Independent Submission B. El Khatabi Internet-Draft TrackOne Project Intended status: Informational 17 April 2026 Expires: 19 October 2026 Verifiable Telemetry Ledgers for Resource-Constrained Environments draft-elkhatabi-verifiable-telemetry-ledgers-03 Abstract This document specifies a verifiable telemetry ledger profile for accepted telemetry in resource-constrained sensing environments. The profile begins after local policy has admitted a pod and the gateway accepts its framed telemetry under the active transport and anti- replay contract. From that point onward, it defines deterministic frame-to-canonical-record projection, authoritative canonical-record and day artifacts, verifier-facing manifests, disclosure classes, and the binding of day artifacts to external timestamp evidence. OpenTimestamps (OTS) is the default anchoring channel; RFC 3161 timestamp responses and peer signatures are optional parallel channels. The goal is interoperability and independent auditability, not a full device-lifecycle system or new cryptographic primitives. Verification claims are limited by the disclosed artifacts, the claimed disclosure class, and the checks the verifier actually executes. A successful result establishes internal consistency and correct proof binding for the disclosed bundle; it does not by itself establish dataset completeness, physical truth of measurements, or safety for autonomous actuation. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 19 October 2026. El Khatabi Expires 19 October 2026 [Page 1] Internet-Draft TrackOne VTL April 2026 Copyright Notice Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Scope Boundary . . . . . . . . . . . . . . . . . . . . . 4 1.2. Relationship to Publication and Adjacent Systems . . . . 4 2. Conventions and Terminology . . . . . . . . . . . . . . . . . 6 3. System Roles . . . . . . . . . . . . . . . . . . . . . . . . 7 4. Data and Commitment Model . . . . . . . . . . . . . . . . . . 8 4.1. Frame Contract . . . . . . . . . . . . . . . . . . . . . 8 4.2. Anti-Replay Admission Criterion . . . . . . . . . . . . . 9 4.3. Frame-to-Canonical-Record Projection . . . . . . . . . . 11 4.4. Deterministic Concise Binary Object Representation (CBOR) Commitment Encoding . . . . . . . . . . . . . . . . . . . 13 4.5. Deterministic Commitment Tree Calculation . . . . . . . . 14 4.6. Day Artifact Schema . . . . . . . . . . . . . . . . . . . 15 4.7. Day Chaining . . . . . . . . . . . . . . . . . . . . . . 17 5. Artifacts and Verification Bundles . . . . . . . . . . . . . 17 6. Anchoring and Verification . . . . . . . . . . . . . . . . . 18 6.1. Anchoring Contract . . . . . . . . . . . . . . . . . . . 18 6.2. OTS Anchoring Profile . . . . . . . . . . . . . . . . . . 19 6.2.1. OTS Anchoring Lifecycle . . . . . . . . . . . . . . . 19 6.2.2. Handling Delayed or Failed Anchoring . . . . . . . . 20 6.2.3. Proof Status Vocabulary . . . . . . . . . . . . . . . 20 6.3. Optional Parallel Attestation . . . . . . . . . . . . . . 20 6.4. Verification . . . . . . . . . . . . . . . . . . . . . . 21 7. Disclosure Classes . . . . . . . . . . . . . . . . . . . . . 24 8. Versioning . . . . . . . . . . . . . . . . . . . . . . . . . 26 9. Conformance Vectors . . . . . . . . . . . . . . . . . . . . . 27 10. Security Considerations . . . . . . . . . . . . . . . . . . . 28 11. Privacy Considerations . . . . . . . . . . . . . . . . . . . 31 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 31 12.1. Media Types Registry . . . . . . . . . . . . . . . . . . 31 12.2. No CBOR Tag Allocation . . . . . . . . . . . . . . . . . 32 12.3. No commitment_profile_id Registry . . . . . . . . . . . 32 13. Interoperability Notes and Open Questions . . . . . . . . . . 32 14. References . . . . . . . . . . . . . . . . . . . . . . . . . 33 14.1. Normative References . . . . . . . . . . . . . . . . . . 33 El Khatabi Expires 19 October 2026 [Page 2] Internet-Draft TrackOne VTL April 2026 14.2. Informative References . . . . . . . . . . . . . . . . . 33 Appendix A. Example Verification Manifest . . . . . . . . . . . 35 Appendix B. Illustrative Conformance Vector Bundle . . . . . . . 36 Appendix C. Minimal Pod Requirements . . . . . . . . . . . . . . 39 Appendix D. Verification Manifest CDDL . . . . . . . . . . . . . 40 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 42 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 42 1. Introduction Long-lived telemetry deployments need evidence that disclosed telemetry is the same telemetry a gateway committed when it was accepted, even when uplink is intermittent and verification happens later. This profile standardizes the gateway-side commitment contract for accepted telemetry. In this document, that contract is the set of deterministic rules for frame-to-canonical-record projection, commitment encoding, day-artifact structure, verifier-facing manifests, disclosure classes, and proof binding. The profile begins at an explicit handoff. Before this profile applies, lifecycle or control-plane systems determine whether a pod is known, onboarded, admitted, credentialed, and allowed to send. This profile begins once local policy has accepted telemetry under the active transport and anti-replay contract and then turns that telemetry into authoritative, verifier-facing evidence. Device reporting cadence and gateway artifact cadence are distinct. A pod can report at fixed or irregular intervals, but this profile uses one Coordinated Universal Time (UTC) day as the batching unit for authoritative artifacts. Other batching intervals are possible design choices for future profiles; they are not implicit variations of this one. One UTC day is used in the current profile because it gives a predictable rollover boundary, bounded artifact size, and a stable unit for later disclosure, export, and audit. The gateway, not the pod, is responsible for assigning accepted records to UTC day boundaries. Pod A --\ Pod B ---+--> +------------------+ --> day artifact --> Verifier Pod C --/ | Gateway | Control ----> | admit + batch | plane | assign UTC day | +------------------+ Verifier --> timestamp channels: OTS / RFC 3161 / peers Later publication beyond this profile is separate El Khatabi Expires 19 October 2026 [Page 3] Internet-Draft TrackOne VTL April 2026 Figure 1: Reference Architecture and Trust Boundaries Figure 1 shows the acceptance handoff and the verifier-facing trust boundary. Lifecycle systems remain responsible for whether a pod is admitted; this profile begins at accepted telemetry. The lower line in the figure is not an additional ingest hop; it shows optional verifier-side timestamp-validation channels over the same day- artifact digest. The gateway is expected to maintain UTC time for ingest_time assignment and day-artifact rollover. The pod is not required to keep UTC wall-clock time for this profile. In the deployment model assumed here, intermittency primarily applies on the pod-to-gateway path. External timestamping or later publication can also be delayed, but those delays do not change the accepted-telemetry commitment contract once the gateway has admitted the telemetry. A deployment can separately publish verifier-facing manifests or exported evidence bundles through a supply chain integrity, transparency, and trust (SCITT) service only under a publication profile defined elsewhere. Such a publication profile would need to specify the submitted statement content, the submission procedure, and any verifier use of SCITT state. This profile defines none of those behaviors. Verification defined here does not consume SCITT state, and SCITT is not required to create the underlying commitment artifacts. 1.1. Scope Boundary This profile covers processing after accepted telemetry exists: * frame validation, anti-replay, and canonical record admission; * deterministic batching into authoritative artifacts; * verifier-facing manifests, disclosure, and export behavior; and * artifact hashing, anchoring, and independent verification. It does not specify manufacturer identity, onboarding, fleet inventory, public key infrastructure (PKI) policy, network admission enforcement, or firmware and update orchestration. 