AZ-045 — Formal Recovery Boundary and State Legitimacy Framework v1
Status
Acest document definește cadrul formal pentru:
- recovery boundary;
- legitimitatea stării după incidente grave;
- continuitatea versus ruptura legitimă;
- și recordurile prin care recuperarea devine auditabilă, guvernabilă și constituțional clară.
După AZ-001 până la AZ-044, există deja:
- specificația protocolului și a subsistemelor;
- modelul de incident response, recovery operațional, launch, upgrade și hard fork;
- canonul constituțional al identității de rețea;
- registrul parametrilor protocolari;
- arhivele, exporturile de audit și canonul postmortem-urilor.
AZ-045 răspunde la întrebarea: ce înseamnă recovery legitim al unei rețele vii după incident grav, unde este granița dintre restaurare legitimă și rescriere nelegitimă a istoriei, și cum păstrăm clar, verificabil și ratificat adevărul despre ce stare este recunoscută ca legitimă după o astfel de tranziție?
Scopul documentului este să fixeze:
- noțiunea de recovery boundary;
- clasele de recovery;
- modelul de legitimitate a stării;
- obiectele de ratificare, continuitate și divergență;
- regulile pentru replay, snapshot, restore, rollback și reissue de identitate;
- relația cu constitutional canon, hard fork canon, archive și governance.
Acest document se bazează pe:
- AZ-002 până la AZ-044, cu accent direct pe AZ-015, AZ-016, AZ-017, AZ-026, AZ-028, AZ-032, AZ-033, AZ-034, AZ-037, AZ-042, AZ-043 și AZ-044.
Termeni:
- MUST = obligatoriu
- MUST NOT = interzis
- SHOULD = recomandat puternic
- MAY = opțional
1. Obiectiv
AZ-045 răspunde la 10 întrebări critice:
- Ce este un recovery boundary?
- Ce face o stare „legitimă” după incident?
- Când este recovery doar restaurare și când devine schimbare constituțională?
- Ce recorduri ratifică alegerea unei stări post-incident?
- Cum distingem rollback legitim, replay legitim și rescriere nelegitimă?
- Cum tratăm stările concurente sau disputate?
- Cum se leagă recovery-ul de hard fork, continuity și constitutional canon?
- Cum exportăm și audităm legitimitatea stării recuperate?
- Cum evităm improvizația sub presiune în incidente severe?
- Cum păstrăm pe termen lung memoria exactă a acestei tranziții?
2. Principii
2.1 Recovery legitimacy is a first-class protocol governance concern
Legitimitatea stării după recovery MUST fi tratată ca problemă normativă și de guvernanță, nu doar ca problemă tehnică de infrastructură.
2.2 Not every restore is constitutionally neutral
Unele acțiuni de restore/replay sunt simple recuperări operaționale. Altele mută granița adevărului istoric. Această diferență MUST fi explicită.
2.3 State legitimacy must be reconstructible
Pentru o stare post-incident, un auditor SHOULD putea reconstrui:
- de ce a fost aleasă;
- ce alternative existau;
- ce boundary a fost folosit;
- ce dovezi au susținut alegerea;
- ce autoritate a ratificat-o.
2.4 Recovery should preserve maximum legitimate continuity
Sistemul SHOULD prefera recovery care păstrează cât mai multă continuitate legitimă posibilă, dar nu cu prețul ambiguității sau al continuării sub stare nesigură.
2.5 Dispute must be explicit, not suppressed
Dacă există ambiguitate materială sau conflict despre starea legitimă, canonul SHOULD reprezenta disputa explicit până la rezolvare.
2.6 Recovery records must outlive the crisis
Recordurile de recovery MUST rămâne parte din memoria normativă și auditabilă a rețelei, nu doar artefacte temporare de incident.
3. Recovery purpose
3.1 Framework-ul SHOULD răspunde:
- care a fost ultima stare legitimă necontestată?
- ce boundary de recovery a fost ales?
- ce s-a păstrat și ce s-a abandonat?
- a continuat aceeași rețea legitimă sau s-a creat o ramură nouă?
- ce autoritate a aprobat și pe ce bază?
- cum poate fi verificată această decizie mai târziu?
3.2 Rule
Fără aceste răspunsuri, recovery-ul rămâne vulnerabil la reinterpretare retrospectivă.
4. Recovery classes
4.1 Recommended recovery classes
ATLAS ZERO SHOULD distinge cel puțin:
RC_LOCAL_NODE_RESTORERC_CLUSTER_REPLAY_RECOVERYRC_NETWORK_SAFE_MODE_RECOVERYRC_CHECKPOINT_ROLLBACK_RECOVERYRC_STATE_RECONSTRUCTION_RECOVERYRC_EXCEPTIONAL_CONSTITUTIONAL_RECOVERYRC_FORKED_RECOVERY_CONTINUATIONRC_ABORTED_RECOVERY_ATTEMPT
4.2 Meaning
RC_LOCAL_NODE_RESTORE
Recovery local, fără schimbare de adevăr protocolar.
