AZ-037 — Long-Term Archive Verification and Preservation Schedule v1
Status
Acest document definește programul de verificare și conservare pe termen lung pentru arhivele critice ATLAS ZERO.
După AZ-001 până la AZ-036, există deja:
- specificația protocolului și a subsistemelor;
- vault-ul de artefacte, manifesturile și atestările;
- pachetele release/genesis;
- launch archive și audit package;
- protocolul de upgrade și hard fork;
- matricea de compatibilitate și rollout-ul dintre versiuni.
AZ-037 răspunde la întrebarea: cum ne asigurăm că arhivele critice rămân verificabile, complete și reutilizabile peste ani, chiar dacă mediile de stocare se degradează, formatele de transport se schimbă și echipele sau infrastructura inițiale dispar?
Scopul documentului este să fixeze:
- clasele de arhive cu retenție lungă;
- verificările periodice obligatorii;
- politica de migrare a mediilor de stocare;
- reverificarea manifesturilor, hash-urilor și atestărilor;
- detectarea degradării și coruperii tăcute;
- procedurile de re-ambalare, re-indexare și re-atestare fără a altera adevărul arhivat.
Acest document se bazează pe:
- AZ-002 până la AZ-036, cu accent direct pe AZ-018, AZ-019, AZ-020, AZ-021, AZ-033, AZ-034 și AZ-036.
Termeni:
- MUST = obligatoriu
- MUST NOT = interzis
- SHOULD = recomandat puternic
- MAY = opțional
1. Obiectiv
AZ-037 răspunde la 10 întrebări critice:
- Ce arhive trebuie păstrate pe termen lung?
- Cât de des trebuie reverificate?
- Ce înseamnă verificare de arhivă completă versus verificare superficială?
- Cum detectăm degradarea tăcută a mediilor și a fișierelor?
- Cum migrăm arhivele între medii de stocare fără a altera identitatea lor normativă?
- Cum păstrăm atestările și manifesturile utile peste ani?
- Ce facem când un format auxiliar devine depășit sau greu de citit?
- Cum reconstituim o arhivă din copii redundante?
- Cum păstrăm o politică auditabilă de retenție și verificare?
- Cum evităm situația în care „arhiva există”, dar nu mai poate fi verificată sau folosită?
2. Principii
2.1 Preservation means verifiable preservation
A păstra o arhivă înseamnă mai mult decât a o copia. Înseamnă să poți demonstra în timp că:
- este aceeași;
- este completă;
- și poate fi reconstruită semantic.
2.2 Manifest truth outlives storage medium
Adevărul arhivat MUST rămâne definit de manifesturi, identități de artefact și rădăcini canonice, nu de filesystem-ul sau mediul particular în care se află copia curentă.
2.3 Reverification must be scheduled, not ad hoc
Arhivele critice MUST avea un program explicit de reverificare. Verificarea ocazională, făcută doar când apare o problemă, este insuficientă.
2.4 Migration is normal, silent mutation is forbidden
Mediile de stocare și containerele se pot schimba. Conținutul normativ arhivat MUST NOT fi alterat tăcut.
2.5 Auxiliary convenience formats are replaceable; normative payload is not
Putem migra ambalaje, indexuri și reprezentări auxiliare. Nu putem schimba identitatea normativă a artefactelor și manifesturilor fără supersession explicită.
2.6 Long-term preservation is a protocol governance concern
Arhivele launch, upgrade, incident și audit sunt parte din memoria instituțională și operațională a rețelei. Pierderea verificabilității lor este un risc real.
3. Archive classes under preservation
3.1 Recommended long-term classes
ATLAS ZERO SHOULD păstra explicit cel puțin:
LT_ARCHIVE_MAINNET_LAUNCHLT_ARCHIVE_EARLY_MAINNETLT_ARCHIVE_STABILIZATION_REVIEWLT_ARCHIVE_UPGRADE_AND_FORKLT_ARCHIVE_SECURITY_INCIDENTLT_ARCHIVE_KEY_COMPROMISE_AND_ROTATIONLT_ARCHIVE_GOVERNANCE_CRITICALLT_ARCHIVE_CONFORMANCE_RELEASE
3.2 Rule
Fiecare clasă SHOULD avea:
- retention horizon;
- verification cadence;
- replication policy;
- restoration priority.
