| Internet-Draft | TrackOne VTL | April 2026 |
| El Khatabi | Expires 19 October 2026 | [Page] |
This document specifies a verifiable telemetry ledger profile for accepted telemetry in resource-constrained sensing environments. The profile begins after local policy has admitted a pod and the gateway accepts its framed telemetry under the active transport and anti-replay contract. From that point onward, it defines deterministic frame-to-canonical-record projection, authoritative canonical-record and day artifacts, verifier-facing manifests, disclosure classes, and the binding of day artifacts to external timestamp evidence. OpenTimestamps (OTS) is the default anchoring channel; RFC 3161 timestamp responses and peer signatures are optional parallel channels.¶
The goal is interoperability and independent auditability, not a full device-lifecycle system or new cryptographic primitives. Verification claims are limited by the disclosed artifacts, the claimed disclosure class, and the checks the verifier actually executes. A successful result establishes internal consistency and correct proof binding for the disclosed bundle; it does not by itself establish dataset completeness, physical truth of measurements, or safety for autonomous actuation.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 19 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
Long-lived telemetry deployments need evidence that disclosed telemetry is the same telemetry a gateway committed when it was accepted, even when uplink is intermittent and verification happens later.¶
This profile standardizes the gateway-side commitment contract for accepted telemetry. In this document, that contract is the set of deterministic rules for frame-to-canonical-record projection, commitment encoding, day-artifact structure, verifier-facing manifests, disclosure classes, and proof binding.¶
The profile begins at an explicit handoff. Before this profile applies, lifecycle or control-plane systems determine whether a pod is known, onboarded, admitted, credentialed, and allowed to send. This profile begins once local policy has accepted telemetry under the active transport and anti-replay contract and then turns that telemetry into authoritative, verifier-facing evidence.¶
Device reporting cadence and gateway artifact cadence are distinct. A pod can report at fixed or irregular intervals, but this profile uses one Coordinated Universal Time (UTC) day as the batching unit for authoritative artifacts. Other batching intervals are possible design choices for future profiles; they are not implicit variations of this one. One UTC day is used in the current profile because it gives a predictable rollover boundary, bounded artifact size, and a stable unit for later disclosure, export, and audit. The gateway, not the pod, is responsible for assigning accepted records to UTC day boundaries.¶
Pod A --\
Pod B ---+--> +------------------+ --> day artifact --> Verifier
Pod C --/ | Gateway |
Control ----> | admit + batch |
plane | assign UTC day |
+------------------+
Verifier --> timestamp channels: OTS / RFC 3161 / peers
Later publication beyond this profile is separate
Figure 1 shows the acceptance handoff and the verifier-facing trust
boundary. Lifecycle systems remain responsible for whether a pod is
admitted; this profile begins at accepted telemetry. The lower line in
the figure is not an additional ingest hop; it shows optional
verifier-side timestamp-validation channels over the same day-artifact
digest. The gateway is expected to maintain UTC time for
ingest_time assignment and day-artifact rollover. The pod is
not required to keep UTC wall-clock time for this profile.¶
In the deployment model assumed here, intermittency primarily applies on the pod-to-gateway path. External timestamping or later publication can also be delayed, but those delays do not change the accepted-telemetry commitment contract once the gateway has admitted the telemetry.¶
A deployment can separately publish verifier-facing manifests or exported evidence bundles through a supply chain integrity, transparency, and trust (SCITT) service only under a publication profile defined elsewhere. Such a publication profile would need to specify the submitted statement content, the submission procedure, and any verifier use of SCITT state. This profile defines none of those behaviors. Verification defined here does not consume SCITT state, and SCITT is not required to create the underlying commitment artifacts.¶
This profile covers processing after accepted telemetry exists:¶
It does not specify manufacturer identity, onboarding, fleet inventory, public key infrastructure (PKI) policy, network admission enforcement, or firmware and update orchestration.¶
These systems are adjacent to this profile; they do not define the accepted-telemetry commitment contract specified here.¶
Certificate Transparency and SCITT are both publication systems: they make externally visible statements available for later audit. This profile instead defines the local evidence contract that exists before any such publication.¶
More concretely, this profile differs from SCITT in that it does not require a transparency service to create or verify its baseline artifacts. It fixes the local accepted-telemetry contract itself: deterministic frame-to-canonical-record projection, authoritative day artifacts, verifier-facing manifests, disclosure classes, and proof binding. A deployment can later publish those outputs through SCITT only if a separate specification defines the publication semantics and any verifier processing of SCITT state. Such publication remains outside baseline verification defined here.¶
This profile also differs from COSE-MERKLE in scope. COSE-MERKLE can supply proof encodings for future disclosure bundles, but this profile fixes the telemetry-specific behavior around those proofs: how admitted telemetry becomes canonical commitment inputs, how daily batching and day chaining are computed, and what verifiers report about exercised scope, executed checks, and skipped checks. RATS and similar attestation systems remain pre-admission inputs; this profile begins only once accepted telemetry exists.¶
For architectural background on transparency-service publication and prospective Merkle proof encodings related to later disclosure workflows, see [SCITT] and [COSE-MERKLE].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Terms:¶
day/YYYY-MM-DD.cbor.¶
blocks/YYYY-MM-DD-00.block.json) exported for convenience. When disclosed, it MUST match the corresponding batch object in the authoritative day artifact.¶
day/YYYY-MM-DD.ots.meta.json, a separate non-authoritative metadata file associated with an OTS proof and authoritative day artifact, linking the artifact digest to the proof path. It is not a commitment input.¶
(dev_id, fc), where fc is a frame counter for device dev_id.¶
YYYY-MM-DD in UTC.¶
In this document, optional parallel attestation channels are not required for baseline conformance. A conforming deployment MUST implement at least one anchoring channel, with OTS as the default channel described here. RFC 3161 timestamp responses and peer signatures MAY be absent entirely; when present, they MUST bind to the same authoritative day-artifact digest and verifiers MUST report their results separately.¶
This section separates the reference wire framing from the reusable commitment contract. The most deployment-specific surface is the framed transport in Section 4.1. The interoperable core is the deterministic frame-to-canonical-record projection, commitment encoding, Merkle calculation, day artifact, disclosure model, and verification behavior.¶
A frame is transported as newline-delimited JSON (NDJSON; [NDJSON]) with fields:¶
{
"hdr": { "dev_id": 101, "msg_type": 1, "fc": 42, "flags": 0 },
"nonce": "base64-24B",
"ct": "base64-ciphertext",
"tag": "base64-16B"
}
This transport profile uses authenticated encryption with associated
data (AEAD) in the sense of [RFC5116]. The wire shape
shown here carries the encrypted payload in ct, carries the
authentication tag separately in tag, and leaves
hdr in cleartext as authenticated associated data.