1.2. Relationship to Publication and Adjacent Systems El Khatabi Expires 19 October 2026 [Page 4] Internet-Draft TrackOne VTL April 2026 * _Certificate Transparency_ ([RFC9162]): Certificate Transparency logs publish append-only records about certificate issuance. They are a useful analogy for later transparency publication and audit, but they do not define the local commitment artifacts, disclosure classes, or baseline verification behavior specified here. * _Supply Chain Integrity, Transparency, and Trust (SCITT)_ ([SCITT]): SCITT publishes claims about verifier manifests or exported evidence bundles only when a deployment separately defines such publication across a transparency-service trust boundary. Verifiers defined here do not consume SCITT state. * _COSE Merkle Tree Proofs_ ([COSE-MERKLE]): COSE-MERKLE defines proof encodings that future disclosure bundles could adopt. * _Remote ATtestation procedureS (RATS)_ ([RFC9334]): RATS can supply attestation inputs that influence admission decisions before this profile applies. These systems are adjacent to this profile; they do not define the accepted-telemetry commitment contract specified here. Certificate Transparency and SCITT are both publication systems: they make externally visible statements available for later audit. This profile instead defines the local evidence contract that exists before any such publication. More concretely, this profile differs from SCITT in that it does not require a transparency service to create or verify its baseline artifacts. It fixes the local accepted-telemetry contract itself: deterministic frame-to-canonical-record projection, authoritative day artifacts, verifier-facing manifests, disclosure classes, and proof binding. A deployment can later publish those outputs through SCITT only if a separate specification defines the publication semantics and any verifier processing of SCITT state. Such publication remains outside baseline verification defined here. This profile also differs from COSE-MERKLE in scope. COSE-MERKLE can supply proof encodings for future disclosure bundles, but this profile fixes the telemetry-specific behavior around those proofs: how admitted telemetry becomes canonical commitment inputs, how daily batching and day chaining are computed, and what verifiers report about exercised scope, executed checks, and skipped checks. RATS and similar attestation systems remain pre-admission inputs; this profile begins only once accepted telemetry exists. El Khatabi Expires 19 October 2026 [Page 5] Internet-Draft TrackOne VTL April 2026 For architectural background on transparency-service publication and prospective Merkle proof encodings related to later disclosure workflows, see [SCITT] and [COSE-MERKLE]. 2. Conventions and Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. Terms: * Frame: One UTF-8 JavaScript Object Notation (JSON) text serialized as a single newline-delimited record, containing header and authenticated encryption with associated data (AEAD; [RFC5116]) fields ([NDJSON]). * Canonical record: Canonical telemetry record admitted after gateway validation and projection. The term refers to the committed record shape, not to physical truth of the underlying measurement. * Commitment profile: The serialization, hash, and Merkle rules that produce deterministic commitment outputs. * Commitment contract: The full interoperable commitment behavior defined by this profile, including accepted frame admission, frame-to-canonical-record projection, commitment encoding, day- artifact structure, verifier-facing manifests, disclosure classes, and verification rules. The commitment profile is one component of this broader contract. * Connectivity window: The deployment-defined maximum outage or buffering interval across which a pod or an adjacent trusted transport component must preserve enough durable state to retransmit or disambiguate counters without replay ambiguity. It is not itself a requirement that the pod keep UTC wall-clock time. * Day artifact: The authoritative canonical day record written as day/YYYY-MM-DD.cbor. * Authoritative: Used for the canonical artifact that verifiers MUST treat as the cryptographic source of truth. * Projection: A non-authoritative representation (for example JSON) derived from an authoritative artifact. El Khatabi Expires 19 October 2026 [Page 6] Internet-Draft TrackOne VTL April 2026 * Block metadata: A standalone projection of a batch object (for example blocks/YYYY-MM-DD-00.block.json) exported for convenience. When disclosed, it MUST match the corresponding batch object in the authoritative day artifact. * OTS metadata sidecar: day/YYYY-MM-DD.ots.meta.json, a separate non-authoritative metadata file associated with an OTS proof and authoritative day artifact, linking the artifact digest to the proof path. It is not a commitment input. * Anchor evidence: The proof artifacts and binding metadata disclosed for an external timestamping or attestation channel. * Peer signature quorum: A deployment-defined set or threshold of peer signatures over the same day-artifact digest or day root, treated as one optional parallel attestation channel. * Replay unit: The pair (dev_id, fc), where fc is a frame counter for device dev_id. * Verification scope: The set of disclosed artifacts, checks executed, and claim boundaries that a verifier actually asserts for a verification result. * Day boundary: A UTC calendar day boundary. Day labels in this profile use YYYY-MM-DD in UTC. * Disclosure class: The level of artifact disclosure associated with a verification claim. 3. System Roles In this document, optional parallel attestation channels are not required for baseline conformance. A conforming deployment MUST implement at least one anchoring channel, with OTS as the default channel described here. RFC 3161 timestamp responses and peer signatures MAY be absent entirely; when present, they MUST bind to the same authoritative day-artifact digest and verifiers MUST report their results separately. * Device (Pod): Produces framed telemetry. * Gateway: Validates, decrypts, applies anti-replay, projects canonical records, batches, and anchors day artifacts. * Verifier: Recomputes commitments and validates proofs from disclosed artifacts. El Khatabi Expires 19 October 2026 [Page 7] Internet-Draft TrackOne VTL April 2026 * OTS Calendar(s): Provides OTS attestations for day artifact hashes. * Timestamp authority (TSA): An RFC 3161 timestamp authority over the same digest, when that optional channel is used. * Peers: Co-sign daily roots for short-term provenance, when that optional channel is used. 4. Data and Commitment Model This section separates the reference wire framing from the reusable commitment contract. The most deployment-specific surface is the framed transport in Section 4.1. The interoperable core is the deterministic frame-to-canonical-record projection, commitment encoding, Merkle calculation, day artifact, disclosure model, and verification behavior. 4.1. Frame Contract A frame is transported as newline-delimited JSON (NDJSON; [NDJSON]) with fields: { "hdr": { "dev_id": 101, "msg_type": 1, "fc": 42, "flags": 0 }, "nonce": "base64-24B", "ct": "base64-ciphertext", "tag": "base64-16B" } Figure 2 This transport profile uses authenticated encryption with associated data (AEAD) in the sense of [RFC5116]. The wire shape shown here carries the encrypted payload in ct, carries the authentication tag separately in tag, and leaves hdr in cleartext as authenticated associated data. Gateways MUST validate header field presence, header ranges, and AEAD authentication before canonical-record emission. * hdr.dev_id MUST be an unsigned integer in the range 0..65535. * hdr.msg_type MUST be an unsigned integer in the range 0..255. * hdr.fc MUST be an unsigned integer in the range 0..(2^32-1). * hdr.flags MUST be an unsigned integer in the range 0..255. El Khatabi Expires 19 October 2026 [Page 8] Internet-Draft TrackOne VTL April 2026 * nonce MUST be base64 text that decodes to exactly 24 bytes. * tag MUST be base64 text that decodes to exactly 16 bytes. A conforming transport profile MUST identify the specific AEAD algorithm, the exact byte encoding used for the associated data derived from hdr, and the key-distribution method used for frame validation. For the reference wire shape shown here, the associated data MUST cover all fields in hdr. A frame whose cleartext header does not match the header bytes authenticated by the sender MUST fail validation. The nonce and tag lengths fixed here are profile-defined transport parameters; they are not generic AEAD defaults. Frames that fail parse, range, or AEAD validation MUST be rejected before canonical-record commitment and MUST NOT produce committed canonical records. The wire shape in this section is the reference transport profile defined here. Other deployments MAY use a different transport framing if they preserve the acceptance semantics needed to produce the same canonical-record objects under Section 4.3. The minimum pod-side requirements needed to emit such frames are summarized in Appendix C. 4.2. Anti-Replay Admission Criterion For framed telemetry, the replay unit is (dev_id, fc). A gateway MUST commit a canonical record from a frame only if all of the following hold: 1. No canonical record has already been committed for the same replay unit (dev_id, fc). 2. The frame counter fc is within the configured acceptance window for that device relative to durable replay state. 