Skip to main content

TIBET Causal Time Substrate
draft-vandemeent-tibet-causal-time-02

Document Type Active Internet-Draft (individual)
Author Jasper van de Meent
Last updated 2026-05-12
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-vandemeent-tibet-causal-time-02
Internet Engineering Task Force                          J. van de Meent
Internet-Draft                                                  Humotica
Intended status: Informational                                9 May 2026
Expires: 10 November 2026

                      TIBET Causal Time Substrate
                 draft-vandemeent-tibet-causal-time-02

Abstract

   This document describes the TIBET Causal Time Substrate, a forward-
   only causal ordering model for identity-bound distributed systems.

   TIBET does not treat wall-clock time as the primary ordering
   primitive.  Instead, it uses a cryptographically bound logical-time
   structure encoded through append-only linkage, monotonic generation
   counters, and signed causal references.  External wall-clock sources,
   including NTP, RFC 3161 timestamping services, Roughtime, GNSS, or
   public ledger timestamps, are treated as auxiliary alignment anchors
   rather than as the constitutive source of event order.

   The core claim is simple: TIBET is a forward-only causal substrate
   that enables recovery and reversibility without rewriting history.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 10 November 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

van de Meent            Expires 10 November 2026                [Page 1]
Internet-Draft              TIBET Causal Time                   May 2026

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Status of This Memo . . . . . . . . . . . . . . . . . . . . .   3
   2.  Problem Statement . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  Design Goals  . . . . . . . . . . . . . . . . . . . . . . . .   4
   5.  Model Overview  . . . . . . . . . . . . . . . . . . . . . . .   4
   6.  Relation to Lamport and Related Work  . . . . . . . . . . . .   4
   7.  Forward-Only Property . . . . . . . . . . . . . . . . . . . .   5
   8.  Event Classes . . . . . . . . . . . . . . . . . . . . . . . .   5
   9.  External Time Anchors . . . . . . . . . . . . . . . . . . . .   5
   10. Drift and Alignment . . . . . . . . . . . . . . . . . . . . .   5
   11. Processing Model  . . . . . . . . . . . . . . . . . . . . . .   6
     11.1.  Local Event  . . . . . . . . . . . . . . . . . . . . . .   6
     11.2.  Incoming Causal Reference  . . . . . . . . . . . . . . .   6
     11.3.  Recovery . . . . . . . . . . . . . . . . . . . . . . . .   6
     11.4.  Time Anchoring . . . . . . . . . . . . . . . . . . . . .   6
   12. Example Flows . . . . . . . . . . . . . . . . . . . . . . . .   6
     12.1.  Snapshot and Resume  . . . . . . . . . . . . . . . . . .   6
     12.2.  Transfer Pair  . . . . . . . . . . . . . . . . . . . . .   6
     12.3.  Semantic Surface Mismatch  . . . . . . . . . . . . . . .   7
     12.4.  Filename-Surface Contract  . . . . . . . . . . . . . . .   7
   13. Position in the Four-W Vault Family . . . . . . . . . . . . .   8
     13.1.  Overview . . . . . . . . . . . . . . . . . . . . . . . .   8
     13.2.  Causal relation between the family members . . . . . . .   8
     13.3.  Regulatory fit . . . . . . . . . . . . . . . . . . . . .   9
   14. Security Considerations . . . . . . . . . . . . . . . . . . .   9
   15. Interoperability Considerations . . . . . . . . . . . . . . .   9
   16. Relationship to the Broader Humotica Stack  . . . . . . . . .  10
   17. Future Work . . . . . . . . . . . . . . . . . . . . . . . . .  10
   18. Questions for Future Revisions  . . . . . . . . . . . . . . .  10
   19. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   20. References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
   Appendix A.  Acknowledgements . . . . . . . . . . . . . . . . . .  11
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  11

van de Meent            Expires 10 November 2026                [Page 2]
Internet-Draft              TIBET Causal Time                   May 2026

1.  Status of This Memo

   This memo is an Internet-Draft revision (-02) of draft-vandemeent-
   tibet-causal-time, derived from operational architecture notes,
   prototype implementations, and forensic delivery work produced in the
   Humotica / TIBET stack during May 2026.  The -01 revision added
   Section 12.4 (Filename-Surface Contract) following external peer
   review by Red Specter Security Research (RS-2026-001).  The -02
   revision adds Section 13 (Position in the Four-W Vault Family)
   following the family naming agreed with the implementation team on 12
   May 2026: tibet-vault (WHEN), tibet-keychain (WHERE/HOW), tibet-sam
   (WHY), tibet-gateway (WHERE-EXEC).  The Causal Time Substrate
   underpins all four.

   It is intended to capture and formalize an already deployed
   structural property of TIBET rather than to introduce a greenfield
   timing model.

