytewise lexicographic order of their deterministic encodings.

dCBOR codecs MUST validate and return errors for any CBOR that is not conformant.

3.3. Reduction of Floating Point Values to Integers

While there is no requirement that dCBOR codecs implement support for floating point numbers, dCBOR codecs that do support them MUST reduce floating point values with no fractional part to the smallest integer value that can accurately represent it. If a numeric value has a fractional part or an exponent that takes it out of the range of representable integers, then it SHALL be encoded as a floating point value.

This practice still produces well-formed CBOR according to the standard, and all existing implementations will be able to read it. It does exclude a map such as the following from being validated as dCBOR, as it would have a duplicate key:

{
   10: "ten",
   10.0: "floating ten"
}

3.4. Reduction of NaNs and Infinities.

[IEEE754] defines the NaN (Not a Number) value [NAN]. This is usually divided into two categories: quiet NaNs and signalling NaNs. However, the specification also specifies that the floating point sign bit "doesn't matter" and includes a range of "payload" bits. These bit fields could be used to break CBOR determinism.

dCBOR encoders that support floating point MUST reduce all NaN values to the half-width quiet NaN value having the canonical bit pattern 0x7e00.

Similarly, encoders that support floating point MUST reduce all +INF values to the half-width +INF having the canonical bit pattern 0x7c00 and likewise with -INF to 0xfc00.

3.5. Reduction of BigNums to Integers

  • While there is no requirement that dCBOR codecs implement support for BigNums >= 2^64 (tags 2 and 3), codecs that do support them MUST use regular integer encodings for values < 2^64.

3.6. Use of Null as a Map Value

dCBOR codecs MUST reject null as a value in map entries. If the encoder API allows placing null-valued entries into in-memory maps, it MUST NOT emit a key value pair for such entires at serialization time. If the decoder API reads a null-valued entry, it must return an error.

The rationale is eliminating the choice over whether to encode a key-value pair where the value is null or omit it entirely.

Of course, null still has valid uses, e.g., as a placeholder in position-indexed structures like arrays. While of questionable semantics, null may also be used as a map key.

3.7. API Handling of Maps

dCBOR APIs SHOULD provide a dCBOR Map structure or similar that models the dCBOR canonical key encoding and order.

  • Supports insertion of unencoded key-value pairs.
  • Supports iteration through entries in dCBOR canonical key order.
  • Supports testing for inclusion of duplicate keys, e.g., 10 and 10.0.

The dCBOR decoder MUST return an error if it encounters misordered or duplicate map keys.

3.8. API Handling of Numeric Values

The above requirements of this section deal with how dCBOR encoders MUST serialize numeric values, and how dCBOR decoders MUST validate them. It does not specify requirements for the API, but the authors do make the following recommendations:

  • The encoder API SHOULD accept any supported numeric type for insertion into the CBOR stream. The CBOR encoder SHALL decide the dCBOR-conformant form for its encoding.
  • The API SHOULD allow any supported numeric type to be extracted, and return errors when the actual type encountered is not representable in the requested type. For example,

    • If the encoded value is "1.5" then requesting extraction of the value as floating point will succeed but requesting extraction as an integer will fail.
    • Similarly, if the value has a large exponent and therefore can be represented as either a floating point value or a BigNum, then attempting to extract it as a machine integer will fail.

3.9. Validation Errors

A dCBOR decoder MUST return errors when it encounters any of these conditions in the input stream. The error symbol names below are informative.

  • underrun: early end of stream
  • badHeaderValue: unsupported CBOR major/minor item header
  • nonCanonicalNumeric: An integer, floating-point value, or BigNum was encoded in non-canonical form
  • invalidString: An invalid UTF-8 string was encountered
  • unusedData: Unused data encountered past the expected end of the input stream
  • misorderedMapKey: A map has keys not in canonical order
  • duplicateMapKey: A map has a duplicate key

4. Application Level

4.1. Optional/Default Values

  • Protocols that depend on dCBOR MUST specify the circumstances under which particular optional fields MUST or MUST NOT be present. Protocols that specify fields using key-value paired structures like CBOR maps, where some fields have default values must choose and document one of the following strategies:

    • they MUST specify that the absence of the field means choosing the default. This allows the default to be changed later, or
    • they MUST encode the field regardless of whether the current default is chosen. This locks in the current value of the default.

4.2. Tagging Items

  • Protocols that depend on dCBOR MUST specify the circumstances under which a data item MUST or MUST NOT be tagged.
  • The codec API SHOULD specify conveniences such as protocol conformances that allow the association of a associated tag with a particular data type. The encoder MUST use such an associated tag when serializing, and the decoder MUST expect the associated tag when extracting a structure of the that type.

5. Future Work

The following issues are currently left for future work:

6. Reference Implementations

This section is informative.

The current reference implementations that conform to these specifications are:

7. Security Considerations

This document inherits the security considerations of CBOR [RFC8949].

Vulnerabilities regarding dCBOR will revolve around whether an attacker can find value in either:

The first consideration is unlikely due to the Law of Identity (A is A). The second consideration could indicate the failure of a dCBOR decoder to correctly validate according to this document, or the failure of the developer to properly specify or implement application-level requirements for dCBOR. Whether these possibilities present an identifiable attack surface is an open question that developers should consider.

8. IANA Considerations

This document makes no requests of IANA.

We considered requesting a new media type [RFC6838] for deterministic CBOR, e.g., application/d+cbor, but chose not to pursue this as all dCBOR is well-formed CBOR. Therefore, existing CBOR codecs can read dCBOR, and many existing codecs can also write dCBOR if the encoding rules are observed. Protocols that adopt dCBOR will simply have more stringent requirments for the CBOR they emit and ingest.

9. References

9.1. Normative References

[IEEE754]
"IEEE, "IEEE Standard for Floating-Point Arithmetic", IEEE Std 754-2019, DOI 10.1109/IEEESTD.2019.8766229", n.d., <https://ieeexplore.ieee.org/document/8766229>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC6838]
Freed, N., Klensin, J., and T. Hansen, "Media Type Specifications and Registration Procedures", BCP 13, RFC 6838, DOI 10.17487/RFC6838, , <https://www.rfc-editor.org/rfc/rfc6838>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.
[RFC8949]
Bormann, C. and P. Hoffman, "Concise Binary Object Representation (CBOR)", STD 94, RFC 8949, DOI 10.17487/RFC8949, , <https://www.rfc-editor.org/rfc/rfc8949>.

9.2. Informative References

[NAN]
"NaN", n.d., <https://en.wikipedia.org/wiki/NaN>.
[RustDCBOR]
"Deterministic CBOR ("dCBOR") for Rust.", n.d., <https://github.com/BlockchainCommons/bc-dcbor-rust>.
[SUBNORMAL]
"Subnormal number", n.d., <https://en.wikipedia.org/wiki/Subnormal_number>.
[SwiftDCBOR]
"Deterministic CBOR ("dCBOR") for Swift.", n.d., <https://github.com/BlockchainCommons/BCSwiftDCBOR>.

Acknowledgments

TODO acknowledge.

Authors' Addresses

Wolf McNally
Blockchain Commons
Christopher Allen
Blockchain Commons