<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-01" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="registries">DRIP Registries</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-01"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to RID. Only very limited information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital as the worry of collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates a lot of the risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registries, operators and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an attestation or certificate from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and all its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various <xref target="drip-requirements" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="definitions" numbered="true" toc="default">
        <name>Definitions</name>
        <t>See <xref target="drip-requirements" format="default"/> for common DRIP terms.</t>
        <dl newline="false" spacing="normal">
          <dt>HDA:</dt>
          <dd>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</dd>
          <dt>HID:</dt>
          <dd>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</dd>
          <dt>RAA:</dt>
          <dd>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</dd>
        </dl>
      </section>
    </section>
    <section anchor="registries" numbered="true" toc="default">
      <name>Registries</name>
      <section anchor="classes" numbered="true" toc="default">
        <name>Classes</name>
        <t>Under DRIP there 3 classes of registries, with specific variants in each.</t>
        <figure anchor="reg-class-fig">
          <name>Registry Hierarchy</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Root   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
        </figure>
        <!-- Author Note (atw): above figure should match docs/registry-diagram.png -->

<section anchor="root" numbered="true" toc="default">
          <name>Root</name>
          <t>This is a special registry holding the RAA value of 0 and HDA value of 0. It delegates out RAA values only to registries that wish to act as an RAA.</t>
          <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        <section anchor="raa" numbered="true" toc="default">
          <name>Registered Assigning Authorities</name>
          <t>RAA's are the upper hierarchy in DRIP. Most are contemplated to be Civil Aviation Authorities (CAAs) that then delegate HDAs to manage their NAS. This is does not preclude other entities to operate an RAA if the Root server allows it.</t>
          <t>All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
          <section anchor="irm" numbered="true" toc="default">
            <name>ICAO Registry of Manufacturer's (IRM)</name>
            <t>A special RAA that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in ANSI CTA2063-A Serial Numbers.</t>
            <t>It is holds the RAA value of 1 and HDA value of 0.</t>
            <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        </section>
        <section anchor="hda" numbered="true" toc="default">
          <name>Hierarchial HIT Domain Authorities</name>
          <section anchor="mra" numbered="true" toc="default">
            <name>Manufacturer's Registry of Aircraft (MRA)</name>
            <t>A registry (HDA) run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
            <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
            <t>Hold RAA value of 1 and HDA values of 1+.</t>
          </section>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>Registry that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent.</t>
            <!-- Author Note (atw): these are contemplated to be part of a USS as a function or a standalone SDSP in the UTM system -->

<t>Hold RAA values of 2+ and HDA values of 1+.</t>
          </section>
        </section>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the entity MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single entity to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
        <!-- Author Note (atw): does someone want to explore this option of federating across multiple DETs with same HID? -->

</section>
    </section>
    <section anchor="drip-fully-qualified-domain-names" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <t>Under DRIP there are a number of FQDN forms used to allow lookups to take place.</t>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the HHIT detail response. A secure connection (e.g., DNS over TLS) to the authoritative zone may be a viable alternative to DNSSEC.</t>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>Serial Number</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.F.8653.mfr.uas.icao.int
]]></artwork>
      </section>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DET</name>
        <t>The DET reverse lookup can be a standard IPv6 reverse look up, or it can leverage off the HHIT structure. If we assume a prefix of 2001:30::/28:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 20010030
FQDN: a3ad19520ad0a69e.5.20.10.20010030.det.uas.icao.int
]]></artwork>
        <t>When building a DET FQDN the following two things must be done:</t>
        <ol spacing="normal" type="1"><li>The RAA and HDA values MUST be converted from hexadecimal to decimal form</li>
          <li>The FQDN must be built using the expanded form of the IPv6 address</li>
        </ol>
        <t>The prefix is included in the FQDN form to support other potential prefixes being used.</t>
        <!-- Author Note (atw): we need a section detailing the potential prefixes to be seen and from whom and why we would want to support such a thing -->
<!-- Author Note (atw): need a section on different TLDs supported - uas.icao.int, remoteid.aero, rid.aero? -->