   This document is an initial public framing and substrate document
   intended to align distributed-systems theory, identity-bound
   execution, off-grid or degraded-network operations, and forward-only
   recovery semantics.

2.  Problem Statement

   Many distributed systems continue to over-privilege wall-clock time.
   They assume that safe ordering, freshness, replay defense, and
   reversibility can be grounded primarily in synchronized UTC.

   That assumption is fragile under intermittent connectivity, NTP
   outage or misconfiguration, GNSS disruption, clock drift across edge
   nodes, compromised or ambiguous time authorities, and adversarial
   replay after restore or rollback.

   This document argues that causal order should be primary, wall-clock
   time auxiliary, recovery forward-only, and history non-rewritable.

3.  Terminology

   Causal Time:  The ordering of events by their dependency and sequence
      relationships, rather than by globally synchronized wall-clock
      timestamps.

   Forward-Only Causal Substrate:  A substrate in which valid state
      evolution occurs only by appending new causally linked events.

   Logical Counter:  A monotonic counter associated with event

van de Meent            Expires 10 November 2026                [Page 3]
Internet-Draft              TIBET Causal Time                   May 2026

      generation and ordering.  Within TIBET this corresponds to the
      generation field.

   External Time Anchor:  An observation of an external time-bearing
      source, recorded into the causal substrate as a signed event.

   Drift Record:  A signed record describing observed offset between
      local time and an external anchor or between two time-bearing
      participants.

   Triage Fork:  A forward-causal isolation path created in response to
      anomaly, mismatch, or uncertain continuity.

4.  Design Goals

   The TIBET Causal Time Substrate is intended to preserve causal
   ordering without dependence on absolute time, support cryptographic
   identity binding of events, permit recovery and revocation without
   history rewriting, and remain meaningful under offline or degraded-
   network conditions.

   It is also intended to integrate with external time anchors, support
   replay-sensitive freshness checks, and surface time uncertainty
   honestly.

5.  Model Overview

   TIBET encodes causal order through a set of existing structural
   primitives including append-only linkage, signatures, generation
   counters, and parent references.

   These map naturally onto a Lamport-style logical ordering model:
   happened-before pointers, tamper-evident order proof, authenticated
   event origin, logical counters, causal predecessors, and event-line
   roots.

   The important consequence is that TIBET already behaves as a causally
   ordered logical-time substrate.  This document formalizes that fact.

6.  Relation to Lamport and Related Work

   This document is directly aligned with Lamport's logical-time model
   and the later vector-clock tradition associated with Fidge and
   Mattern.

   TIBET extends that tradition by binding logical ordering to
   cryptographic identity, append-only lineage, and explicit fork,
   merge, and tombstone semantics.

van de Meent            Expires 10 November 2026                [Page 4]
Internet-Draft              TIBET Causal Time                   May 2026

7.  Forward-Only Property

   The defining property of TIBET causal time is not merely that events
   are ordered, but that valid evolution occurs only by moving forward.

   Restore becomes fork rather than rewind, revocation becomes successor
   event rather than mutation, correction becomes amendment rather than
   overwrite, and cancellation becomes compensating action rather than
   erasure.

8.  Event Classes

   *  ordinary application or system action events

   *  fork or snapshot-reference events

   *  merge or transfer-pair events

   *  tombstone events

   *  triage or quarantine events

   *  external time-anchor events

   *  drift-record events

   These classes are not all necessarily already standardized in TIBET
   registries, but they align structurally with the substrate described
   here.

9.  External Time Anchors

   External time anchors provide auxiliary alignment between local
   causal order and broader time-bearing reference systems such as NTP,
   timestamping authorities defined by [RFC3161], Roughtime, GNSS, PTP,
   public ledger timestamps, or observed environmental anchors.

   External time anchors may improve alignment.  They must not redefine
   already established causal order.

10.  Drift and Alignment

   Clock drift is expected in real systems, especially edge systems and
   off-grid nodes.  TIBET treats drift as a recordable condition, not as
   a collapse of ordering truth.

van de Meent            Expires 10 November 2026                [Page 5]
Internet-Draft              TIBET Causal Time                   May 2026

   Implementations should be able to represent locally observed time,
   externally anchored time, offset between them, uncertainty window,
   and validity scope of the observation.

11.  Processing Model

11.1.  Local Event

   When a local event is committed, the implementation increments or
   derives a monotonic generation value, binds the event to prior causal
   state, signs the event, and appends it.

11.2.  Incoming Causal Reference

   When a remote or transferred event enters local reasoning, the
   implementation evaluates causal relation and derives successor
   progression in Lamport style as max(local generation, remote
   generation) plus one for any new local successor event that depends
   on both.

11.3.  Recovery

   Recovery produces successor state by fork, compensation, revocation,
   or new forward-causal action.  It must not pretend to restore the
   system to an earlier pre-committed causal state.