3. No continuity-break, reset, or replay-state-loss condition requires explicit resynchronization before further acceptance. Frames that do not satisfy these conditions MUST NOT produce committed canonical records. El Khatabi Expires 19 October 2026 [Page 9] Internet-Draft TrackOne VTL April 2026 The RECOMMENDED default acceptance window is 64 frame counter values per device. Frames with fc more than window_size behind the highest accepted counter for a device MUST be rejected. In the reference gateway profile defined by this document, frames with fc more than window_size ahead of the highest accepted counter MUST also be rejected, rather than silently accepted across a large discontinuity. The acceptance window in this section is counter-based, not a required wall-clock interval. Deployments can size buffering, retry, and resynchronization policy according to the configured connectivity window, but conformance here is defined by durable replay state and accepted counter progression rather than by pod timekeeping. *Structured Rejection Evidence* Gateways SHOULD produce structured rejection evidence for frames rejected during parsing, header validation, AEAD authentication, anti-replay admission, or continuity-break handling. A rejection record SHOULD include at minimum: * dev_id: the received hdr.dev_id if parseable, else null; * fc: the received hdr.fc if parseable, else null; * stage: a short machine-usable stage indicator such as parse, header_validation, aead_authentication, anti_replay_admission, or continuity; * reason: a short machine-usable reason string; * observed_at_utc: the gateway-assigned UTC observation time; and * frame_sha256: lowercase hexadecimal SHA-256 over the exact received NDJSON octet string, excluding only trailing line terminators. The core rejection reasons defined by this profile are parse_error, header_range_error, aead_auth_failure, replay_duplicate, replay_window_exceeded, continuity_break, and resync_required. Deployments MAY add more specific reason values, but they SHOULD preserve these core categories when they apply. Rejection evidence is an audit artifact and MUST NOT be hashed into ledger commitments. It MUST NOT be represented as accepted telemetry and MUST NOT be used as a substitute for canonical-record artifacts. *Replay State Persistence* El Khatabi Expires 19 October 2026 [Page 10] Internet-Draft TrackOne VTL April 2026 Gateways SHOULD persist replay state across restart. If replay state is lost, gateways SHOULD record a continuity break event and SHOULD NOT silently re-accept counters that could already have been committed. *Scope Limitation* This profile provides tamper-evidence for committed canonical records. It does not prove the absence of selective pre-commitment drops by a malicious gateway. 4.3. Frame-to-Canonical-Record Projection The frame-to-canonical-record projection transforms a validated, decrypted frame into a canonical record suitable for commitment. The committed canonical record is a structured record derived from the decrypted payload, not a copy of transport bytes. 1. The gateway MUST verify AEAD authentication. 2. The gateway MUST decrypt the ciphertext. 3. The gateway MUST parse the decrypted plaintext according to the frame's msg_type. 4. The gateway MUST construct a canonical-record object. 5. The gateway MUST serialize that canonical-record object under the gateway commitment profile. 6. The canonical-record bytes are then hashed for Merkle inclusion. A committed canonical record under this profile MUST contain at minimum: * pod_id, * fc, * ingest_time, * pod_time, * kind, and * payload. El Khatabi Expires 19 October 2026 [Page 11] Internet-Draft TrackOne VTL April 2026 Interoperability depends on two distinct layers: the projection contract that maps an accepted frame into a canonical-record object, and the commitment profile that serializes that canonical-record object and reduces the resulting digests. Independent implementations claiming the same result MUST agree on both layers. A commitment profile or deployment profile claiming conformance MUST fix the type and source of each committed field so independent implementations can construct identical canonical-record bytes. For each committed field, the applicable projection contract MUST state whether the field is transport-derived, payload-derived, gateway-assigned, or deployment metadata-derived. Independent implementations MUST NOT substitute a different field source while claiming the same projection contract. For trackone-canonical-cbor-v1, the committed canonical-record object has six logical fields: pod_id, fc, ingest_time, pod_time, kind, and payload. Its authoritative commitment encoding is a fixed Concise Binary Object Representation (CBOR) array whose positional elements are: 1. schema/version discriminator, currently 1; 2. pod_id encoded as an 8-byte byte string; 3. fc; 4. ingest_time; 5. pod_time or null; 6. kind as the profile-defined family discriminator; and 7. payload encoded under the applicable payload family. The profile-specific field definitions are: * pod_id MUST be a deterministic pod identifier. When framed telemetry is used, the profile MUST define a deterministic mapping from hdr.dev_id or equivalent deployment alias to pod_id. In reader-facing JSON projections and vector notes, this profile renders the identifier as lowercase hexadecimal text such as 0000000000000065. In authoritative CBOR commitment bytes, the same identifier is encoded as the corresponding 8-byte byte string. * fc MUST be the accepted frame counter as a non-negative integer. El Khatabi Expires 19 October 2026 [Page 12] Internet-Draft TrackOne VTL April 2026 * ingest_time MUST be a UTC integer timestamp fixed by the projection contract. * pod_time MUST be either a pod-supplied integer timestamp or null when the pod does not supply one. * kind MUST identify the record family under the applicable projection contract. In authoritative CBOR commitment bytes, this field is the numeric family discriminator defined by the commitment profile. For the current profile, the discriminator mapping is Env=1, Pipeline=2, Health=3, and Custom=250. * payload MUST be the parsed plaintext object associated with the accepted frame. A different deployment profile MAY define additional logical fields, but such an extension is not compatible with trackone-canonical- cbor-v1 unless it is given a distinct commitment_profile_id and corresponding conformance vectors. An implementation claiming parity with trackone-canonical-cbor-v1 MUST reproduce that exact logical record and its fixed array encoding before applying the deterministic CBOR rules in Section 4.4. Ciphertext, raw transport bytes, and the authentication tag MUST NOT be part of the committed canonical-record object. The exact payload schema is deployment-specific; the deterministic projection contract is the normative requirement and MUST be published for any commitment profile that claims interoperability. Published conformance vectors for a commitment profile MUST include the post-projection canonical-record objects used as commitment inputs, not only transport frames. 4.4. Deterministic Concise Binary Object Representation (CBOR) Commitment Encoding This section does not define a new general-purpose CBOR variant. It records the narrow deterministic CBOR encoding used for commitment bytes by this profile. The identifier trackone-canonical-cbor-v1 names this commitment recipe so verifiers can tell which byte-level rules were used. The authoritative commitment artifacts, namely CBOR canonical-record artifacts and the canonical day artifact, use a constrained subset of deterministic encoding under Section 4.2.1 of [RFC8949]. For commitment bytes in this profile, the following concrete choices apply: El Khatabi Expires 19 October 2026 [Page 13] Internet-Draft TrackOne VTL April 2026 * All commitment-path items MUST use definite-length encoding. * Integers MUST use the shortest encoding width permitted by [RFC8949]. * Map keys MUST be CBOR text strings. * Map keys MUST be sorted by encoded key length ascending, then by lexicographic order of the encoded key bytes. * Finite floating-point values MUST be encoded using the shortest of float16, float32, or float64 that exactly preserves the value. * NaN, positive infinity, and negative infinity MUST be rejected in commitment paths. * CBOR tags MUST NOT appear in commitment bytes. * Supported values are unsigned integers, negative integers, byte strings, text strings, arrays, maps, booleans, null, and deterministic finite floats. Implementations MUST NOT accept generic CBOR serializers as authoritative commitment encoders. An encoder is acceptable only if it yields the same bytes as these rules. JSON projections of canonical-record artifacts and day artifacts are optional and non-authoritative. They MUST NOT be used as commitment inputs. When produced, such projections SHOULD follow [RFC8785]. Device-side or embedded components MAY use other internal encodings, including different deterministic CBOR layouts optimized for local constraints. Those encodings are not the authoritative commitment encoding described here unless they are explicitly identified by a distinct commitment_profile_id and verified under their own rules. 