</section>
      <section anchor="reverse-det" numbered="true" toc="default">
        <name>Reverse DET</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
      </section>
    </section>
    <section anchor="supported-dns-records" numbered="true" toc="default">
      <name>Supported DNS Records</name>
      <t>DRIP requires a number of resource records, some specific to certain registries to function.</t>
      <section anchor="hip-rr" numbered="true" toc="default">
        <name>HIP RR</name>
        <t>All registries will have their own DET associated with them and their respective DNS server will hold a HIP RR that is pointed to by their DET FQDN.</t>
        <t>MRA and RIDR servers will also have HIP RRs for their registered parties (aircraft and operators).</t>
      </section>
      <section anchor="cert-rr" numbered="true" toc="default">
        <name>CERT RR</name>
        <t>Most attestations can be placed into DNS. An exception to this is the Attestation Certificate made during Session ID registration. This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
      </section>
      <section anchor="ns-rr" numbered="true" toc="default">
        <name>NS RR</name>
        <t>Along with their associated "glue" record (A/AAAA) supports the traversal in DNS across the tree.</t>
        <ol spacing="normal" type="1"><li>
            <tt>&lt;mfr.remoteid.aero&gt;</tt> on Root points to specific DET FQDN of IRM</li>
          <li>
            <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero</tt> on IRM points to specific DET FQDN of MRA</li>
          <li>
            <tt>&lt;raa_value&gt;.det.remoteid.aero</tt> on Root pointing to DET FQDN of matching RAA</li>
          <li>
            <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero</tt> on RAA pointing to DET FQDN of matching HDA</li>
        </ol>
      </section>
      <section anchor="aaaa-rr" numbered="true" toc="default">
        <name>AAAA RR</name>
        <t>DRIP requires the use of IPv6.</t>
      </section>
      <section anchor="svr-rr" numbered="true" toc="default">
        <name>SVR RR</name>
        <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
        <t>The best example of this is RIDR would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
        <t>In all cases the server being pointed to MUST be protected using AAA, specifically using RDAP.</t>
      </section>
      <section anchor="tlsa-rr" numbered="true" toc="default">
        <name>TLSA RR</name>
        <t>This RR is mainly used to support DTLS deployments where the DET is used in Network RID and the wider UTM system.</t>
        <!-- Author Note (atw): RFC6698 applies here, but how? Bob M. was the one originally mentioning this to me but context has been lost to time -->

</section>
    </section>
    <section anchor="registry-operations" numbered="true" toc="default">
      <name>Registry Operations</name>
      <t>As a general rule the following processing performed for any registration operation:</t>
      <ol spacing="normal" type="1"><li>Verify input Attestations from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate DNS with required/optional records</li>
        <li>Populate Database with PII and other info</li>
        <li>Generate and return required/optional Attestations/Certificates</li>
      </ol>
      <section anchor="registering-a-registry" numbered="true" toc="default">
        <name>Registering a Registry</name>
        <t>DRIP defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries" format="default"/>.</t>
        <!-- Author Note (atw): is the hhit-registries draft and reference needed anymore? -->