11.4.  Time Anchoring

   When external time is sampled, the implementation may write an
   external-anchor event and may write drift information, but must not
   use the anchor to invalidate already committed causal order.

12.  Example Flows

12.1.  Snapshot and Resume

   In the TIBET model, a snapshot references a chain position and resume
   becomes a fork from that position.  The new line advances with its
   own forward-only history.

12.2.  Transfer Pair

   In TAT or TIBET Drop, transfer_out records sender-side causal
   commitment, transfer_in records receiver-side causal acknowledgement,
   and successor generation derives from the maximum of local and sender
   generation plus one.

van de Meent            Expires 10 November 2026                [Page 6]
Internet-Draft              TIBET Causal Time                   May 2026

12.3.  Semantic Surface Mismatch

   If routing surface and sealed manifest differ, content may still be
   valid, but the causal substrate should treat the situation as anomaly
   and create a triage fork or isolation path.

12.4.  Filename-Surface Contract

   The semantic surface of a sealed continuity envelope is carried in
   two layers: the filename layer, observable without unpacking, and the
   manifest layer, authoritative only after Ed25519 signature
   verification.

   These two layers MAY agree, partially agree, or conflict.  A
   verifying implementation produces one of four surface_status
   verdicts: MATCH (all surface_* fields agree), PARTIAL (some agree,
   others absent or differ), MISMATCH (both layers present and at least
   one field conflicts -- potential rename attack), or NONE (neither
   layer has surface_* fields -- legacy bundle).

   Filename construction is the operator's responsibility.  The packing
   library SHOULD provide a helper that derives a canonical filename
   from the manifest's surface_* fields, so MATCH is the default for
   freshly packed envelopes.  However, this specification does not
   require it.

   PARTIAL is therefore a valid and expected verdict for envelopes that
   an operator has consciously renamed for human navigation (e.g.
   "vergadering-dinsdag.pdf").  It is NOT a defect; it is a recorded
   statement that the human-applied name diverges from the canonical-
   from-manifest name.

   Implementations MUST be able to reconstruct the canonical filename
   from the manifest alone, so that any peer with the bundle can recover
   the original SSM-derived name after operator rename, record both the
   human name and the canonical name in audit so that rename events
   become explicit instead of silent, and detect MISMATCH as a candidate
   rename-attack signal distinct from PARTIAL (operator-renamed) and
   MATCH (no rename or aligned rename).

   Audit records emitted by a verifying implementation SHOULD carry the
   field name "canonical_name" alongside the on-disk "name" field, with
   a boolean "renamed_by_operator" derived from their inequality.  This
   naming convention is referred to as the canonical_name field
   throughout this specification; the helper function that computes it
   from a manifest is named canonical_filename().

van de Meent            Expires 10 November 2026                [Page 7]
Internet-Draft              TIBET Causal Time                   May 2026

   This contract anchors causality to the visible surface: a peer seeing
   only the filename has a hint; a peer seeing the sealed content has
   the truth; the audit chain records the relationship between the two.

13.  Position in the Four-W Vault Family

   The Causal Time Substrate defined in this document does not stand
   alone.  It underpins a four-part family of credential and continuity
   primitives, agreed informally by the implementation team on 12 May
   2026 and elaborated in companion specifications.

13.1.  Overview

   The four-W family arose from the recurring observation that secret-
   handling systems consistently fail to answer four distinct questions:
   when may a sealed result be disclosed, how is the underlying secret
   stored and tracked, why is a specific bounded act permitted, and
   where is the act safely performed.  Each W maps to its own primitive
   in the family.

   The family members are: tibet-vault, the WHEN primitive, which is a
   temporal trigger that releases a sealed payload on a date or upon a
   dead-man-switch condition; tibet-keychain, the WHERE/HOW primitive,
   which records custody and timeline for where a secret currently
   lives, who touched it, when it was rotated or exposed, and how it
   moved between owner, custodian, and active operator; tibet-sam, the
   WHY primitive, which is a Sealed Authentication Module that permits a
   single bounded act without releasing the underlying secret and is
   specified as an extension to the Semantic Surface Manifest (see
   related document draft-vandemeent-tibet-semantic-surface- manifest,
   Section 13); and tibet-gateway, the WHERE-EXEC primitive, which is
   the execution boundary runtime in which a SAM envelope is unsealed,
   validated, executed against an upstream credential, and the ephemeral
   session destroyed.

13.2.  Causal relation between the family members

   The Causal Time Substrate provides the verifiable ordering and
   identity-bound action chain that lets the four family members
   interoperate.  Every meaningful event in the family produces an entry
   in a TIBET audit chain: secret creation in tibet-keychain, SAM
   materialisation linking back to the issuing keychain action, gateway
   execution linking to the materialised SAM, and disclosure events in
   tibet-vault when applicable.

van de Meent            Expires 10 November 2026                [Page 8]
Internet-Draft              TIBET Causal Time                   May 2026

   The forward-only property defined in Section 7 of this document
   ensures that none of these events can be retroactively altered: a
   credential-handling system built on this substrate cannot pretend
   that a secret was rotated earlier than it was, nor that an
   authorisation was granted before the prior revocation event.