Gateways MUST validate header field presence, header ranges, and
AEAD authentication before canonical-record emission.¶
hdr.dev_id MUST be an unsigned integer in the range 0..65535.¶
hdr.msg_type MUST be an unsigned integer in the range 0..255.¶
hdr.fc MUST be an unsigned integer in the range 0..(2^32-1).¶
hdr.flags MUST be an unsigned integer in the range 0..255.¶
nonce MUST be base64 text that decodes to exactly 24 bytes.¶
tag MUST be base64 text that decodes to exactly 16 bytes.¶
A conforming transport profile MUST identify the specific AEAD
algorithm, the exact byte encoding used for the associated data
derived from hdr, and the key-distribution method used for
frame validation. For the reference wire shape shown here, the
associated data MUST cover all fields in hdr. A frame whose
cleartext header does not match the header bytes authenticated by the
sender MUST fail validation. The nonce and tag
lengths fixed here are profile-defined transport parameters; they are
not generic AEAD defaults.¶
Frames that fail parse, range, or AEAD validation MUST be rejected before canonical-record commitment and MUST NOT produce committed canonical records.¶
The wire shape in this section is the reference transport profile defined here. Other deployments MAY use a different transport framing if they preserve the acceptance semantics needed to produce the same canonical-record objects under Section 4.3.¶
The minimum pod-side requirements needed to emit such frames are summarized in Appendix C.¶
For framed telemetry, the replay unit is (dev_id, fc).
A gateway MUST commit a canonical record from a frame only if all of
the
following hold:¶
(dev_id, fc).¶
fc is within the configured acceptance window for that device relative to durable replay state.¶
Frames that do not satisfy these conditions MUST NOT produce committed canonical records.¶
The RECOMMENDED default acceptance window is 64 frame counter values
per device. Frames with fc more than window_size
behind the highest accepted counter for a device MUST be rejected.
In the reference gateway profile defined by this document, frames
with fc more than window_size ahead of the highest
accepted counter MUST also be rejected, rather than silently
accepted across a large discontinuity.¶
The acceptance window in this section is counter-based, not a required wall-clock interval. Deployments can size buffering, retry, and resynchronization policy according to the configured connectivity window, but conformance here is defined by durable replay state and accepted counter progression rather than by pod timekeeping.¶
Structured Rejection Evidence¶
Gateways SHOULD produce structured rejection evidence for frames rejected during parsing, header validation, AEAD authentication, anti-replay admission, or continuity-break handling. A rejection record SHOULD include at minimum:¶
dev_id: the received hdr.dev_id if parseable, else null;¶
fc: the received hdr.fc if parseable, else null;¶
stage: a short machine-usable stage indicator such as parse, header_validation, aead_authentication, anti_replay_admission, or continuity;¶
reason: a short machine-usable reason string;¶
observed_at_utc: the gateway-assigned UTC observation time; and¶
frame_sha256: lowercase hexadecimal SHA-256 over the exact received NDJSON octet string, excluding only trailing line terminators.¶
The core rejection reasons defined by this profile are
parse_error, header_range_error,
aead_auth_failure, replay_duplicate,
replay_window_exceeded, continuity_break, and
resync_required. Deployments MAY add more specific reason
values, but they SHOULD preserve these core categories when they
apply.¶
Rejection evidence is an audit artifact and MUST NOT be hashed into ledger commitments. It MUST NOT be represented as accepted telemetry and MUST NOT be used as a substitute for canonical-record artifacts.¶
Replay State Persistence¶
Gateways SHOULD persist replay state across restart. If replay state is lost, gateways SHOULD record a continuity break event and SHOULD NOT silently re-accept counters that could already have been committed.¶
Scope Limitation¶
This profile provides tamper-evidence for committed canonical records. It does not prove the absence of selective pre-commitment drops by a malicious gateway.¶
The frame-to-canonical-record projection transforms a validated, decrypted frame into a canonical record suitable for commitment. The committed canonical record is a structured record derived from the decrypted payload, not a copy of transport bytes.¶
msg_type.¶
A committed canonical record under this profile MUST contain at minimum:¶
Interoperability depends on two distinct layers: the projection contract that maps an accepted frame into a canonical-record object, and the commitment profile that serializes that canonical-record object and reduces the resulting digests. Independent implementations claiming the same result MUST agree on both layers.¶
A commitment profile or deployment profile claiming conformance MUST fix the type and source of each committed field so independent implementations can construct identical canonical-record bytes.¶
For each committed field, the applicable projection contract MUST state whether the field is transport-derived, payload-derived, gateway-assigned, or deployment metadata-derived. Independent implementations MUST NOT substitute a different field source while claiming the same projection contract.¶
For trackone-canonical-cbor-v1, the committed canonical-record object
has six logical fields: pod_id, fc,
ingest_time, pod_time, kind, and
payload. Its authoritative commitment encoding is a fixed
Concise Binary Object Representation (CBOR) array whose positional
elements are:¶
1;¶
pod_id encoded as an 8-byte byte string;¶
fc;¶
ingest_time;¶
pod_time or null;¶
kind as the profile-defined family discriminator; and¶
payload encoded under the applicable payload family.¶
The profile-specific field definitions are:¶
