Internet-Draft V verification system - V-VS June 2024
Binotto Expires 21 December 2024 [Page]
Workgroup:
Internet Engineering Task Force
Internet-Draft:
draft-valentinbinotto-v-verificationsystem-vv-00
Published:
Intended Status:
Informational
Expires:
Author:
V. Binotto
valentin-43-44.org

A method to store information via email and ensure the verification of the data and the identification of the version

Abstract

This document describes a method to store information via email and to ensure the verification of the data and identification of the version. As a long-established way of communicating and sharing information and knowledge, email is at the heart of the V verification system (V-VS).

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 21 December 2024.

Table of Contents

1. Introduction

The permanent storage of information and data is absolutely essential for a large proportion of Internet users. The name "V verification system" refers to a procedure for sending information via email and providing it with defined version identification attributes in order to guarantee the subsequent traceability of the version history. As this procedure uses the existing email infrastructure, elements such as DKIM, SPF or the encryption of email content can be used to guarantee the integrity of the data.

The V verification system only uses the email infrastructure. This means that the use of the V verification system is not associated with far-reaching changes to the existing infrastructure, and compatibility with legacy infrastructures is guaranteed. Furthermore, these minimal requirements mean that the V verification system is highly flexible and can also be used in environments with limited infrastructure.

1.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. The Specification

The user or administrator who wishes to store data in the sense of the V verification system, MUST use their personal individual email account (example: valentin@system.valentin).

The user or administrator MUST send the data to a personal, individual email address that is also uniquely assigned to them (example: valentin@admins.valentin). This address MAY be the same as the sender's address, but MAY also be an address that is different from the sender's address. The data SHOULD be in the message body of the email. The message body itself MAY be formatted as Plain text (flat US-ASCII text)([RFC822]) or MIME ([RFC2045]).

The subject of the email SHOULD include the project name or the name of the data to be stored, the current date in the format YYYYMMDD and the current time in the format HHMM as well as a random value. The subject of an email could therefore look like this: "PROJECTXYYZ202406181520 VB"

In order to improve the durability of the data or to enable collaboration with other people, these mails MAY also be addressed to a mailing list or to various other people in addition to the personal email address.

The minimum requirements of the V verification system are described in this document. All further details on how the user wishes to use the V verification system are the sole responsibility of the user.

3. Security Considerations

According to the author, no security considerations apply to this document.

4. IANA Considerations

This document has no IANA actions.

5. References

5.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC5321]
Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, DOI 10.17487/RFC5321, , <https://www.rfc-editor.org/info/rfc5321>.
[RFC5322]
Resnick, P., Ed., "Internet Message Format", RFC 5322, DOI 10.17487/RFC5322, , <https://www.rfc-editor.org/info/rfc5322>.
[RFC2045]
Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045, DOI 10.17487/RFC2045, , <https://www.rfc-editor.org/info/rfc2045>.

5.2. Informative References

[RFC821]
Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC 821, DOI 10.17487/RFC0821, , <https://www.rfc-editor.org/info/rfc821>.
[RFC822]
Crocker, D., "STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES", STD 11, RFC 822, DOI 10.17487/RFC0822, , <https://www.rfc-editor.org/info/rfc822>.

Author's Address

Valentin Binotto
valentin-43-44.org