4. Preservation scope
4.1 Canonical structure
PreservationScope {
preservation_scope_id
archive_class
target_network_class
target_chain_id
target_genesis_hash?
archive_id
retention_class
criticality_tier
}
4.2 retention_class examples
- short_operational
- medium_audit
- long_governance
- permanent_constitutional
4.3 Rule
Preservation policy MUST be scope-bound and explicit.
5. Verification levels
5.1 Standard verification levels
AVL_PRESENCE_ONLYAVL_CHECKSUM_LEVELAVL_MANIFEST_LEVELAVL_FULL_NORMATIVE_REBUILDAVL_CROSS_COPY_RECOVERY_TEST
5.2 Meaning
AVL_PRESENCE_ONLY
Verifică doar că fișierele există. Insuficient pentru arhive critice.
AVL_CHECKSUM_LEVEL
Verifică checksums auxiliare sau top-level bundle hashes.
AVL_MANIFEST_LEVEL
Verifică manifestul, intrările și identitatea artefactelor.
AVL_FULL_NORMATIVE_REBUILD
Reconstruiește și revalidează rădăcinile normative și relațiile.
AVL_CROSS_COPY_RECOVERY_TEST
Reconstituie arhiva din copii redundante și verifică identitatea finală.
5.3 Rule
Arhivele TIER_4 sau constituționale SHOULD receive at least periodic AVL_FULL_NORMATIVE_REBUILD.
6. Verification cadence classes
6.1 Recommended cadence classes
CAD_MONTHLYCAD_QUARTERLYCAD_SEMIANNUALCAD_ANNUALCAD_EVENT_TRIGGERED
6.2 Rule
Critical archives SHOULD have both:
- periodic cadence;
- event-triggered verification after migration, incident or storage anomaly.
7. Verification schedule object
7.1 Canonical structure
ArchiveVerificationSchedule {
schedule_id
preservation_scope_id
verification_level
cadence_class
next_due_policy_hash
escalation_policy_hash
active
}
7.2 Rule
Each critical archive SHOULD be linked to a concrete active verification schedule.
8. Verification run object
8.1 Canonical structure
ArchiveVerificationRun {
run_id
preservation_scope_id
verification_level
archive_id
started_at_unix_ms
completed_at_unix_ms?
verifier_policy_ref
result_class
evidence_root?
notes_hash?
}
8.2 result_class
RUN_PASSRUN_PASS_WITH_NOTESRUN_FAILRUN_PARTIALRUN_RECOVERY_REQUIREDRUN_QUARANTINE_REQUIRED
8.3 Rule
Long-term preservation MUST rely on recorded runs, not oral memory.
9. Verification evidence model
9.1 Evidence MAY include:
- manifest verification results
- normative root recomputation outputs
- copy comparison results
- media health reports
- missing entry reports
- corruption detection reports
- restore trial reports
- attestation verification results
9.2 Canonical structure
ArchiveVerificationEvidenceEntry {
evidence_class
evidence_ref
}
9.3 Rule
Important verification runs SHOULD be evidence-backed enough for later audit.
10. Media health monitoring
10.1 Preservation SHOULD monitor storage-media health signals such as:
- unreadable sectors or blocks
- checksum drift
- replication mismatch
- unexpected deletion or truncation
- slow read anomalies suggestive of decay
- metadata corruption
- container extraction failures
10.2 Rule
Media-health degradation SHOULD trigger earlier archive reverification.
11. Silent corruption detection
11.1 Need
One of the main risks is bit rot or silent mutation.