pod_id MUST be a deterministic pod identifier. When framed telemetry is used, the profile MUST define a deterministic mapping from hdr.dev_id or equivalent deployment alias to pod_id. In reader-facing JSON projections and vector notes, this profile renders the identifier as lowercase hexadecimal text such as 0000000000000065. In authoritative CBOR commitment bytes, the same identifier is encoded as the corresponding 8-byte byte string.¶
fc MUST be the accepted frame counter as a non-negative integer.¶
ingest_time MUST be a UTC integer timestamp fixed by the projection contract.¶
pod_time MUST be either a pod-supplied integer timestamp or null when the pod does not supply one.¶
kind MUST identify the record family under the applicable projection contract. In authoritative CBOR commitment bytes, this field is the numeric family discriminator defined by the commitment profile. For the current profile, the discriminator mapping is Env=1, Pipeline=2, Health=3, and Custom=250.¶
payload MUST be the parsed plaintext object associated with the accepted frame.¶
A different deployment profile MAY define additional logical fields,
but such an extension is not compatible with
trackone-canonical-cbor-v1 unless it is given a distinct
commitment_profile_id and corresponding conformance
vectors.¶
An implementation claiming parity with
trackone-canonical-cbor-v1 MUST reproduce that exact
logical record and its fixed array encoding before applying the
deterministic CBOR rules in Section 4.4.¶
Ciphertext, raw transport bytes, and the authentication tag MUST NOT be part of the committed canonical-record object. The exact payload schema is deployment-specific; the deterministic projection contract is the normative requirement and MUST be published for any commitment profile that claims interoperability.¶
Published conformance vectors for a commitment profile MUST include the post-projection canonical-record objects used as commitment inputs, not only transport frames.¶
This section does not define a new general-purpose CBOR variant. It
records the narrow deterministic CBOR encoding used for commitment
bytes by this profile.
The identifier trackone-canonical-cbor-v1 names this
commitment recipe so verifiers can tell which byte-level rules were
used.¶
The authoritative commitment artifacts, namely CBOR canonical-record artifacts and the canonical day artifact, use a constrained subset of deterministic encoding under Section 4.2.1 of [RFC8949]. For commitment bytes in this profile, the following concrete choices apply:¶
Implementations MUST NOT accept generic CBOR serializers as authoritative commitment encoders. An encoder is acceptable only if it yields the same bytes as these rules.¶
JSON projections of canonical-record artifacts and day artifacts are optional and non-authoritative. They MUST NOT be used as commitment inputs. When produced, such projections SHOULD follow [RFC8785].¶
Device-side or embedded components MAY use other internal encodings,
including different deterministic CBOR layouts optimized for local
constraints. Those encodings are not the authoritative commitment
encoding described here unless they are explicitly identified by a
distinct commitment_profile_id and verified under their own
rules.¶
For a given day D, the current commitment profile computes a
daily root from the canonical-record commitment bytes produced under
Section 4.4. The following steps describe that
calculation.¶
Leaf Digests¶
SHA-256, yielding a 32-byte leaf digest.¶
Digest Ordering¶
Pairwise Reduction¶
SHA-256(left_child_bytes || right_child_bytes), where both operands are raw 32-byte digests.¶
Empty Day¶
SHA-256 digest of zero bytes: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.¶
The resulting daily root is deterministic for the set of committed canonical records. Because the leaf digests are sorted before reduction, the result depends on the committed record set rather than on ingestion order.¶
Any future change to this calculation that alters commitment bytes
(for example, adding domain separation) MUST use a new
commitment_profile_id.¶
The authoritative day artifact is a CBOR-encoded day record produced under Section 4.4. The day record contains the following fields:¶
version (uint): day-record schema version, currently 1.¶
site_id (tstr): site identifier.¶
date (tstr): UTC day label in YYYY-MM-DD form.¶
prev_day_root (tstr): previous day root as 64 lowercase hexadecimal characters.¶
batches (array): array of batch objects.¶
day_root (tstr): deterministic day root as 64 lowercase hexadecimal characters.¶
Each batch object contains:¶
version (uint): batch-record schema version, currently 1.¶
site_id (tstr): site identifier.¶
day (tstr): UTC day label in YYYY-MM-DD form.¶
batch_id (tstr): batch identifier.¶
merkle_root (tstr): batch Merkle root as 64 lowercase hexadecimal characters.¶
count (uint): number of committed canonical records in the batch.¶
leaf_hashes (array of tstr): sorted leaf hashes as lowercase hexadecimal strings.¶
The batch objects embedded in the day artifact are the authoritative batch metadata for verification.¶
count MUST equal the length of leaf_hashes.¶
merkle_root MUST equal the Merkle reduction of that batch's leaf_hashes under Section 4.5.¶
leaf_hashes for the day MUST equal the day's leaf digest multiset from which day_root is computed.¶
day/YYYY-MM-DD.cbor is authoritative. The corresponding
day/YYYY-MM-DD.json file is a projection only.¶
The normative field tables in this section are consistent with the
published commitment-family Concise Data Definition Language (CDDL)
and vector corpus for this profile. An
implementation claiming parity with trackone-canonical-cbor-v1
MUST satisfy this text and reproduce the published machine-readable
artifacts for that profile.¶
Day records include prev_day_root.¶
prev_day_root to 64 zero characters, representing 32 zero bytes.¶
prev_day_root to the previous committed day's day_root.¶
Because day labels are UTC-based, chaining semantics are also defined on UTC day boundaries.¶
Illustrative artifact layout:¶
records/<record-id>.cbor - authoritative canonical records¶
records/<record-id>.json - optional projections¶
day/YYYY-MM-DD.cbor - authoritative canonical day artifact¶
day/YYYY-MM-DD.json - optional projection¶
day/YYYY-MM-DD.verify.json - verifier-facing day manifest¶