RC_CLUSTER_REPLAY_RECOVERY
Refacere prin replay/rejoin în același adevăr de rețea.
RC_NETWORK_SAFE_MODE_RECOVERY
Recuperare coordonată sub restricții de rețea.
RC_CHECKPOINT_ROLLBACK_RECOVERY
Revenire la checkpoint anterior recunoscut.
RC_STATE_RECONSTRUCTION_RECOVERY
Reconstrucție formală din artefacte și dovezi, nu doar replay simplu.
RC_EXCEPTIONAL_CONSTITUTIONAL_RECOVERY
Recuperare care atinge legitimitatea istoriei sau a identității și cere ratificare constituțională.
RC_FORKED_RECOVERY_CONTINUATION
Recuperare care creează sau recunoaște ramură separată.
4.3 Rule
Recovery class MUST be explicit because legitimacy and governance implications differ radically.
5. Recovery boundary definition
5.1 A recovery boundary is the exact boundary at which:
- system truth is re-anchored;
- state legitimacy is reasserted;
- recovery actions become effective;
- old post-boundary history may be abandoned, disputed or superseded.
5.2 Boundary classes SHOULD include:
- finalized_epoch_boundary
- finalized_block_boundary
- snapshot_root_boundary
- replay_cutoff_boundary
- constitutional_recovery_boundary
- fork_boundary
5.3 Rule
Boundary MUST be explicit and verifiable.
6. Recovery boundary object
6.1 Canonical structure
RecoveryBoundaryRecord {
version_major
version_minor
recovery_boundary_id
boundary_class
target_network_class
target_chain_id
reference_state_root
reference_finalized_root?
reference_epoch_index?
reference_block_height?
timestamp_unix_ms?
scope_hash
}
6.2 Rule
Fields used MUST match boundary_class exactly. No ambiguous hybrid boundary unless explicitly modeled.
7. State legitimacy model
7.1 A state is legitimate for scope X when:
- it is derivable or reconstructible from accepted canonical inputs;
- it is ratified or recognized by the appropriate authority for that scope;
- it does not conflict with higher-priority constitutional truth still in force;
- and its lineage to prior accepted state is explicit or explicitly broken.
7.2 Rule
Legitimacy MUST be modeled separately from mere availability or convenience.
8. State legitimacy classes
8.1 Recommended classes
SL_NATIVE_CONTINUATIONSL_RECOVERED_CONTINUATIONSL_EXCEPTIONAL_BUT_RATIFIEDSL_DISPUTEDSL_SUPERSEDEDSL_INVALIDSL_BRANCH_SPECIFIC
8.2 Meaning
SL_NATIVE_CONTINUATION
Normal continuation with no exceptional legitimacy questions.
SL_RECOVERED_CONTINUATION
Legitimate state restored through recovery, but continuity remains same.
SL_EXCEPTIONAL_BUT_RATIFIED
Exceptional state accepted through stronger authority and process.
SL_DISPUTED
State legitimacy materially contested or unresolved.
SL_BRANCH_SPECIFIC
State legitimate only on a specific branch after fork/divergence.
8.3 Rule
State legitimacy class SHOULD be part of recovery records and audit exports.
9. Legitimate state record
9.1 Canonical structure
LegitimateStateRecord {
version_major
version_minor
legitimate_state_id
recovery_boundary_ref
resulting_state_root
legitimacy_class
continuity_ref?
governance_act_ref?
evidence_root?
timestamp_unix_ms
notes_hash?
}
9.2 Rule
This record SHOULD be the canonical statement that a given resulting state is recognized as legitimate for the declared scope.
10. Continuity versus rupture
10.1 Continuity exists when:
- the recovered state is accepted as lawful continuation of prior chain identity;
- replay or restore stays within authorized boundaries;
- constitutional canon confirms the continuation.
10.2 Rupture exists when:
- recovered state requires new identity;
- prior history after some boundary is not accepted as continuing same network truth;
- hard fork or constitutional split occurs.
10.3 Rule
The system MUST explicitly choose continuity or rupture when recovery reaches constitutional significance.
11. Recovery continuity record
11.1 Canonical structure
RecoveryContinuityRecord {
continuity_id
prior_legitimate_state_ref
new_legitimate_state_ref
continuity_class
justification_hash
timestamp_unix_ms
}
11.2 continuity_class examples
- replay_continuity
- checkpoint_restore_continuity
- ratified_exceptional_continuity
- branch_specific_continuity
- discontinuity_split
11.3 Rule
Continuity records SHOULD align with constitutional canon and network identity canon.