4.5. Deterministic Commitment Tree Calculation For a given day D, the current commitment profile computes a daily root from the canonical-record commitment bytes produced under Section 4.4. The following steps describe that calculation. *Leaf Digests* * Each canonical-record byte string is hashed with SHA-256, yielding a 32-byte leaf digest. *Digest Ordering* El Khatabi Expires 19 October 2026 [Page 14] Internet-Draft TrackOne VTL April 2026 * To make the daily root independent of file order or ingest order, leaf digests MUST be sorted in ascending byte order before reduction. * Lowercase hexadecimal is a representation format for artifacts and examples only; internal Merkle computation operates on raw hash bytes. * Sorting by lowercase hexadecimal is equivalent to bytewise ascending order over the raw digests. *Pairwise Reduction* * The sorted digests are reduced pairwise by computing SHA- 256(left_child_bytes || right_child_bytes), where both operands are raw 32-byte digests. * If a layer has an odd number of digests, the final digest is duplicated to form the last pair. * The current commitment profile does not prepend domain-separation bytes to leaf or parent hashes. *Empty Day* * If no canonical records are committed for the day, the daily root is the SHA-256 digest of zero bytes: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. The resulting daily root is deterministic for the set of committed canonical records. Because the leaf digests are sorted before reduction, the result depends on the committed record set rather than on ingestion order. Any future change to this calculation that alters commitment bytes (for example, adding domain separation) MUST use a new commitment_profile_id. 4.6. Day Artifact Schema The authoritative day artifact is a CBOR-encoded day record produced under Section 4.4. The day record contains the following fields: * version (uint): day-record schema version, currently 1. * site_id (tstr): site identifier. * date (tstr): UTC day label in YYYY-MM-DD form. El Khatabi Expires 19 October 2026 [Page 15] Internet-Draft TrackOne VTL April 2026 * prev_day_root (tstr): previous day root as 64 lowercase hexadecimal characters. * batches (array): array of batch objects. * day_root (tstr): deterministic day root as 64 lowercase hexadecimal characters. Each batch object contains: * version (uint): batch-record schema version, currently 1. * site_id (tstr): site identifier. * day (tstr): UTC day label in YYYY-MM-DD form. * batch_id (tstr): batch identifier. * merkle_root (tstr): batch Merkle root as 64 lowercase hexadecimal characters. * count (uint): number of committed canonical records in the batch. * leaf_hashes (array of tstr): sorted leaf hashes as lowercase hexadecimal strings. The batch objects embedded in the day artifact are the authoritative batch metadata for verification. * For each batch object, count MUST equal the length of leaf_hashes. * For each batch object, merkle_root MUST equal the Merkle reduction of that batch's leaf_hashes under Section 4.5. * The multiset union of all batch leaf_hashes for the day MUST equal the day's leaf digest multiset from which day_root is computed. day/YYYY-MM-DD.cbor is authoritative. The corresponding day/YYYY-MM- DD.json file is a projection only. The normative field tables in this section are consistent with the published commitment-family Concise Data Definition Language (CDDL) and vector corpus for this profile. An implementation claiming parity with trackone-canonical-cbor-v1 MUST satisfy this text and reproduce the published machine-readable artifacts for that profile. El Khatabi Expires 19 October 2026 [Page 16] Internet-Draft TrackOne VTL April 2026 4.7. Day Chaining Day records include prev_day_root. * The epoch day (the first committed day) for a site MUST set prev_day_root to 64 zero characters, representing 32 zero bytes. * Non-epoch days MUST set prev_day_root to the previous committed day's day_root. Because day labels are UTC-based, chaining semantics are also defined on UTC day boundaries. 5. Artifacts and Verification Bundles Illustrative artifact layout: * records/.cbor - authoritative canonical records * records/.json - optional projections * day/YYYY-MM-DD.cbor - authoritative canonical day artifact * day/YYYY-MM-DD.json - optional projection * day/YYYY-MM-DD.verify.json - verifier-facing day manifest * blocks/YYYY-MM-DD-00.block.json - optional standalone block- metadata projection of one batch object * day/YYYY-MM-DD.cbor.sha256 - convenience digest * day/YYYY-MM-DD.cbor.ots - OTS proof * day/YYYY-MM-DD.ots.meta.json - OTS binding metadata Deployments MAY store artifacts differently and MAY export them as bundles. The path shapes above are illustrative. Standalone block metadata files are convenience projections of batch objects already carried in the authoritative day artifact. They are not additional commitment inputs. Verifiers that process disclosed standalone block-metadata projections MUST compare them with the corresponding batch object in the authoritative day artifact and reject mismatches. El Khatabi Expires 19 October 2026 [Page 17] Internet-Draft TrackOne VTL April 2026 Every verification bundle MUST disclose the commitment_profile_id. In this profile, the normal machine-readable disclosure surface is the verifier-facing day manifest day/YYYY-MM-DD.verify.json. That manifest carries artifact digests, disclosure class, channel state, and the executed or skipped verification checks together with the day-scoped verification result. This document therefore uses the verifier manifest as the primary disclosure surface for verifier-visible metadata. A representative manifest shape is defined in Appendix D. Deployment- specific schemas can carry additional operational fields, but they MUST preserve the verifier-facing semantics defined here. At minimum, an OTS sidecar MUST bind: * artifact, * artifact_sha256, and * ots_proof. Verifiers MUST recompute the day artifact digest and compare it with the sidecar before accepting any proof validation result. 6. Anchoring and Verification 6.1. Anchoring Contract The generic anchoring contract is simple: a gateway computes the SHA-256 digest of the authoritative day artifact and submits that digest to one or more external timestamping channels. Verifiers MUST first recompute the day artifact digest locally; proof validation occurs only after digest binding validation succeeds. A deployment conforming to this profile MUST use at least one anchoring channel. OTS is the default channel described by this document; RFC 3161 and peer signatures are optional parallel channels. El Khatabi Expires 19 October 2026 [Page 18] Internet-Draft TrackOne VTL April 2026 time ------------------------------------------------------------> Pod |--frame-->| |--frame-->| |--frame-->| Gateway | validate | commit | validate | commit | validate | |------ accepted records accumulate in one UTC day -------| | write day/YYYY-MM-DD.cbor | |---------- submit digest to OTS / RFC 3161 ------------->| Channel | pending / delayed proof | upgrade | Verifier | verify later from | |<---------------- disclosed bundle --------------------->| Figure 3: Illustrative Commitment and Proof Lifecycle Figure 3 illustrates the current lifecycle. The pod-to-gateway transport can be intermittent, while proof completion or later publication can lag behind the authoritative day-artifact write. 6.2. OTS Anchoring Profile When [OTS] is used, the gateway stamps SHA-256(day/YYYY-MM-DD.cbor) and stores an OTS proof plus an OTS sidecar. OpenTimestamps is referenced here as a deployed public timestamping ecosystem rather than an IETF-standardized proof format. Implementations claiming OTS support depend on the interoperable behavior of the public OTS project, its calendar servers, and compatible client tooling. OTS proof-format interoperability is therefore defined operationally by that ecosystem and its reference implementations. 6.2.1. OTS Anchoring Lifecycle 1. _Submission_: the gateway submits the day artifact digest to one or more OTS calendars. 2. _Pending_: a calendar can return an incomplete proof while awaiting Bitcoin commitment. 3. _Upgrade_: the gateway or a background process can later upgrade the proof to include completed attestations. 4. _Verification_: a verifier recomputes the artifact digest and validates the proof. Gateways SHOULD submit to multiple independent calendars to reduce single-calendar unavailability risk. El Khatabi Expires 19 October 2026 [Page 19] Internet-Draft TrackOne VTL April 2026 6.2.2. Handling Delayed or Failed Anchoring If OTS submission fails, times out, or yields only an incomplete proof, the gateway MUST still write the authoritative day artifact and MUST treat OTS as a separate channel whose state is not yet complete. The gateway MAY retain a placeholder or incomplete proof artifact and MAY later replace or upgrade it as additional OTS evidence becomes available. Until a valid proof is disclosed and verified, verifiers MUST report the OTS channel as pending, missing, or failed according to the disclosed artifacts and local policy, rather than treating the day artifact itself as invalid. Any later replacement or upgrade of the OTS proof MUST continue to bind to the same authoritative day-artifact digest. Gateways MUST retain disclosed OTS proof artifacts for at least as long as the corresponding day artifacts remain available for verification under local retention policy. 