blocks/YYYY-MM-DD-00.block.json - optional standalone block-metadata projection of one batch object¶
day/YYYY-MM-DD.cbor.sha256 - convenience digest¶
day/YYYY-MM-DD.cbor.ots - OTS proof¶
day/YYYY-MM-DD.ots.meta.json - OTS binding metadata¶
Deployments MAY store artifacts differently and MAY export them as bundles. The path shapes above are illustrative.¶
Standalone block metadata files are convenience projections of batch objects already carried in the authoritative day artifact. They are not additional commitment inputs. Verifiers that process disclosed standalone block-metadata projections MUST compare them with the corresponding batch object in the authoritative day artifact and reject mismatches.¶
Every verification bundle MUST disclose the
commitment_profile_id. In this profile, the normal
machine-readable disclosure surface is the verifier-facing day manifest
day/YYYY-MM-DD.verify.json. That manifest carries artifact
digests, disclosure class, channel state, and the executed or skipped
verification checks together with the day-scoped verification result.¶
This document therefore uses the verifier manifest as the primary disclosure surface for verifier-visible metadata. A representative manifest shape is defined in Appendix D. Deployment- specific schemas can carry additional operational fields, but they MUST preserve the verifier-facing semantics defined here.¶
At minimum, an OTS sidecar MUST bind:¶
Verifiers MUST recompute the day artifact digest and compare it with the sidecar before accepting any proof validation result.¶
The generic anchoring contract is simple: a gateway computes the SHA-256 digest of the authoritative day artifact and submits that digest to one or more external timestamping channels. Verifiers MUST first recompute the day artifact digest locally; proof validation occurs only after digest binding validation succeeds.¶
A deployment conforming to this profile MUST use at least one anchoring channel. OTS is the default channel described by this document; RFC 3161 and peer signatures are optional parallel channels.¶
time ------------------------------------------------------------>
Pod |--frame-->| |--frame-->| |--frame-->|
Gateway | validate | commit | validate | commit | validate |
|------ accepted records accumulate in one UTC day -------|
| write day/YYYY-MM-DD.cbor |
|---------- submit digest to OTS / RFC 3161 ------------->|
Channel | pending / delayed proof | upgrade |
Verifier | verify later from |
|<---------------- disclosed bundle --------------------->|
Figure 3 illustrates the current lifecycle. The pod-to-gateway transport can be intermittent, while proof completion or later publication can lag behind the authoritative day-artifact write.¶
When [OTS] is used, the gateway stamps
SHA-256(day/YYYY-MM-DD.cbor) and stores an OTS proof plus an
OTS sidecar.¶
OpenTimestamps is referenced here as a deployed public timestamping ecosystem rather than an IETF-standardized proof format. Implementations claiming OTS support depend on the interoperable behavior of the public OTS project, its calendar servers, and compatible client tooling. OTS proof-format interoperability is therefore defined operationally by that ecosystem and its reference implementations.¶
Gateways SHOULD submit to multiple independent calendars to reduce single-calendar unavailability risk.¶
If OTS submission fails, times out, or yields only an
incomplete proof, the gateway MUST still write the
authoritative day artifact and MUST treat OTS as a separate
channel whose state is not yet complete. The gateway MAY
retain a placeholder or incomplete proof artifact and MAY
later replace or upgrade it as additional OTS evidence
becomes available. Until a valid proof is disclosed and
verified, verifiers MUST report the OTS channel as
pending, missing, or failed
according to the disclosed artifacts and local policy,
rather than treating the day artifact itself as invalid. Any
later replacement or upgrade of the OTS proof MUST continue
to bind to the same authoritative day-artifact digest.¶
Gateways MUST retain disclosed OTS proof artifacts for at least as long as the corresponding day artifacts remain available for verification under local retention policy.¶
Verifiers and bundle manifests SHOULD use a consistent status vocabulary for OTS and optional parallel attestation channels:¶
verified: proof validation succeeded for the disclosed artifact binding.¶
pending: a proof exists but is incomplete or awaiting upgrade; this is not equivalent to invalid.¶
missing: the expected proof or channel artifact is absent.¶
failed: validation was attempted and did not succeed.¶
skipped: validation was not attempted because of disclosure class, verifier configuration, or local policy.¶
Whether missing, pending, or skipped
is verifier-fatal depends on the disclosure class, local verifier
policy, and whether the relevant channel is required.¶
Deployments MAY also produce:¶
(site_id, day, day_root, context).¶
When multiple channels are present, verifiers SHOULD validate all available channels independently and report per-channel results.¶
If a verifier is configured in strict mode for optional channels, failure of those channels MUST cause overall verification failure.¶
Verifiers MUST first determine the applicable
commitment_profile_id from disclosed verifier metadata. When
the authoritative day artifact does not carry that identifier
in-band, the verifier MUST obtain it from
day/YYYY-MM-DD.verify.json or an explicitly profiled manifest
with equivalent verifier-visible fields and MUST reject absent or
unsupported values.¶
Verifiers MUST determine the applicable verification scope from the disclosed artifacts, the claimed disclosure class, and local verifier policy. Reported outcomes MUST NOT claim checks or assurances outside that scope.¶
Verifiers SHOULD apply checks in the following fail-fast order, subject to the claimed disclosure class:¶
commitment_profile_id, and report bundle_disclosure_validation.¶
day_artifact_validation and verification_manifest_validation as applicable.¶