11.2 Detection SHOULD rely on:
- content_hash recomputation
- canonical_hash recomputation where applicable
- chunk_root verification
- manifest root verification
- cross-copy comparison
- periodic full rebuild tests for top-tier archives
11.3 Rule
Silent corruption MUST NOT be treated as hypothetical; preservation policy should assume it can happen.
12. Chunk-level preservation
12.1 Large archives or bundles SHOULD preserve:
- chunk hashes
- chunk roots
- chunk manifests if relevant
12.2 Benefit
Allows:
- partial corruption detection
- targeted repair
- cross-copy healing
- more efficient revalidation
12.3 Rule
Chunk-level metadata MUST remain linked to original artifact identity, not replace it.
13. Replication policy
13.1 Critical archives SHOULD have:
- multiple independent copies
- multiple physical or cloud backends
- at least one cold/offline copy for highest criticality scopes
- at least one copy outside the primary operational failure domain
13.2 Rule
All copies SHOULD be treated as candidates until verified. Replication without verification is weak preservation.
14. Preservation tiers
14.1 Suggested tiers
PT_NORMALPT_IMPORTANTPT_CRITICALPT_CONSTITUTIONAL
14.2 Example mapping
PT_NORMAL
Internal release-support archives.
PT_IMPORTANT
Conformance release packages, non-launch major upgrades.
PT_CRITICAL
Mainnet launch, early-mainnet, major incident bundles.
PT_CONSTITUTIONAL
Genesis, chain-identity-defining records, hard fork roots, constitutional governance records.
14.3 Rule
Higher preservation tier => stronger cadence, stronger rebuild testing, stricter media redundancy.
15. Preservation policy matrix
15.1 The system SHOULD maintain, per archive class or tier:
- retention duration
- verification level minimum
- cadence minimum
- replication count minimum
- cold-storage requirement
- migration review requirement
- mandatory restore-test frequency
15.2 Rule
This matrix SHOULD be canonical and auditable.
16. Retention horizons
16.1 Recommended horizons
- operational support archives: years as policy requires
- mainnet launch and upgrade archives: long multi-year retention minimum
- constitutional/identity-defining archives: effectively permanent or equivalent governance-grade retention
16.2 Rule
Exact durations MAY vary by policy, but critical launch and identity archives SHOULD not have short-lived retention.
17. Migration of storage media
17.1 Need
Media and storage platforms age out.
17.2 Migration MUST preserve:
- archive manifest truth
- normative entry root
- artifact identities
- scope binding
- attestation lineage
- prior verification history
17.3 Rule
Migration MUST create migration records, not silent copy-and-delete behavior.
18. Archive migration record
18.1 Canonical structure
ArchiveMigrationRecord {
migration_id
preservation_scope_id
source_storage_profile_hash
target_storage_profile_hash
migrated_archive_id
pre_migration_verification_ref
post_migration_verification_ref
migration_time_unix_ms
result_class
}
18.2 result_class
MIGRATION_PASSMIGRATION_PASS_WITH_NOTESMIGRATION_FAILMIGRATION_ROLLBACK_REQUIRED
18.3 Rule
Critical archives SHOULD be verified both before and after migration.
19. Repackaging rules
19.1 Sometimes transport or storage container formats change.
19.2 Rule
Repackaging MAY change:
- outer archive container
- compression
- filesystem layout convenience
- side indexes
But MUST NOT change:
- normative artifact bytes
- manifest identity
- canonical roots unless done through explicit supersession model.
19.3 Rule
Repackaged copies SHOULD themselves be tracked as storage/container artifacts, not mistaken for new normative archives.
20. Re-indexing rules
20.1 Indexes may be regenerated.
20.2 Rule
Indexes are derived. They MAY be replaced or rebuilt, but MUST remain clearly non-authoritative compared with manifest truth.
20.3 Rule
Index regeneration SHOULD be logged and SHOULD be verifiable against archive manifest.
21. Long-term attestation verification
21.1 Need
Attestations may remain useful for provenance and audit years later.