12. Recovery legitimacy authority
12.1 Different recovery scopes may require different authorities:
- local operator authority for purely local restore
- cluster/operator authority for non-constitutional replay
- governance / constitutional authority for exceptional state legitimacy
- hard fork authority for branch-forming recovery
12.2 Rule
Authority class MUST be explicit and proportional to legitimacy impact.
13. Recovery ratification record
13.1 Canonical structure
RecoveryRatificationRecord {
ratification_id
recovery_class
recovery_boundary_ref
resulting_state_ref
ratification_scope_hash
authority_root
decision_root
evidence_root?
timestamp_unix_ms
}
13.2 Rule
Exceptional or disputed recovery SHOULD require explicit ratification.
14. State reconstruction model
14.1 Some incidents require state reconstruction from:
- archived checkpoints
- finalized roots
- replayable transactions
- witness/proof records
- governance acts
- approved recovery manifests
14.2 Rule
State reconstruction MUST be deterministic enough to be audited and replayed by independent verifiers where feasible.
14.3 Rule
Reconstruction that relies on undocumented manual edits is illegitimate.
15. Recovery manifest
15.1 Canonical structure
RecoveryManifest {
manifest_id
recovery_class
recovery_boundary_ref
source_artifact_root
reconstruction_method_root
expected_resulting_state_root
validation_plan_root
archive_target_root?
}
15.2 Rule
Material recovery SHOULD produce explicit recovery manifest before final ratification.
16. Source artifact root
16.1 Recovery source artifacts MAY include:
- trusted checkpoint snapshots
- launch or upgrade archives
- decision ledger extracts
- governance acts
- witness bundles
- parameter snapshots
- conformance or replay references
- archive verification outputs
16.2 Rule
Source artifact root MUST preserve provenance of everything used to justify resulting state.
17. Validation plan for recovery
17.1 A recovery validation plan SHOULD include:
- replay checks
- state root checks
- consistency checks against known finalized roots
- parameter set consistency
- validator set legitimacy checks
- operator drill or dry-run if possible
- constitutional or governance review if required
17.2 Rule
Recovery without validation plan SHOULD be treated as weak and potentially illegitimate.
18. Recovery decision linkage
18.1 Recovery SHOULD integrate with decision ledger via decisions like:
- recovery_hold
- recovery_proceed
- recovery_authorized
- recovery_rejected
- branch_recovery_authorized
- constitutional_recovery_ratified
- recovered_state_accepted
- recovered_state_disputed
18.2 Rule
Critical recovery decisions MUST be explicit and archivable.
19. Disputed state model
19.1 A disputed state exists when:
- multiple candidate resulting states exist;
- different authorities or evidence sets support different continuations;
- or continuity classification is contested.
19.2 Canonical structure
DisputedStateRecord {
dispute_state_id
disputed_scope_hash
candidate_state_root
claimant_root
evidence_root?
timestamp_unix_ms
}
19.3 Rule
Disputed states SHOULD remain visible until resolved or branched constitutionally.
20. Recovery resolution model
20.1 Resolution outcomes SHOULD include:
- same-chain continuation ratified
- rollback boundary ratified
- branch-specific legitimacy ratified
- new chain identity issued
- dispute remains open
- recovery attempt abandoned
20.2 Rule
Resolution outcome MUST be explicit and SHOULD update constitutional canon where material.
21. Rollback versus illegitimate rewriting
21.1 Legitimate rollback MAY exist if:
- recovery policy and governance allow it;
- exact boundary is explicit;
- legitimacy is ratified by correct authority;
- resulting history is clearly represented as continuation or branch.
21.2 Illegitimate rewriting includes:
- silent replacement of state with no ratification;
- manual state edits outside canonical process;
- retroactive denial of previously recognized state with no continuity or fork record;
- pretending rollback never happened.
21.3 Rule
The difference between rollback and illegitimate rewriting is procedural and constitutional explicitness, not only technical effect.
22. Recovery and hard fork interaction
22.1 Some recoveries become hard fork events when:
- incompatible state truth must be adopted;
- replay protection is needed;
- same identity continuation would be misleading or unsafe;
- governance ratifies split rather than same-chain continuation.
22.2 Rule
When recovery crosses into fork territory, AZ-034 and AZ-043 records SHOULD be emitted as well.
23. Recovery and launch canon interaction
23.1 Post-launch severe incidents MAY require recovery that references:
- launch authorization
- launch archive
- early mainnet stabilization findings
- constitutional launch memory
23.2 Rule
Recovery SHOULD preserve linkage back to original launch truth wherever continuity is claimed.
24. Recovery and parameter canon interaction
24.1 Legitimate recovered state MUST bind to:
- active parameter set at boundary;
- any ratified parameter adjustments made as part of recovery;
- any parameter deactivations or emergency restrictions applied.