13.3.  Regulatory fit

   The four-W family answers four distinct regulatory questions that
   traditional secret-store products do not natively address: who has
   access (custody timeline, WHERE/HOW primitive); why was a specific
   use authorised (intent and scope record, WHY primitive); where did
   the use occur (execution boundary record, WHERE-EXEC primitive); and
   when may the result be disclosed (temporal trigger, WHEN primitive).
   Implementations of any subset of these primitives SHOULD record their
   events into a shared Causal Time Substrate chain so that audit
   walkers (such as tibet-cbom) can reconstruct the full sequence after
   the fact.

14.  Security Considerations

   This document assumes an attacker may replay previously valid
   artifacts, re-inject old state through backup or restore channels,
   manipulate wall-clock sources or exploit clock drift, rename or
   relabel artifacts outside sealed causal truth, or attempt destructive
   rollback semantics through operational tooling.

   The forward-only causal model is specifically designed to reduce
   replay-after-restore, replay-after-revoke, backup injection, clock-
   spoofing ambiguity, drift concealment, and destructive rollback.

   The key invariant is that security-sensitive reversibility must be
   implemented as forward causal compensation, not as history rewrite.

15.  Interoperability Considerations

   This substrate is designed to compose with JIS identity, UPIP
   continuity, TAT transfer flow, TBZ or ICC container semantics, and
   semantic routing surfaces.

   Interoperability therefore depends less on UTC agreement and more on
   shared causal encoding, verifiable linkage, explicit anchor
   semantics, and clear distinction between order and alignment.

van de Meent            Expires 10 November 2026                [Page 9]
Internet-Draft              TIBET Causal Time                   May 2026

16.  Relationship to the Broader Humotica Stack

   Within the broader architecture, Turing answers what computes,
   Lamport-style causal time answers when in event order, JIS answers
   who is permitted, and semantic framing layers answer within what
   semantic frame a process is interpreted.

   TIBET occupies the causal-time substrate role while composing with
   the other axes.

17.  Future Work

   *  standardized external time-anchor token shape

   *  standardized drift-record token shape

   *  explicit uncertainty handling

   *  causal freshness proofs for intermittently connected devices

   *  zero-disclosure continuity proofs over long time horizons

   *  alignment with RFC 3161, Roughtime, and public-ledger anchoring
      profiles

18.  Questions for Future Revisions

   The following topics are non-blocking for the present -00 version and
   are recorded here to guide later discussion and interoperability
   work.

   *  whether drift should be standardized as its own token type or as a
      subclass of time-anchor event

   *  whether external anchor trust levels should be formally graded

   *  whether causal freshness should be defined as a reusable
      verification primitive

   *  how uncertainty and stale-anchor conditions should be surfaced in
      operator tooling

   *  whether some domains should require time-anchor presence while
      others permit purely local causal mode

van de Meent            Expires 10 November 2026               [Page 10]
Internet-Draft              TIBET Causal Time                   May 2026

19.  IANA Considerations

   This document has no IANA actions in the present version.

   Future revisions may define registries for external time-anchor token
   shapes, drift-record token shapes, or causal freshness proof types,
   likely under Expert Review policy as described in [RFC8126].

20.  References

   [LAMPORT1978]
              Lamport, L., "Time, Clocks, and the Ordering of Events in
              a Distributed System", Communications of the ACM 21(7),
              1978.

   [RFC3161]  Adams, C., "Internet X.509 Public Key Infrastructure Time-
              Stamp Protocol (TSP)", RFC 3161, August 2001,
              <https://www.rfc-editor.org/info/rfc3161>.

   [RFC8126]  Cotton, M., Leiba, B., and T. Narten, "Guidelines for
              Writing an IANA Considerations Section in RFCs", BCP 26,
              RFC 8126, June 2017,
              <https://www.rfc-editor.org/info/rfc8126>.

Appendix A.  Acknowledgements

   The author thanks the Humotica team for editorial assistance,
   internal peer review, and operational tooling that made this
   substrate framing concrete rather than theoretical.

   The substrate framing also builds on the logical-time tradition
   established by [LAMPORT1978].

   The author also thanks Richard Barron of Red Specter Security
   Research for adversarial validation that helped sharpen the forward-
   only recovery property under realistic attack conditions.

Author's Address

   Jasper van de Meent
   Humotica
   Netherlands
   Email: info@humotica.com
   URI:   https://humotica.com/

van de Meent            Expires 10 November 2026               [Page 11]