21.2 Preservation SHOULD include:
- attestation objects
- revocation and supersession records
- policy matrix versions
- verification outputs at time of archive verification
21.3 Rule
If older signature schemes become operationally harder to verify, the archive SHOULD still preserve original attestation truth and MAY add modern preservation attestations without altering original claim.
22. Preservation attestation object
22.1 Canonical structure
ArchivePreservationAttestation {
attestation_id
preservation_scope_id
verification_run_ref
attestation_class
attestor_policy_ref
timestamp_unix_ms
signature_envelopes
}
22.2 attestation_class examples
- integrity_reconfirmed
- migration_verified
- rebuild_verified
- retention_review_completed
22.3 Rule
Preservation attestations MAY add confidence, but MUST NOT overwrite original archive truth.
23. Restoration / recovery testing
23.1 Critical archives SHOULD periodically undergo restore tests:
- from primary copy
- from secondary copy
- from mixed-copy reconstruction if chunk model supports it
23.2 Rule
At least some high-tier archives SHOULD receive AVL_CROSS_COPY_RECOVERY_TEST on scheduled basis.
23.3 Goal
Ensure that “restorable” is demonstrated, not assumed.
24. Recovery test record
24.1 Canonical structure
ArchiveRecoveryTestRecord {
recovery_test_id
preservation_scope_id
source_copy_root
reconstructed_archive_id
verification_run_ref
timestamp_unix_ms
result_class
}
24.2 result_class
RECOVERY_PASSRECOVERY_PASS_WITH_NOTESRECOVERY_FAILRECOVERY_PARTIAL
24.3 Rule
A failed recovery test SHOULD escalate preservation priority immediately for that scope.
25. Degradation escalation model
25.1 Degradation classes
DEG_MEDIA_WARNINGDEG_COPY_MISMATCHDEG_MANIFEST_FAILUREDEG_MISSING_REQUIRED_ENTRYDEG_REBUILD_FAILUREDEG_ATTESTATION_VERIFICATION_GAPDEG_SCOPE_INCONSISTENCY
25.2 Rule
Critical degradation SHOULD map to:
- quarantine of suspect copy
- immediate reverification of other copies
- migration planning
- archive preservation incident if necessary
26. Quarantine of suspect copies
26.1 Need
Not every failing copy means the archive truth is lost. But suspect copies MUST be isolated.
26.2 Rule
A suspect copy SHOULD be:
- marked non-authoritative
- removed from automated restore preference
- preserved for forensic comparison if useful
- replaced only after verification of healthy copies
26.3 Rule
Copy quarantine MUST NOT imply archive revocation unless normative truth itself is compromised.
27. Archive supersession and preserved history
27.1 Need
A fuller archive package may supersede an earlier incomplete one.
27.2 Rule
Long-term preservation MUST keep:
- original archive id
- superseding archive id
- supersession reason
- continuity proof between them
27.3 Rule
Do not silently discard older archive generations if they are part of historical audit chain.
28. Archive revocation under long-term preservation
28.1 Need
An archive may later be found incomplete or corrupted.
28.2 Rule
Revocation MUST remain explicit and preserved in long-term schedule, including:
- revocation reason
- evidence
- replacement archive if any
- date and responsible authority
28.3 Rule
Revoked archives remain historically important and SHOULD not vanish.
29. Preservation review cadence
29.1 In addition to per-run verification, the preservation program SHOULD conduct periodic policy reviews asking:
- are retention tiers still appropriate?
- are storage backends still viable?
- are verification tools still reproducible/available?
- do signature verification dependencies need modernization?
- have any archives drifted into incomplete status?
29.2 Rule
Long-term preservation is not static; its policy layer also needs review.
30. Preservation review record
30.1 Canonical structure
PreservationReviewRecord {
review_id
review_window_hash
reviewed_scope_root
findings_root
policy_change_root?
timestamp_unix_ms
result_class
}
30.2 result_class
PRES_REVIEW_OKPRES_REVIEW_NEEDS_ACTIONPRES_REVIEW_INCIDENT_OPENED
30.3 Rule
Critical preservation reviews SHOULD feed into governance or operational backlog if action needed.