day_root. Compare the recomputed result to the authoritative day_root, and report record_level_recompute and batch_metadata_validation.¶
record_level_recompute in checks_skipped. Deployment-specific withheld-material checks MAY be reported only through extension names beginning with x-.¶
record_level_recompute and batch_metadata_validation in checks_skipped as out of scope, and treat the result as anchor-only evidence.¶
SHA-256(day/YYYY-MM-DD.cbor) and compare it to the sidecar artifact_sha256, and report day_digest_binding.¶
ots_verification.¶
tsa_verification or peer_quorum_verification as applicable.¶
When batch metadata is within the exercised verification scope, verifiers MUST apply the following checks before accepting a result:¶
count equals the length of its leaf_hashes;¶
merkle_root equals the Merkle reduction of its leaf_hashes;¶
leaf_hashes equals the leaf digest multiset derived from disclosed canonical records when canonical-record artifacts are available; and¶
Verifier implementations SHOULD expose machine-usable failure categories:¶
commitment_profile_id,¶
Verifier output SHOULD state the claimed disclosure class, the verification scope actually exercised, the per-channel proof status, which checks were executed, which checks were skipped, and whether the resulting claim is public recompute, partial verification, or anchor-only evidence.¶
Standardized Check Identifiers¶
When verifier-facing manifests or verifier results report
checks_executed or checks_skipped, this profile
defines the following interoperable check identifiers:¶
bundle_disclosure_validation: disclosure-class sufficiency and commitment_profile_id presence were validated.¶
verification_manifest_validation: the verifier-facing manifest was validated.¶
day_artifact_validation: the authoritative day artifact was validated structurally and semantically under the claimed profile.¶
record_level_recompute: record-level recomputation from disclosed canonical-record artifacts was performed.¶
batch_metadata_validation: authoritative or disclosed batch metadata was validated against the day artifact and disclosed record material within scope.¶
day_digest_binding: the recomputed SHA-256(day/YYYY-MM-DD.cbor) digest was compared with disclosed binding metadata.¶
ots_verification: the OTS proof channel was validated.¶
tsa_verification: the RFC 3161 timestamp channel was validated.¶
peer_quorum_verification: the peer-signature quorum channel was validated.¶
A manifest or verifier result that reports one of these standardized
checks MUST use the exact identifier listed here. For any
standardized check whose applicability conditions are met within the
exercised verification scope, the manifest or verifier result MUST
report that check exactly once in either checks_executed or
checks_skipped. The same standardized identifier MUST NOT
appear in both lists and MUST NOT appear more than once. Silent
omission of an applicable standardized check is non-conformant.¶
Applicability is determined as follows:¶
bundle_disclosure_validation and day_artifact_validation apply whenever verification proceeds on a disclosed bundle.¶
verification_manifest_validation applies when a verifier-facing manifest is disclosed or consumed to obtain verifier-visible metadata.¶
record_level_recompute, batch_metadata_validation, and day_digest_binding apply. If required artifacts for one of these checks are absent, that check MUST appear in checks_skipped with a reason indicating insufficient disclosure or missing artifacts.¶
batch_metadata_validation and day_digest_binding apply when the corresponding artifacts are disclosed. If withheld material prevents public recomputation, record_level_recompute MUST appear in checks_skipped.¶
record_level_recompute and batch_metadata_validation MUST appear in checks_skipped as out of scope, while day_digest_binding applies when the day artifact and binding metadata are disclosed.¶
ots_verification, tsa_verification, and peer_quorum_verification apply only when the corresponding channel is disclosed or required by verifier policy.¶
Additional deployment-specific checks MAY be reported, but they MUST
NOT redefine these identifiers and MUST use a distinct extension
name beginning with x-.¶
Verifier output MUST NOT be represented as proving more than the exercised verification scope. In particular, a successful result does not by itself establish dataset completeness, physical truth of measurements, or suitability for autonomous actuation or sanctions.¶
Verification claims depend on what artifacts are disclosed. This profile defines three disclosure classes.¶
A verifier claim for any disclosure class MUST be limited to the verification scope supported by the disclosed artifacts.¶
Class A is the public-recompute case. A Class A bundle MUST include:¶
A Class A bundle SHOULD also include the verifier-facing day manifest
and MUST record the commitment_profile_id.¶
Class A permits record-level recomputation, batch-metadata validation, day-root recomputation, and anchor validation when the corresponding artifacts are disclosed and checked.¶
Class B is the controlled-disclosure case. Class B outputs MUST NOT be represented as publicly recomputable. A Class B bundle SHOULD include the canonical day artifact, any disclosed standalone block-metadata projections, at least one timestamp proof plus its binding metadata, any disclosed commitments covering withheld material, and a policy artifact describing the withheld or partitioned material.¶
This document defines the reporting boundary for Class B but does not
require one universal withheld-material artifact format. Class B
validation is therefore limited to the authoritative day artifact,
disclosed batch metadata, any disclosed withheld-material commitments,
and any anchor channels present in the bundle. Verifier output SHOULD
explicitly state when record-level recomputation was partial or was not
attempted for withheld material. If deployment-specific checks are
reported for withheld-material commitments or policy artifacts, they
MUST use extension names beginning with x-.¶