<t>Both the parent and child generate their own keypairs and self-signed attestations if not generated previously. The child sends to the parent its self-signed attestation to be added into the parent DNS.</t>
        <t>The parent confirms the attestation received is valid and that no DET collisions occur before adding a NS RR (and CERT RRs) to its DNS for the new child. An attestation, parent on child, is sent as a confirmation that provisioning was successful.</t>
        <t>The child is now a valid member of the registry tree and uses its keypair and Self-Attestation with all provisioning requests towards it. The HIP RR for the child is populated into the local DNS along with any CERT RRs.</t>
        <section anchor="registering-an-raa" numbered="true" toc="default">
          <name>Registering an RAA</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of RAA</td>
                <td align="left">Root: <tt>&lt;raa_value&gt;.det.remoteid.aero NS &lt;raa_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, RAA</td>
              </tr>
              <tr>
                <td align="left">RAA Self-Attestation</td>
                <td align="left">Root: <tt>&lt;raa_det_fqdn&gt; AAAA &lt;raa_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;raa_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-irm" numbered="true" toc="default">
          <name>Registering an IRM</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of IRM</td>
                <td align="left">Root: <tt>mfr.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, IRM</td>
              </tr>
              <tr>
                <td align="left">IRM Self-Attestation</td>
                <td align="left">Root: <tt>1.det.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">Root: <tt>&lt;irm_det_fqdn&gt; AAAA &lt;irm_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;irm_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-hda" numbered="true" toc="default">
          <name>Registering an HDA</name>
          <t>Specifically handled by an RAA (<xref target="raa" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of HDA</td>
                <td align="left">RAA: <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero NS &lt;hda_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: RAA, HDA</td>
              </tr>
              <tr>
                <td align="left">HDA Self-Attestation</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; AAAA &lt;hda_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;hda_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-mra" numbered="true" toc="default">
          <name>Registering an MRA</name>
          <t>Specifically handled by the IRM (<xref target="irm" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of MRA</td>
                <td align="left">IRM: <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: IRM, MRA</td>
              </tr>
              <tr>
                <td align="left">MRA Self-Attestation</td>
                <td align="left">IRM: <tt>&lt;hda_value&gt;.1.det.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">ICAO Manufacturer Code</td>
                <td align="left">IRM: <tt>&lt;mra_det_fqdn&gt; AAAA &lt;mra_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;mra_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="registering-a-serial-number" numbered="true" toc="default">
        <name>Registering a Serial Number</name>
        <t>Specifically handled by an MRA (<xref target="mra" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt>)</td>
              <td align="left">(Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">(UA Self-Attestation)</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;sn_self_attestation&gt;</tt>)</td>
              <td align="left">(Broadcast Attestation: MRA, UA</td>
            </tr>
            <tr>
              <td align="left">UA Metadata</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;attestation_mra_sn&gt;</tt>)</td>
              <td align="left">(Concise Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;concise_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;broadcast_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <!-- Author Note (atw): when registering a SN it could either be a DRIP encoded SN or it could be a non-DRIP SN. In the former case Attestations are both provided and generated during the registration process. The later case there will be no DRIP Attestations produced and most likely an X.509? Also there would be no RRs - so what do we point to to avoid NXDOMAINs; perhaps SVR/AAAA records? -->

<figure>
          <name>Manufacturer Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +--------------+    SA-a0a0 +-----------------+
    | Manufacturer | <--------> | Manufacturer CA |
    +--------------+ A-ma0      +-----------------+
        ^    |
        |    |
        |    |
SA-a0a0 |    |   A-ma0
        |    |
        |    v
    +----------+
    | Aircraft |
    +----------+
]]></artwork>
        </figure>
        <t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A Serial Number for UAS. Under DRIP a DET can be encoded as such to be able to convert back and forth between them. This is covered in <xref target="drip-rid" format="default"/>.</t>
        <t>Under DRIP the Manufacturer SHOULD be using DETs and have their own keypair and Self-Attestation: Manufacturer (SA-m). (Ed. Note: some words on aircraft keypair and certs here?).</t>
        <t>Self-Attestation: Aircraft 0 on Aircraft 0 (SA-a0a0) is extracted by the manufacturer and sent to their Certificate Authority (CA) to be verified and added. A resulting attestation (Attestation: Manufacturer on Aircraft 0 [A-ma0]) SHOULD be a DRIP Attestation - however this could be a X.509 certificate binding the serial number to the manufacturer.</t>
      </section>
      <section anchor="registering-an-operator" numbered="true" toc="default">
        <name>Registering an Operator</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <!-- Author Note (atw): this could also be handled by the RAA run by the CAA and act as a registration point for Operators in their NAS in general. Many CAAs, for example the FAA, already have separate systems deployed to handle this information. We could be asking a lot of the user (registering to another place and specifically for DRIP) and CAA to deploy this new database in an attempt to unify the system -->