6.2.3. Proof Status Vocabulary Verifiers and bundle manifests SHOULD use a consistent status vocabulary for OTS and optional parallel attestation channels: * verified: proof validation succeeded for the disclosed artifact binding. * pending: a proof exists but is incomplete or awaiting upgrade; this is not equivalent to invalid. * missing: the expected proof or channel artifact is absent. * failed: validation was attempted and did not succeed. * skipped: validation was not attempted because of disclosure class, verifier configuration, or local policy. Whether missing, pending, or skipped is verifier-fatal depends on the disclosure class, local verifier policy, and whether the relevant channel is required. 6.3. Optional Parallel Attestation Deployments MAY also produce: * An [RFC3161] timestamp response over the same day-artifact digest. * A peer signature quorum over (site_id, day, day_root, context). El Khatabi Expires 19 October 2026 [Page 20] Internet-Draft TrackOne VTL April 2026 When multiple channels are present, verifiers SHOULD validate all available channels independently and report per-channel results. If a verifier is configured in strict mode for optional channels, failure of those channels MUST cause overall verification failure. 6.4. Verification Verifiers MUST first determine the applicable commitment_profile_id from disclosed verifier metadata. When the authoritative day artifact does not carry that identifier in-band, the verifier MUST obtain it from day/YYYY-MM-DD.verify.json or an explicitly profiled manifest with equivalent verifier-visible fields and MUST reject absent or unsupported values. Verifiers MUST determine the applicable verification scope from the disclosed artifacts, the claimed disclosure class, and local verifier policy. Reported outcomes MUST NOT claim checks or assurances outside that scope. Verifiers SHOULD apply checks in the following fail-fast order, subject to the claimed disclosure class: 1. Validate that disclosed artifacts are sufficient for the claimed disclosure class and disclose a commitment_profile_id, and report bundle_disclosure_validation. 2. Validate the authoritative day artifact and, when disclosed or consumed, the verifier-facing manifest, and report day_artifact_validation and verification_manifest_validation as applicable. 3. For Class A bundles, recompute canonical-record leaf digests from disclosed canonical-record CBOR artifacts, validate the batch metadata contract, and recompute day_root. Compare the recomputed result to the authoritative day_root, and report record_level_recompute and batch_metadata_validation. 4. For Class B bundles, validate the authoritative day artifact and any disclosed batch metadata. If withheld material prevents public recomputation, report record_level_recompute in checks_skipped. Deployment-specific withheld-material checks MAY be reported only through extension names beginning with x-. 5. For Class C bundles, report record_level_recompute and batch_metadata_validation in checks_skipped as out of scope, and treat the result as anchor-only evidence. El Khatabi Expires 19 October 2026 [Page 21] Internet-Draft TrackOne VTL April 2026 6. Recompute SHA-256(day/YYYY-MM-DD.cbor) and compare it to the sidecar artifact_sha256, and report day_digest_binding. 7. Validate the OTS proof when OTS is required or present, and report ots_verification. 8. Validate optional RFC 3161 and peer attestations as configured, and report tsa_verification or peer_quorum_verification as applicable. When batch metadata is within the exercised verification scope, verifiers MUST apply the following checks before accepting a result: * each batch count equals the length of its leaf_hashes; * each batch merkle_root equals the Merkle reduction of its leaf_hashes; * the union multiset of batch leaf_hashes equals the leaf digest multiset derived from disclosed canonical records when canonical- record artifacts are available; and * any standalone block-metadata projection matches the corresponding batch object in the authoritative day artifact. Verifier implementations SHOULD expose machine-usable failure categories: * malformed or missing artifacts, * missing or unsupported commitment_profile_id, * Merkle mismatch, * batch metadata mismatch, * missing or invalid OTS proof, * sidecar mismatch or digest mismatch, * insufficient disclosure for the claimed verification level, and * optional-channel failure. El Khatabi Expires 19 October 2026 [Page 22] Internet-Draft TrackOne VTL April 2026 Verifier output SHOULD state the claimed disclosure class, the verification scope actually exercised, the per-channel proof status, which checks were executed, which checks were skipped, and whether the resulting claim is public recompute, partial verification, or anchor-only evidence. *Standardized Check Identifiers* When verifier-facing manifests or verifier results report checks_executed or checks_skipped, this profile defines the following interoperable check identifiers: * bundle_disclosure_validation: disclosure-class sufficiency and commitment_profile_id presence were validated. * verification_manifest_validation: the verifier-facing manifest was validated. * day_artifact_validation: the authoritative day artifact was validated structurally and semantically under the claimed profile. * record_level_recompute: record-level recomputation from disclosed canonical-record artifacts was performed. * batch_metadata_validation: authoritative or disclosed batch metadata was validated against the day artifact and disclosed record material within scope. * day_digest_binding: the recomputed SHA-256(day/YYYY-MM-DD.cbor) digest was compared with disclosed binding metadata. * ots_verification: the OTS proof channel was validated. * tsa_verification: the RFC 3161 timestamp channel was validated. * peer_quorum_verification: the peer-signature quorum channel was validated. A manifest or verifier result that reports one of these standardized checks MUST use the exact identifier listed here. For any standardized check whose applicability conditions are met within the exercised verification scope, the manifest or verifier result MUST report that check exactly once in either checks_executed or checks_skipped. The same standardized identifier MUST NOT appear in both lists and MUST NOT appear more than once. Silent omission of an applicable standardized check is non-conformant. Applicability is determined as follows: El Khatabi Expires 19 October 2026 [Page 23] Internet-Draft TrackOne VTL April 2026 * bundle_disclosure_validation and day_artifact_validation apply whenever verification proceeds on a disclosed bundle. * verification_manifest_validation applies when a verifier-facing manifest is disclosed or consumed to obtain verifier-visible metadata. * For Class A bundles, record_level_recompute, batch_metadata_validation, and day_digest_binding apply. If required artifacts for one of these checks are absent, that check MUST appear in checks_skipped with a reason indicating insufficient disclosure or missing artifacts. * For Class B bundles, batch_metadata_validation and day_digest_binding apply when the corresponding artifacts are disclosed. If withheld material prevents public recomputation, record_level_recompute MUST appear in checks_skipped. * For Class C bundles, record_level_recompute and batch_metadata_validation MUST appear in checks_skipped as out of scope, while day_digest_binding applies when the day artifact and binding metadata are disclosed. * ots_verification, tsa_verification, and peer_quorum_verification apply only when the corresponding channel is disclosed or required by verifier policy. Additional deployment-specific checks MAY be reported, but they MUST NOT redefine these identifiers and MUST use a distinct extension name beginning with x-. Verifier output MUST NOT be represented as proving more than the exercised verification scope. In particular, a successful result does not by itself establish dataset completeness, physical truth of measurements, or suitability for autonomous actuation or sanctions. 