A Class C disclosure MUST be labeled as existence and timestamp evidence only and MUST NOT claim record-level reproducibility.¶
A Class C bundle MUST include:¶
commitment_profile_id.¶
Class C verification validates artifact-digest binding and external timestamp evidence only. It does not establish record-level reproducibility.¶
Class C verifier output SHOULD be reported as anchor-only evidence.¶
Bundle Selection Guidance¶
The verifier-facing manifest MUST include:¶
This profile has several independent version surfaces:¶
-00, -01) is editorial and is not part of commitment output.¶
version fields in day and batch records.¶
commitment_profile_id identifies the canonical CBOR, hash, and Merkle rules that define commitment outputs.¶
The commitment profile defined in this document is
trackone-canonical-cbor-v1. If a verifier encounters an unsupported
commitment_profile_id, it MUST reject the verification claim
rather than silently using a fallback interpretation.¶
This revision defines exactly one commitment_profile_id and
does not define an allocation policy or registry for additional
profile identifiers. Future commitment_profile_id values are
out of scope for this document and would require separate
specification and review.¶
Bundles disclose the applicable commitment_profile_id via the
verifier-facing day manifest. The required OTS sidecar metadata does
not currently carry that identifier.¶
Determinism claims in this profile are testable. Implementations that
claim conformance to a published commitment profile MUST be able to
reproduce its published machine-readable corpus. For
trackone-canonical-cbor-v1, the authoritative
commitment-family CDDL and vector corpus define the machine-readable
conformance artifacts for this profile. The appendix in this document
is explanatory only.¶
Published vector sets should include coverage for:¶
Cross-implementation checks MUST verify byte-for-byte parity across independent implementations. Any mismatch in canonical bytes or roots is a conformance failure.¶
Published vector bundles MUST include the
commitment_profile_id.¶
This profile does not introduce new cryptographic primitives. Its security depends on correct AEAD use on the transport path, deterministic commitment encoding, trustworthy gateway admission and timekeeping, accurate verifier reporting, and disciplined artifact and proof handling. The threats below are stated in the attack-and- remediation style described by [RFC3552]. Unless explicitly stated otherwise, a successful verification result establishes only that the disclosed artifacts are internally consistent with this profile and with any validated proof channels.¶
Gateway Compromise and Pre-Commit Omission¶
An attacker can compromise the gateway or the local admission path and then fabricate accepted telemetry, suppress frames before commitment, or assign accepted frames to the wrong device or UTC day. This profile does not by itself detect a malicious gateway; it makes committed outputs tamper-evident only after commitment. Deployments that need stronger assurances should harden and audit the gateway, protect admission and replay state, monitor time sources, and add independent observation, device attestation inputs, or admission-path audit evidence.¶
Replay and Duplicate Submission¶
An attacker can replay a previously observed frame or resubmit a frame
with reused (dev_id, fc) values in an attempt to create
duplicate committed records or counter ambiguity. Gateways mitigate
this by enforcing single-consumption of the replay unit
(dev_id, fc), by rejecting counters outside the configured
acceptance window, and by recording continuity-break conditions
instead of silently re-accepting ambiguous counters after
replay-state loss.¶
Nonce Misuse and Transport-Key Compromise¶
An attacker can recover plaintext or forge framed transport messages if AEAD keys are disclosed, if nonce uniqueness fails under a key, or if weak randomness makes future nonces predictable. Implementations mitigate this by rejecting frames that fail AEAD authentication before commitment, by requiring fresh 24-byte transport nonces, and by using strong pseudorandom generation with explicit seed discipline. Reuse of a nonce under the same AEAD key can invalidate confidentiality and can also invalidate integrity, depending on the AEAD algorithm. This profile therefore depends on deployment key management to prevent unsafe key and nonce reuse and to retire compromised keys.¶
Canonicalization, Profile, and Metadata Confusion¶
An attacker can exploit differences in parsing, field typing, record
ordering, hash composition, or non-authoritative metadata handling
while implementations still claim the same
commitment_profile_id. An attacker can also present a
verifier-facing manifest, block-metadata projection, or OTS sidecar
that does not match the authoritative day artifact in the hope that a
verifier will treat convenience metadata as authoritative. The
mitigation is that this profile fixes deterministic encoding and hash
rules, treats the authoritative day artifact as the cryptographic
source of truth, requires verifiers to recompute commitment material
from authoritative artifacts, and requires standalone metadata
projections and sidecars to match the authoritative artifact. Any
future semantic or hash-composition change MUST use a new
commitment_profile_id.¶
Artifact Mutation and Proof Substitution¶
An attacker can modify a committed day artifact after disclosure, or can present a valid proof over the wrong artifact digest. The mitigation is that verifiers recompute the authoritative day-artifact digest independently and compare it with the disclosed binding metadata before accepting any proof result. Mutation or substitution therefore changes the digest or its binding and causes verification to fail.¶
Calendar Withholding and Optional-Channel Downgrade¶
An attacker can operate or compromise a calendar service so that proof
issuance is delayed, withheld, or selectively unavailable, can present
pending or placeholder proofs as if they were final attestations, or
can exploit verifier policy that silently ignores a missing required