24.2 Rule
Recovered state legitimacy SHOULD fail if parameter truth is ambiguous.
25. Recovery and validator legitimacy interaction
25.1 Recovery MAY require explicit validator set legitimacy review:
- which validators are recognized at resulting state;
- which role bindings remain valid;
- whether compromised or laggard validators are excluded;
- whether rejoin thresholds apply.
25.2 Rule
Recovered state SHOULD not leave validator legitimacy implicit.
26. Recovery evidence export
26.1 External audit export SHOULD support:
- recovery manifest
- recovery boundary proof
- legitimacy record
- continuity or rupture record
- ratification evidence
- source artifact proof
- resulting state verification proof
26.2 Rule
Recovery legitimacy should be externally auditable for serious scopes.
27. Recovery archive bundle
27.1 A serious recovery SHOULD archive:
- incident records
- recovery decisions
- recovery manifest
- resulting legitimate state record
- continuity or fork records
- validation evidence
- post-recovery monitoring and stabilization data
- constitutional updates if any
27.2 Rule
Recovery memory SHOULD be durable and queryable.
28. Post-recovery stabilization
28.1 After recovery, system SHOULD re-enter a stabilization mode that asks:
- is resulting state behaving consistently?
- are validators and parameters legitimate and aligned?
- are incident causes actually contained?
- does continuity claim still hold under live observation?
28.2 Rule
Recovered legitimacy SHOULD be monitored, not merely declared.
29. Recovery review triggers
29.1 Recovery legitimacy SHOULD be reviewed when:
- severe incident recovery proposed
- rollback boundary proposed
- replay fails to match expected state
- alternative candidate states emerge
- constitutional authority changes continuity classification
- external audit challenges legitimacy basis
29.2 Rule
Recovery legitimacy is not one-and-done if new evidence appears.
30. Recovery review record
30.1 Canonical structure
RecoveryLegitimacyReviewRecord {
review_id
recovery_scope_hash
candidate_state_root
legitimacy_assessment_class
evidence_root
finding_root?
timestamp_unix_ms
}
30.2 legitimacy_assessment_class
- sufficient_for_continuation
- sufficient_for_branch_specific_legitimacy
- insufficient
- disputed
- requires_constitutional_review
30.3 Rule
This review SHOULD feed ratification and constitutional canon updates.
31. Recovery anti-patterns
31.1 Systems SHOULD avoid:
- “restore from backup” with no legitimacy record
- replay or rollback with no boundary definition
- same-chain continuation claimed after incompatible recovery with no ratification
- manual state edit treated as harmless operational fix
- disputed resulting states hidden to preserve appearance of certainty
- recovery that ignores parameter or validator legitimacy
- archive not updated with recovery truth
- branch split treated as mere operational divergence
- no audit export for recovery that changed constitutional history
- post-recovery stabilization skipped because crisis pressure ended
32. Formal goals
AZ-045 urmărește aceste obiective:
32.1 Legitimate recovery clarity
The system can say exactly why a recovered state is legitimate, for whom and under what authority.
32.2 Explicit boundary between restore and rewrite
Recovery actions that change historical legitimacy are distinguished from ordinary operational restore.
32.3 Constitutional continuity discipline
When continuity holds or breaks, the canon records that explicitly.
32.4 Durable recovery memory
A future reviewer can reconstruct recovery truth without relying on oral history.
33. Formula documentului
Formal Recovery Boundary = explicit recovery boundary + resulting legitimate state record + continuity/rupture classification + ratification authority + auditable source artifacts + post-recovery stabilization
34. Relația cu restul suitei
- AZ-034 definește hard fork discipline.
- AZ-043 definește constitutional identity canon.
- AZ-044 definește parameter truth canon.
- AZ-045 definește cum o rețea grav afectată poate reveni legitim — sau cum se separă legitim într-o ramură distinctă.
Pe scurt: AZ-045 este puntea dintre incident sever și adevărul normativ revalidat al stării.
35. Ce urmează
După AZ-045, documentul corect este:
AZ-046 — Validator Set Legitimacy and Membership Canon
Acolo trebuie fixate:
- ce înseamnă validator legitim;
- cum este menținut și schimbat setul de validatori;
- cum se leagă membership-ul de keys, governance, slashing, recovery și continuity;
- și cum rămâne istoria membership-ului auditabilă și constituțional clară.
Închidere
O rețea nu este recuperată legitim doar pentru că pornește din nou. Este recuperată legitim când putem spune exact: de la ce boundary am repornit, ce stare recunoaștem, de ce o recunoaștem, cine a ratificat-o, și dacă acea recunoaștere păstrează continuitatea sau marchează o ruptură.
Acolo începe recovery-ul care nu repară doar infrastructura, ci repară și adevărul normativ al rețelei.