7. Disclosure Classes Verification claims depend on what artifacts are disclosed. This profile defines three disclosure classes. * *Class A (Public Recompute)*: sufficient material for independent record-level recomputation. * *Class B (Partner Audit)*: controlled disclosure with redacted or partitioned record material. * *Class C (Anchor-Only)*: existence and timestamp evidence only. El Khatabi Expires 19 October 2026 [Page 24] Internet-Draft TrackOne VTL April 2026 A verifier claim for any disclosure class MUST be limited to the verification scope supported by the disclosed artifacts. Class A is the public-recompute case. A Class A bundle MUST include: * all canonical-record artifacts required to recompute the claimed day root, * the canonical day artifact, including its authoritative batch objects, * any disclosed standalone block-metadata projections, and * the OTS proof plus its sidecar metadata. A Class A bundle SHOULD also include the verifier-facing day manifest and MUST record the commitment_profile_id. Class A permits record-level recomputation, batch-metadata validation, day-root recomputation, and anchor validation when the corresponding artifacts are disclosed and checked. Class B is the controlled-disclosure case. Class B outputs MUST NOT be represented as publicly recomputable. A Class B bundle SHOULD include the canonical day artifact, any disclosed standalone block- metadata projections, at least one timestamp proof plus its binding metadata, any disclosed commitments covering withheld material, and a policy artifact describing the withheld or partitioned material. This document defines the reporting boundary for Class B but does not require one universal withheld-material artifact format. Class B validation is therefore limited to the authoritative day artifact, disclosed batch metadata, any disclosed withheld-material commitments, and any anchor channels present in the bundle. Verifier output SHOULD explicitly state when record-level recomputation was partial or was not attempted for withheld material. If deployment- specific checks are reported for withheld-material commitments or policy artifacts, they MUST use extension names beginning with x-. A Class C disclosure MUST be labeled as existence and timestamp evidence only and MUST NOT claim record-level reproducibility. A Class C bundle MUST include: * the canonical day artifact, and El Khatabi Expires 19 October 2026 [Page 25] Internet-Draft TrackOne VTL April 2026 * at least one timestamp proof artifact plus the metadata needed to bind it to the day artifact digest and disclose commitment_profile_id. Class C verification validates artifact-digest binding and external timestamp evidence only. It does not establish record-level reproducibility. Class C verifier output SHOULD be reported as anchor-only evidence. *Bundle Selection Guidance* * Class A is appropriate when the goal is public recomputation from disclosed canonical records and authoritative artifacts, for example when a regulator or external researcher needs independent replay of the disclosed day. * Class B is appropriate when the goal is partner or regulator review over a controlled disclosure set that still carries commitment and anchor evidence, for example when some record content must remain withheld while the committed day artifact is still audited. * Class C is appropriate when the goal is existence and timestamp evidence without public record-level reproducibility, for example when a party only needs to show that a committed artifact existed by a given time. The verifier-facing manifest MUST include: * disclosure_class, * commitment_profile_id, * artifact path and digest entries, * per-channel anchor status, * a list of checks executed using the standardized identifiers defined in Section 6.4, and * a list of checks skipped, each with the standardized check identifier and the reason for the skip. 8. Versioning This profile has several independent version surfaces: El Khatabi Expires 19 October 2026 [Page 26] Internet-Draft TrackOne VTL April 2026 * Document revision (for example -00, -01) is editorial and is not part of commitment output. * Artifact schema versions are carried by the version fields in day and batch records. * commitment_profile_id identifies the canonical CBOR, hash, and Merkle rules that define commitment outputs. The commitment profile defined in this document is trackone- canonical-cbor-v1. If a verifier encounters an unsupported commitment_profile_id, it MUST reject the verification claim rather than silently using a fallback interpretation. This revision defines exactly one commitment_profile_id and does not define an allocation policy or registry for additional profile identifiers. Future commitment_profile_id values are out of scope for this document and would require separate specification and review. Bundles disclose the applicable commitment_profile_id via the verifier-facing day manifest. The required OTS sidecar metadata does not currently carry that identifier. 9. Conformance Vectors Determinism claims in this profile are testable. Implementations that claim conformance to a published commitment profile MUST be able to reproduce its published machine-readable corpus. For trackone- canonical-cbor-v1, the authoritative commitment-family CDDL and vector corpus define the machine-readable conformance artifacts for this profile. The appendix in this document is explanatory only. Published vector sets should include coverage for: * post-projection canonical-record fixtures with fixed field types and values, * empty day, * single canonical record, * odd leaf count, * power-of-two leaf count, * duplicate leaf hashes, El Khatabi Expires 19 October 2026 [Page 27] Internet-Draft TrackOne VTL April 2026 * epoch chaining, * non-epoch chaining, and * a full Class A disclosure example. Cross-implementation checks MUST verify byte-for-byte parity across independent implementations. Any mismatch in canonical bytes or roots is a conformance failure. Published vector bundles MUST include the commitment_profile_id. 10. Security Considerations This profile does not introduce new cryptographic primitives. Its security depends on correct AEAD use on the transport path, deterministic commitment encoding, trustworthy gateway admission and timekeeping, accurate verifier reporting, and disciplined artifact and proof handling. The threats below are stated in the attack-and- remediation style described by [RFC3552]. Unless explicitly stated otherwise, a successful verification result establishes only that the disclosed artifacts are internally consistent with this profile and with any validated proof channels. *Gateway Compromise and Pre-Commit Omission* An attacker can compromise the gateway or the local admission path and then fabricate accepted telemetry, suppress frames before commitment, or assign accepted frames to the wrong device or UTC day. This profile does not by itself detect a malicious gateway; it makes committed outputs tamper-evident only after commitment. Deployments that need stronger assurances should harden and audit the gateway, protect admission and replay state, monitor time sources, and add independent observation, device attestation inputs, or admission-path audit evidence. *Replay and Duplicate Submission* An attacker can replay a previously observed frame or resubmit a frame with reused (dev_id, fc) values in an attempt to create duplicate committed records or counter ambiguity. Gateways mitigate this by enforcing single-consumption of the replay unit (dev_id, fc), by rejecting counters outside the configured acceptance window, and by recording continuity-break conditions instead of silently re- accepting ambiguous counters after replay-state loss. *Nonce Misuse and Transport-Key Compromise* El Khatabi Expires 19 October 2026 [Page 28] Internet-Draft TrackOne VTL April 2026 An attacker can recover plaintext or forge framed transport messages if AEAD keys are disclosed, if nonce uniqueness fails under a key, or if weak randomness makes future nonces predictable. Implementations mitigate this by rejecting frames that fail AEAD authentication before commitment, by requiring fresh 24-byte transport nonces, and by using strong pseudorandom generation with explicit seed discipline. Reuse of a nonce under the same AEAD key can invalidate confidentiality and can also invalidate integrity, depending on the AEAD algorithm. This profile therefore depends on deployment key management to prevent unsafe key and nonce reuse and to retire compromised keys. *Canonicalization, Profile, and Metadata Confusion* An attacker can exploit differences in parsing, field typing, record ordering, hash composition, or non-authoritative metadata handling while implementations still claim the same commitment_profile_id. An attacker can also present a verifier-facing manifest, block-metadata projection, or OTS sidecar that does not match the authoritative day artifact in the hope that a verifier will treat convenience metadata as authoritative. The mitigation is that this profile fixes deterministic encoding and hash rules, treats the authoritative day artifact as the cryptographic source of truth, requires verifiers to recompute commitment material from authoritative artifacts, and requires standalone metadata projections and sidecars to match the authoritative artifact. Any future semantic or hash-composition change MUST use a new commitment_profile_id. *Artifact Mutation and Proof Substitution* An attacker can modify a committed day artifact after disclosure, or can present a valid proof over the wrong artifact digest. The mitigation is that verifiers recompute the authoritative day-artifact digest independently and compare it with the disclosed binding metadata before accepting any proof result. Mutation or substitution therefore changes the digest or its binding and causes verification to fail. *Calendar Withholding and Optional-Channel Downgrade* An attacker can operate or compromise a calendar service so that proof issuance is delayed, withheld, or selectively