31. Tooling preservation
31.1 Need
Even if bytes survive, verification may fail if tooling disappears.
31.2 Preservation SHOULD consider archiving:
- manifest schema versions
- verification tool versions or source refs
- container extraction rules
- migration notes for deprecated auxiliary formats
- canonicalization rules
31.3 Rule
Preserving only the archive bytes without enough interpretation context can be insufficient.
32. Human-readable preservation notes
32.1 MAY include:
- storage migration rationale
- operational incidents affecting archive copies
- schema evolution notes
- known caveats in auxiliary formats
- verifier toolchain notes
32.2 Rule
These notes are auxiliary. Normative truth still rests in manifests and verification records.
33. Governance interaction
33.1 For constitutional or permanent archives, preservation failures SHOULD be visible to governance or equivalent authority.
33.2 Rule
Loss of long-term verifiability for constitutional archives is not just storage hygiene issue; it is governance-grade risk.
34. Incident interaction
34.1 Severe preservation failures MAY warrant incident handling, especially if:
- no verified good copy remains
- constitutional archive manifest cannot be rebuilt
- multiple copies disagree on normative entries
- recovery tests fail across replicas
34.2 Rule
Preservation incidents SHOULD be classified and archived like other critical operational incidents.
35. Audit queries the preservation program SHOULD answer
35.1 Examples
- When was archive X last fully rebuilt and verified?
- How many verified copies exist?
- Which migration events occurred?
- Which copy is currently preferred authoritative restore source?
- Has any required entry ever failed verification?
- Which archives are overdue for revalidation?
35.2 Rule
If the preservation schedule cannot answer these, it is under-specified.
36. Anti-patterns
Systems SHOULD avoid:
- assuming archive copies are fine because storage says “healthy”
- no scheduled full rebuilds for critical archives
- replacing media with no migration records
- treating checksum-only checks as enough forever
- losing verification tooling context
- re-compressing or re-packaging normative artifacts with silent mutation
- no cold copy for top-tier archives
- deleting superseded archive generations
- not testing restore from secondary copies
- keeping retention policy only in informal docs
37. Formal goals
AZ-037 urmărește aceste obiective:
37.1 Long-term verifiability
Critical archives remain provably intact and reconstructible over time.
37.2 Controlled storage evolution
Media migrations and format evolution do not silently damage normative truth.
37.3 Recovery confidence
The system periodically demonstrates that archived truth can actually be restored.
37.4 Governance-grade memory durability
Launch, fork, incident and constitutional archives remain usable across long horizons.
38. Formula documentului
Long-Term Archive Preservation = scheduled reverification + scope-bound retention policy + replication + migration records + rebuild testing + explicit degradation handling
39. Relația cu restul suitei
- AZ-033 definește ce intră în arhiva de launch și audit.
- AZ-037 definește cum rămâne acea arhivă verificabilă peste ani.
Pe scurt: AZ-033 construiește arhiva; AZ-037 o păstrează vie și verificabilă în timp.
40. Ce urmează
După AZ-037, documentul corect este:
AZ-038 — External Audit Interface and Evidence Export Format
Acolo trebuie fixate:
- cum exportăm dovezile pentru auditori externi;
- ce bundle-uri și manifesturi livrăm;
- cum reducem datele sensibile fără a pierde auditabilitatea;
- și cum standardizăm interfața de audit pentru launch, upgrade, incident și archive review.
Închidere
O arhivă critică nu moare doar când o ștergi. Moare și când nimeni nu mai poate demonstra că este aceeași, când copiile au derivat în tăcere, când mediul s-a schimbat, sau când restaurarea nu mai funcționează decât în teorie.
Acolo începe conservarea reală: nu când ai multe copii, ci când ai un program disciplinat prin care adevărul arhivat este reverificat și salvat înainte să se piardă.