channel. Implementations mitigate this by treating timestamping and
other attestations as separate channels, by disclosing per-channel
status explicitly, by distinguishing pending,
missing, and failed from verified, and by
binding every exercised channel to the same authoritative day-artifact
digest. Using multiple independent calendars reduces but does not
eliminate coordinated withholding risk. Verifier policy must make
clear which channels are required and must not treat an unverified
required channel as success.¶
Time-Source Manipulation¶
An attacker can alter the gateway clock or day-rollover configuration
so that accepted records are assigned to the wrong UTC day or are
given misleading ingest_time values. The pod is not the time
authority in this profile; the gateway is. Implementations therefore
mitigate this by maintaining a trustworthy gateway time source,
monitoring rollover behavior, and treating UTC day assignment as a
security-relevant operational function. Verification can detect
internal inconsistencies in disclosed artifacts, but it cannot
reconstruct true real-world time if the gateway time base was wrong at
acceptance.¶
Resource Exhaustion¶
An attacker can flood a deployment with malformed, replayed, or excessive-rate frames in order to exhaust buffering, replay-state storage, artifact storage, or verifier computation. Implementations mitigate this by rejecting malformed or AEAD-invalid frames before commitment, bounding acceptance windows and retained replay state, sizing local storage and retention policy explicitly, and applying rate limits or other admission controls to untrusted senders. This profile does not define a complete denial-of-service defense.¶
Verification Scope, Completeness, and Disclosure¶
An attacker can rely on a successful verification result being misread as proof of dataset completeness, physical truth of measurements, or authorization for autonomous actuation. An attacker can also obtain sensitive information if disclosed bundles expose more record material than intended for the chosen disclosure class. This profile mitigates those risks only partially: verifier output is required to state the exercised verification scope, a successful result establishes internal consistency and proof binding for the disclosed bundle rather than completeness of all observed or emitted frames, and disclosure classes constrain what is expected to be published. Deployments that need stronger completeness, safety, or confidentiality guarantees must add external operational controls, independent observation, and access-control and retention policies that match the sensitivity of the disclosed artifacts.¶
Telemetry payloads can include sensitive operational data. Operators should:¶
Privacy-preserving disclosures remain valid, but they MUST NOT be described as publicly recomputable unless Class A conditions are met.¶
This section follows the guidance in [RFC8126] and provides the complete instructions requested of the Internet Assigned Numbers Authority (IANA).¶
IANA is requested to register the following media type in the standards tree of the "Media Types" registry in accordance with [RFC6838]:¶
Type name: application¶
Subtype name: trackone-day+cbor¶
Required parameters: n/a¶
Optional parameters: n/a¶
Encoding considerations: binary¶
Security considerations: see Section 10.¶
Interoperability considerations: this media type identifies the authoritative day artifact defined by Section 4.4, Section 4.5, Section 4.6, and Section 4.7.¶
Published specification: this document, especially Section 4.4, Section 4.5, Section 4.6, and Section 4.7.¶
Applications that use this media type: gateways, verifiers, disclosure tooling, and archival or audit systems that exchange or retain authoritative day artifacts.¶
Fragment identifier considerations: no fragment identifier syntax is
defined by this document for application/trackone-day+cbor.
Fragment identifiers for this media type are processed according to
the +cbor structured syntax suffix rules in
[RFC8949].¶
Additional information:¶
Person & email address to contact for further information: Bilal El Khatabi <elkhatabibilal@gmail.com>¶
Intended usage: COMMON¶
Restrictions on usage: none¶
Author: Bilal El Khatabi¶
Change controller: IESG¶
This document requests no new CBOR tag allocation. Commitment bytes defined by Section 4.4 forbid CBOR tags, and the authoritative day artifact defined by Section 4.6 does not require additional tag semantics for exchange.¶
This document requests no IANA registry for
commitment_profile_id. This revision defines only the
document-specific identifier trackone-canonical-cbor-v1 and
does not establish a registry or general allocation mechanism for
future commitment-profile identifiers.¶
This document also requests no CoAP Content-Format entry and no separate media-type registration for the verifier-facing day manifest.¶
This appendix shows a representative verifier-facing day manifest. A concrete deployment schema can carry additional operational fields, but the example below captures the verification surface described here.¶
{
"version": 1,
"date": "2025-10-07",
"site": "an-001",
"device_id": "pod-003",
"frame_count": 7,
"records_dir": "records",
"frames_file": "frames.ndjson",
"artifacts": {
"day_cbor": {
"path": "day/2025-10-07.cbor",
"sha256": "<64 hex chars>"
},
"day_json": {
"path": "day/2025-10-07.json",
"sha256": "<64 hex chars>"
},
"day_ots": {
"path": "day/2025-10-07.cbor.ots",
"sha256": "<64 hex chars>"
},
"day_ots_meta": {
"path": "day/2025-10-07.ots.meta.json",
"sha256": "<64 hex chars>"
}
},
"anchoring": {
"policy": { "mode": "warn" },
"channels": {
"ots": { "enabled": true, "status": "pending" },
"tsa": {
"enabled": false,
"status": "skipped",
"reason": "disabled"
},
"peers": {
"enabled": false,
"status": "skipped",
"reason": "disabled"
}
},
"overall": "success"
},
"verification_bundle": {
"disclosure_class": "A",
"commitment_profile_id": "trackone-canonical-cbor-v1",
"checks_executed": [
"bundle_disclosure_validation",
"day_artifact_validation",
"verification_manifest_validation",
"record_level_recompute",
"batch_metadata_validation",