unavailable, can present pending or placeholder proofs as if they were final attestations, or can exploit verifier policy that silently ignores a missing required channel. Implementations mitigate this by treating timestamping and other attestations as separate channels, by disclosing per-channel status explicitly, by distinguishing pending, missing, and failed from verified, and by binding every exercised El Khatabi Expires 19 October 2026 [Page 29] Internet-Draft TrackOne VTL April 2026 channel to the same authoritative day-artifact digest. Using multiple independent calendars reduces but does not eliminate coordinated withholding risk. Verifier policy must make clear which channels are required and must not treat an unverified required channel as success. *Time-Source Manipulation* An attacker can alter the gateway clock or day-rollover configuration so that accepted records are assigned to the wrong UTC day or are given misleading ingest_time values. The pod is not the time authority in this profile; the gateway is. Implementations therefore mitigate this by maintaining a trustworthy gateway time source, monitoring rollover behavior, and treating UTC day assignment as a security-relevant operational function. Verification can detect internal inconsistencies in disclosed artifacts, but it cannot reconstruct true real-world time if the gateway time base was wrong at acceptance. *Resource Exhaustion* An attacker can flood a deployment with malformed, replayed, or excessive-rate frames in order to exhaust buffering, replay-state storage, artifact storage, or verifier computation. Implementations mitigate this by rejecting malformed or AEAD-invalid frames before commitment, bounding acceptance windows and retained replay state, sizing local storage and retention policy explicitly, and applying rate limits or other admission controls to untrusted senders. This profile does not define a complete denial-of-service defense. *Verification Scope, Completeness, and Disclosure* An attacker can rely on a successful verification result being misread as proof of dataset completeness, physical truth of measurements, or authorization for autonomous actuation. An attacker can also obtain sensitive information if disclosed bundles expose more record material than intended for the chosen disclosure class. This profile mitigates those risks only partially: verifier output is required to state the exercised verification scope, a successful result establishes internal consistency and proof binding for the disclosed bundle rather than completeness of all observed or emitted frames, and disclosure classes constrain what is expected to be published. Deployments that need stronger completeness, safety, or confidentiality guarantees must add external operational controls, independent observation, and access-control and retention policies that match the sensitivity of the disclosed artifacts. El Khatabi Expires 19 October 2026 [Page 30] Internet-Draft TrackOne VTL April 2026 11. Privacy Considerations Telemetry payloads can include sensitive operational data. Operators should: * minimize personally identifiable data in committed artifacts, * separate identity metadata from measurement payload when possible, * apply retention and access controls, and * publish only data appropriate for the chosen disclosure class. Privacy-preserving disclosures remain valid, but they MUST NOT be described as publicly recomputable unless Class A conditions are met. 12. IANA Considerations This section follows the guidance in [RFC8126] and provides the complete instructions requested of the Internet Assigned Numbers Authority (IANA). 12.1. Media Types Registry IANA is requested to register the following media type in the standards tree of the "Media Types" registry in accordance with [RFC6838]: Type name: application Subtype name: trackone-day+cbor Required parameters: n/a Optional parameters: n/a Encoding considerations: binary Security considerations: see Section 10. Interoperability considerations: this media type identifies the authoritative day artifact defined by Section 4.4, Section 4.5, Section 4.6, and Section 4.7. Published specification: this document, especially Section 4.4, Section 4.5, Section 4.6, and Section 4.7. El Khatabi Expires 19 October 2026 [Page 31] Internet-Draft TrackOne VTL April 2026 Applications that use this media type: gateways, verifiers, disclosure tooling, and archival or audit systems that exchange or retain authoritative day artifacts. Fragment identifier considerations: no fragment identifier syntax is defined by this document for application/trackone-day+cbor. Fragment identifiers for this media type are processed according to the +cbor structured syntax suffix rules in [RFC8949]. Additional information: * Magic number(s): n/a * File extension(s): n/a * Macintosh file type code(s): n/a Person & email address to contact for further information: Bilal El Khatabi Intended usage: COMMON Restrictions on usage: none Author: Bilal El Khatabi Change controller: IESG 12.2. No CBOR Tag Allocation This document requests no new CBOR tag allocation. Commitment bytes defined by Section 4.4 forbid CBOR tags, and the authoritative day artifact defined by Section 4.6 does not require additional tag semantics for exchange. 12.3. No commitment_profile_id Registry This document requests no IANA registry for commitment_profile_id. This revision defines only the document-specific identifier trackone- canonical-cbor-v1 and does not establish a registry or general allocation mechanism for future commitment-profile identifiers. This document also requests no CoAP Content-Format entry and no separate media-type registration for the verifier-facing day manifest. 13. Interoperability Notes and Open Questions El Khatabi Expires 19 October 2026 [Page 32] Internet-Draft TrackOne VTL April 2026 * Whether a future revision should register a media type for the verifier-facing day manifest. * Whether future profiles should define a stricter interoperability rule for SCITT publication over verifier manifests or exported evidence bundles. * Whether a future revision should standardize a universal Class B withheld-material artifact format. * Whether future disclosure bundles should adopt COSE-MERKLE proof encodings. * Registry strategy for disclosure and anchor-status vocabularies. * Whether a future commitment profile should introduce domain separation. 14. References 14.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object Representation (CBOR)", STD 94, RFC 8949, DOI 10.17487/RFC8949, December 2020, . [RFC6838] Freed, N., Klensin, J., and T. Hansen, "Media Type Specifications and Registration Procedures", BCP 13, RFC 6838, DOI 10.17487/RFC6838, January 2013, . 14.2. Informative References [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 8126, DOI 10.17487/RFC8126, June 2017, . El Khatabi Expires 19 October 2026 [Page 33] Internet-Draft TrackOne VTL April 2026 [RFC3552] Rescorla, S. and B. Korver, "Guidelines for Writing RFC Text on Security Considerations", BCP 72, RFC 3552, DOI 10.17487/RFC3552, July 2003, . [RFC5116] McGrew, D., "An Interface and Algorithms for Authenticated Encryption", RFC 5116, DOI 10.17487/RFC5116, January 2008, . [RFC3161] Adams, C., Cain, P., Pinkas, D., and R. Zuccherato, "Internet X.509 Public Key Infrastructure Timestamp Protocol (TSP)", RFC 3161, DOI 10.17487/RFC3161, August 2001, . [RFC8785] Rundgren, A., Jordan, B., and S. Erdtman, "JSON Canonicalization Scheme (JCS)", RFC 8785, DOI 10.17487/RFC8785, June 2020, . [RFC8610] Bormann, C. and P. Hoffman, "Concise Data Definition Language (CDDL): A Notational Convention to Express CBOR and JSON Data Structures", RFC 8610, DOI 10.17487/RFC8610, June 2019, . [RFC9162] Laurie, B., Messeri, E., and R. Stradling, "Certificate Transparency Version 2.0", RFC 9162, DOI 10.17487/RFC9162, December 2021, . [NDJSON] NDJSON Project, "NDJSON: Newline Delimited JSON", . [TRACKONE] TrackOne Project, "TrackOne Project Repository", 2026, . [SCITT] Birkholz, H., Delignat-Lavaud, A., Fournet, C., Deshpande, Y., and S. Lasker, "An Architecture for Trustworthy and Transparent Digital Supply Chains", Work in Progress, Internet-Draft, draft-ietf-scitt-architecture, 2024, . [COSE-MERKLE] Steele, O., Birkholz, H., Delignat-Lavaud, A., and C. Fournet, "COSE Merkle Tree Proofs", Work in Progress, Internet-Draft, draft-ietf-cose-merkle-tree-proofs, 2025, . El Khatabi Expires 19 October 2026 [Page 34] Internet-Draft TrackOne VTL April 2026 [OTS] OpenTimestamps Project, "OpenTimestamps Protocol and Tooling", 2016, . [RFC9334] Birkholz, H., Thaler, D., Richardson, M., Smith, N., and W. Pan, "Remote ATtestation procedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, January 2023, . Appendix A. Example Verification Manifest This appendix shows a representative verifier-facing day manifest. A concrete deployment schema can carry additional operational fields, but the example below captures the verification surface described here. { "version": 1, "date": "2025-10-07", "site": "an-001", "device_id": "pod-003", "frame_count": 