<table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Operator Self-Attestation</td>
              <td align="left">
                <tt>&lt;op_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Operator PII</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;op_self_attestation&gt;</tt>)</td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;attestation_ridr_op&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;concise_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <figure>
          <name>Operator Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+  [HIP RR]  +---------+
    ^   |
    |   |
    |   |
Coo |   | Aro
    |   |
    |   v
+----------+
| Operator |
+----------+
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in DRIP UAS RID. A self-signed attestation (Self-Attestation: Operator on Operator [SA-oo]) is generated and sent to the desired registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the registry (all over a secure channel - the method of which is out of scope for this document).</t>
        <t>The registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The DET is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the DET/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>
        <t>With the receipt of Attestation: Registry on Operator (A-ro) the provisioning of an Operator is complete.</t>
      </section>
      <section anchor="sid-registration" numbered="true" toc="default">
        <name>Registering a Session ID</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attestation: RIDR, Operator</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Attestation: Operator, UA</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;session_self_attestation&gt;</tt></td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_session&gt;</tt></td>
              <td align="left">Attestation Certificate: RIDR, Operator, UA</td>
            </tr>
            <tr>
              <td align="left">(Concise Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">(Mutual Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;concise_attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Mutual Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Link Attestation: Operator, UA)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Concise Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Operational Intent)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Link Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: RAA, RIDR)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: Root, RAA)</td>
            </tr>
          </tbody>
        </table>
        <section anchor="standard-provisioning" numbered="true" toc="default">
          <name>Standard Provisioning</name>
          <t>Under standard provisioning the Aircraft has its own connectivity to the registry, the method which is out of scope for this document.</t>
          <figure>
            <name>Standard Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        A-a0aN          +----------+
]]></artwork>
          </figure>
          <t>Through mechanisms not specified in this document the Operator should have methods to instruct the Aircraft onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Self-Attestation: Aircraft 0 on Aircraft 0 [SA-a0a0]). This new attestation (Attestation: Aircraft 0 on Aircraft N [A-a0aN]) is securely extracted by the Operator.</t>
          <t>With A-a0aN the sub-attestation (Self-Attestation: Aircraft N on Aircraft N [SA-aNaN]) is used by the Operator to generate Attestation: Operator on Aircraft N (A-oaN). This along with Attestation: Registry on Operator (A-ro) is sent to the registry.</t>
          <figure>
            <name>Standard Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork>
          </figure>
          <t>On the registry, A-ro is verified and used as confirmation that the Operator is already registered. A-oaN also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>
          <t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 to Aircraft N (A-a0aN).</t>
          <figure>
            <name>Standard Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  AC-roaN               BA-raN  |    |  A-ma0, A-a0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork>
          </figure>
          <t>The registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new DET tied to Aircraft N is then checked for collisions in the HDA. With the information the registry generates two items: Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>
          <t>AC-roaN is sent via a secure channel back to the Operator to be stored. BA-raN is sent to the Aircraft to be used in Broadcast RID as specified in <xref target="drip-auth" format="default"/>.</t>
        </section>
        <section anchor="operator-assisted-provisioning" numbered="true" toc="default">
          <name>Operator Assisted Provisioning</name>
          <t>This provisioning scheme is for when the Aircraft is unable to connect to the registry itself or does not have the hardware required to generate keypairs and attestations.</t>
          <figure>
            <name>Operator Assisted Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+     aN, SA-aNaN        +----------+
]]></artwork>
          </figure>
          <t>To start the Operator generates on behalf of the Aircraft a new keypair and Attestation: Aircraft N on Aircraft N (SA-aNaN). This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N (A-a0aN). After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>
          <figure>
            <name>Operator Assisted Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-ma0, A-a0aN, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+      A-ma0, A-a0aN     +----------+
]]></artwork>
          </figure>
          <t>Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 on Aircraft N (A-a0aN) is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator (A-ro), Attestation: Manufacturer on Aircraft 0 (A-ma0), Attestation: Aircraft 0 on Aircraft N (A-a0aN), Attestation: Operator on Aircraft N (A-oaN).</t>
          <figure>
            <name>Operator Assisted Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  AC-roaN, BA-raN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        BA-raN          +----------+
]]></artwork>
          </figure>
          <t>On the registry validation checks are done on all attestations as per the previous sections. Once complete then the registry checks for a DET collision, adding to the HDA if clear and generates Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). Both are sent back to the Operator.</t>
          <t>The Operator securely inject BA-raN and securely stores AC-roaN of Aircraft N.</t>
        </section>
        <section anchor="initial-provisioning" numbered="true" toc="default">
          <name>Initial Provisioning</name>
          <t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>
          <!-- Author Note (atw): this action of registration is the same as an owner needed to use something like FAA DroneZone to register the SN of the aircraft to their CAA Assigned ID. So it doesn't make a whole lot of sense to do this at the HDA level (then it would need to be done for every HDA the user wants to fly under - potentially many). Is this a concern? -->