"day_digest_binding",
"ots_verification"
],
"checks_skipped": [
{ "check": "tsa_verification", "reason": "disabled" },
{ "check": "peer_quorum_verification", "reason": "disabled" }
]
},
"verifier": {
"verification": {
"commitment_profile_id": "trackone-canonical-cbor-v1",
"disclosure_class": "A"
},
"channels": {
"ots": { "enabled": true, "status": "pending" }
},
"overall": "success"
}
}
The authoritative machine-readable conformance vector corpus for
trackone-canonical-cbor-v1 is published at
[TRACKONE]. The figure below is a reader-oriented
sketch of the bundle shape and naming only; it is not the
authoritative vector source.¶
Wrapped hexadecimal values in this appendix are presentation-only; a verifier or implementer should concatenate adjacent lines without inserting whitespace.¶
The fixtures below are reader-oriented logical record sketches, not the authoritative CBOR array encoding. They show the current post-projection logical content and the active commitment profile identifier, while the published vector corpus carries the exact encoded bytes and digests.¶
In these reader-oriented sketches, kind is shown using the
symbolic family name. In authoritative CBOR commitment bytes, the
same field carries the numeric discriminator defined by the current
profile; for the fixtures below, Custom corresponds to
250.¶
commitment_profile_id: trackone-canonical-cbor-v1 fixture record_a: pod_id: "0000000000000065" fc: 1 ingest_time: 1772366400 pod_time: null kind: Custom payload.temp_c: 21.5 fixture record_b: pod_id: "0000000000000066" fc: 2 ingest_time: 1772367000 pod_time: null kind: Custom payload.temp_c: 22.0 fixture record_c: pod_id: "0000000000000067" fc: 3 ingest_time: 1772367600 pod_time: null kind: Custom payload.temp_c: 22.5 class-a-bundle-v1: disclosure_class: A commitment_profile_id: trackone-canonical-cbor-v1 required_artifact_1: records/<record-id>.cbor required_artifact_2: day/YYYY-MM-DD.cbor required_artifact_3: day/YYYY-MM-DD.cbor.ots required_artifact_4: day/YYYY-MM-DD.ots.meta.json verifier_check_1: bundle_disclosure_validation verifier_check_2: day_artifact_validation verifier_check_3: record_level_recompute verifier_check_4: batch_metadata_validation verifier_check_5: day_digest_binding verifier_check_6: ots_verification
The published machine-readable vector set carries the exact canonical
bytes, digests, expected roots, and the applicable
commitment_profile_id. This appendix remains illustrative and
is not an authoritative conformance corpus.¶
This appendix records the minimum expectations for a constrained pod that emits framed telemetry under the reference transport profile used in this document. It is descriptive of the deployment model assumed here, not a claim that all conforming deployments share identical hardware.¶
In the deployment model assumed here, the intermittency assumption
primarily applies on the pod-to-gateway path. The gateway is expected
to maintain UTC time for ingest_time assignment, day-artifact
rollover, and verifier-facing day labels. External timestamping or
publication channels can also be delayed, but those delays do not
change the pod-side framing requirements.¶
This appendix gives a representative Concise Data Definition Language (CDDL) ([RFC8610]) shape for the verifier-facing day manifest. It captures the verification surface described here and leaves room for deployment-specific additions, provided those additions do not remove or change the verifier-facing semantics defined here.¶
Check names are drawn from the standardized vocabulary defined in
Section 6.4; deployment-specific extensions MUST use
separate names beginning with x- that do not redefine those
identifiers.¶
verification-manifest = {
"version": 1,
"date": tstr,
"site": tstr,
? "device_id": tstr,
? "frame_count": uint,
? "frames_file": tstr,
? "records_dir": tstr,
"artifacts": artifacts,
"anchoring": anchoring,
"verification_bundle": verification-bundle,
? "verifier": verifier-result,
* tstr => any-data
}
artifacts = {
"day_cbor": artifact-ref,
? "day_json": artifact-ref,
? "day_sha256": artifact-ref,
? "block": artifact-ref,
? "day_ots": artifact-ref,
? "day_ots_meta": artifact-ref,
* tstr => artifact-ref
}
artifact-ref = {
"path": tstr,
"sha256": hex64
}
anchoring = {
? "policy": { * tstr => any-data },
"channels": {
? "ots": channel-status,
? "tsa": channel-status,
? "peers": channel-status
},
? "overall": tstr,
* tstr => any-data
}
verification-bundle = {
"disclosure_class": disclosure-class,
"commitment_profile_id": tstr,
"checks_executed": [* check-name],
"checks_skipped": [* skipped-check],
* tstr => any-data
}
check-name = standardized-check-name / extension-check-name
standardized-check-name =
"bundle_disclosure_validation" /
"verification_manifest_validation" /
"day_artifact_validation" /
"record_level_recompute" /
"batch_metadata_validation" /
"day_digest_binding" /
"ots_verification" /
"tsa_verification" /
"peer_quorum_verification"
extension-check-name = tstr .regexp "^x-[A-Za-z0-9._-]+$"
skipped-check = {
"check": check-name,
"reason": tstr
}
verifier-result = {
? "policy": { * tstr => any-data },
? "verification": {
"commitment_profile_id": tstr,
"disclosure_class": disclosure-class,
* tstr => any-data
},
? "checks": { * tstr => bool },
? "checks_executed": [* check-name],
? "checks_skipped": [* skipped-check],
? "channels": {
? "ots": channel-status,
? "tsa": channel-status,
? "peers": channel-status
},
? "overall": tstr,
* tstr => any-data
}
channel-status = {
? "enabled": bool,
"status":
"verified" / "pending" / "missing" / "failed" / "skipped",
? "reason": tstr,
? "detail": tstr,
* tstr => any-data
}
disclosure-class = "A" / "B" / "C"
hex64 = text .regexp "[0-9a-f]{64}"
any-data =
nil / bool / int / float / tstr / bstr /
[* any-data] / { * tstr => any-data }
¶
Early structural drafts of this document were prepared with AI writing assistance. All technical content, design decisions, and normative requirements were reviewed against available implementation artifacts.¶
The author thanks the OpenTimestamps project for the public calendar infrastructure used during validation.¶