7, "records_dir": "records", "frames_file": "frames.ndjson", "artifacts": { "day_cbor": { "path": "day/2025-10-07.cbor", "sha256": "<64 hex chars>" }, "day_json": { "path": "day/2025-10-07.json", "sha256": "<64 hex chars>" }, "day_ots": { "path": "day/2025-10-07.cbor.ots", "sha256": "<64 hex chars>" }, "day_ots_meta": { "path": "day/2025-10-07.ots.meta.json", "sha256": "<64 hex chars>" } }, "anchoring": { "policy": { "mode": "warn" }, "channels": { "ots": { "enabled": true, "status": "pending" }, "tsa": { "enabled": false, "status": "skipped", El Khatabi Expires 19 October 2026 [Page 35] Internet-Draft TrackOne VTL April 2026 "reason": "disabled" }, "peers": { "enabled": false, "status": "skipped", "reason": "disabled" } }, "overall": "success" }, "verification_bundle": { "disclosure_class": "A", "commitment_profile_id": "trackone-canonical-cbor-v1", "checks_executed": [ "bundle_disclosure_validation", "day_artifact_validation", "verification_manifest_validation", "record_level_recompute", "batch_metadata_validation", "day_digest_binding", "ots_verification" ], "checks_skipped": [ { "check": "tsa_verification", "reason": "disabled" }, { "check": "peer_quorum_verification", "reason": "disabled" } ] }, "verifier": { "verification": { "commitment_profile_id": "trackone-canonical-cbor-v1", "disclosure_class": "A" }, "channels": { "ots": { "enabled": true, "status": "pending" } }, "overall": "success" } } Figure 4 Appendix B. Illustrative Conformance Vector Bundle The authoritative machine-readable conformance vector corpus for trackone-canonical-cbor-v1 is published at [TRACKONE]. The figure below is a reader-oriented sketch of the bundle shape and naming only; it is not the authoritative vector source. El Khatabi Expires 19 October 2026 [Page 36] Internet-Draft TrackOne VTL April 2026 Wrapped hexadecimal values in this appendix are presentation-only; a verifier or implementer should concatenate adjacent lines without inserting whitespace. The fixtures below are reader-oriented logical record sketches, not the authoritative CBOR array encoding. They show the current post- projection logical content and the active commitment profile identifier, while the published vector corpus carries the exact encoded bytes and digests. In these reader-oriented sketches, kind is shown using the symbolic family name. In authoritative CBOR commitment bytes, the same field carries the numeric discriminator defined by the current profile; for the fixtures below, Custom corresponds to 250. El Khatabi Expires 19 October 2026 [Page 37] Internet-Draft TrackOne VTL April 2026 commitment_profile_id: trackone-canonical-cbor-v1 fixture record_a: pod_id: "0000000000000065" fc: 1 ingest_time: 1772366400 pod_time: null kind: Custom payload.temp_c: 21.5 fixture record_b: pod_id: "0000000000000066" fc: 2 ingest_time: 1772367000 pod_time: null kind: Custom payload.temp_c: 22.0 fixture record_c: pod_id: "0000000000000067" fc: 3 ingest_time: 1772367600 pod_time: null kind: Custom payload.temp_c: 22.5 class-a-bundle-v1: disclosure_class: A commitment_profile_id: trackone-canonical-cbor-v1 required_artifact_1: records/.cbor required_artifact_2: day/YYYY-MM-DD.cbor required_artifact_3: day/YYYY-MM-DD.cbor.ots required_artifact_4: day/YYYY-MM-DD.ots.meta.json verifier_check_1: bundle_disclosure_validation verifier_check_2: day_artifact_validation verifier_check_3: record_level_recompute verifier_check_4: batch_metadata_validation verifier_check_5: day_digest_binding verifier_check_6: ots_verification Figure 5 The published machine-readable vector set carries the exact canonical bytes, digests, expected roots, and the applicable commitment_profile_id. This appendix remains illustrative and is not an authoritative conformance corpus. El Khatabi Expires 19 October 2026 [Page 38] Internet-Draft TrackOne VTL April 2026 Appendix C. Minimal Pod Requirements This appendix records the minimum expectations for a constrained pod that emits framed telemetry under the reference transport profile used in this document. It is descriptive of the deployment model assumed here, not a claim that all conforming deployments share identical hardware. * The pod is not required to sign assertions or to emit SCITT statements. * The pod MUST be able to produce framed transport messages consistent with Section 4.1, including fresh 24-byte transport nonces under the local AEAD policy. * Nonce generation MUST rely on a cryptographically strong pseudorandom source or an equivalent construction with explicit seed discipline. Weak or predictable generator state is out of profile. * The pod or an immediately adjacent trusted transport component MUST preserve enough durable state to avoid replay ambiguity across the deployment-defined connectivity window. * The pod is not required to maintain UTC wall-clock time. If the pod carries a local timestamp, that field is deployment input and not the source of UTC day boundaries in this profile. * If uplink availability is intermittent, accepted-but-unsubmitted telemetry MUST either be durably buffered or be retransmittable from durable local state according to deployment policy. * This document does not require one fixed storage budget. The practical tradeoff is between the configured connectivity window, frame rate, local retention policy, and the gateway's replay/ admission contract. In the deployment model assumed here, the intermittency assumption primarily applies on the pod-to-gateway path. The gateway is expected to maintain UTC time for ingest_time assignment, day- artifact rollover, and verifier-facing day labels. External timestamping or publication channels can also be delayed, but those delays do not change the pod-side framing requirements. El Khatabi Expires 19 October 2026 [Page 39] Internet-Draft TrackOne VTL April 2026 Appendix D. Verification Manifest CDDL This appendix gives a representative Concise Data Definition Language (CDDL) ([RFC8610]) shape for the verifier-facing day manifest. It captures the verification surface described here and leaves room for deployment-specific additions, provided those additions do not remove or change the verifier-facing semantics defined here. Check names are drawn from the standardized vocabulary defined in Section 6.4; deployment-specific extensions MUST use separate names beginning with x- that do not redefine those identifiers. verification-manifest = { "version": 1, "date": tstr, "site": tstr, ? "device_id": tstr, ? "frame_count": uint, ? "frames_file": tstr, ? "records_dir": tstr, "artifacts": artifacts, "anchoring": anchoring, "verification_bundle": verification-bundle, ? "verifier": verifier-result, * tstr => any-data } artifacts = { "day_cbor": artifact-ref, ? "day_json": artifact-ref, ? "day_sha256": artifact-ref, ? "block": artifact-ref, ? "day_ots": artifact-ref, ? "day_ots_meta": artifact-ref, * tstr => artifact-ref } artifact-ref = { "path": tstr, "sha256": hex64 } anchoring = { ? "policy": { * tstr => any-data }, "channels": { ? "ots": channel-status, ? "tsa": channel-status, ? "peers": channel-status El Khatabi Expires 19 October 2026 [Page 40] Internet-Draft TrackOne VTL April 2026 }, ? "overall": tstr, * tstr => any-data } verification-bundle = { "disclosure_class": disclosure-class, "commitment_profile_id": tstr, "checks_executed": [* check-name], "checks_skipped": [* skipped-check], * tstr => any-data } check-name = standardized-check-name / extension-check-name standardized-check-name = "bundle_disclosure_validation" / "verification_manifest_validation" / "day_artifact_validation" / "record_level_recompute" / "batch_metadata_validation" / "day_digest_binding" / "ots_verification" / "tsa_verification" / "peer_quorum_verification" extension-check-name = tstr .regexp "^x-[A-Za-z0-9._-]+$" skipped-check = { "check": check-name, "reason": tstr } verifier-result = { ? "policy": { * tstr => any-data }, ? "verification": { "commitment_profile_id": tstr, "disclosure_class": disclosure-class, * tstr => any-data }, ? "checks": { * tstr => bool }, ? "checks_executed": [* check-name], ? "checks_skipped": [* skipped-check], ? "channels": { ? "ots": channel-status, ? "tsa": channel-status, ? "peers": channel-status }, El Khatabi Expires 19 October 2026 [Page 41] Internet-Draft TrackOne VTL April 2026 ? "overall": tstr, * tstr => any-data } channel-status = { ? "enabled": bool, "status": "verified" / "pending" / "missing" / "failed" / "skipped", ? "reason": tstr, ? "detail": tstr, * tstr => any-data } disclosure-class = "A" / "B" / "C" hex64 = text .regexp "[0-9a-f]{64}" any-data = nil / bool / int / float / tstr / bstr / [* any-data] / { * tstr => any-data } Acknowledgments Early structural drafts of this document were prepared with AI writing assistance. All technical content, design decisions, and normative requirements were reviewed against available implementation artifacts. The author thanks the OpenTimestamps project for the public calendar infrastructure used during validation. Author's Address Bilal El Khatabi TrackOne Project Morocco Email: elkhatabibilal@gmail.com El Khatabi Expires 19 October 2026 [Page 42]