<t>For this either Standard or Operator Assisted methods can be used.</t>
        </section>
      </section>
    </section>
    <section anchor="epp-command-mappings" numbered="true" toc="default">
      <name>EPP Command Mappings</name>
      <section anchor="common-attributes" numbered="true" toc="default">
        <name>Common Attributes</name>
        <t>There are a number of common attributes between the various EPP commands under DRIP that has specific encoding rules.</t>
        <ul spacing="normal">
          <li>The <tt>hi</tt> attribute is a Base64 encoding of the Host Identity.</li>
          <li>The <tt>det</tt> attribute is a string from of the DET.</li>
        </ul>
      </section>
      <section anchor="epp-query-commands" numbered="true" toc="default">
        <name>EPP Query Commands</name>
        <section anchor="epp-query-check" numbered="true" toc="default">
          <name>EPP &lt;check&gt; Command</name>
          <section anchor="epp-check-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-check-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-check-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-check-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-info" numbered="true" toc="default">
          <name>EPP &lt;info&gt; Command</name>
          <section anchor="epp-info-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-info-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-info-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-info-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
      </section>
      <section anchor="epp-transform-commands" numbered="true" toc="default">
        <name>EPP Transform Commands</name>
        <!-- Author Note (atw): TODO: add DET/HI pairs to examples -->

<section anchor="epp-transform-create" numbered="true" toc="default">
          <name>EPP &lt;create&gt; Command</name>
          <section anchor="epp-create-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>The <tt>abbreviation</tt> field has a max of 6 characters, and is used by RID receivers to display a short decoded form for display of a received DET in the form of <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. If the abbreviation is unknown then the receiver SHOULD use the hexadecimal encoding of the respective RAA/HDA field of the HID as the value in the form. For example if the HDA is unknown and the HDA value is 20 then the decoded display would be: <tt>DE 14 FE23</tt>. Typically for RAAs the <tt>abbreviation</tt> is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA. Dashes or underscores should be used in place of spaces.</t>
            <!-- Author Note (atw): does the above text need to be moved to DET draft instead (and possible expanded)? -->

<t>The <tt>mfrCode</tt> field is only used by an MRA (<xref target="mra" format="default"/>) when registering with an IRM (<xref target="irm" format="default"/>) and holds the ICAO assigned Manufacturer Code for ANSI CTA2063-A Serial Numbers. It has a max of 4 characters.</t>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripRegistry:create xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
        <dripRegistry:hi></dripRegistry:hi>
        <dripRegistry:raa>10</dripRegistry:raa>
        <dripRegistry:hda>20</dripRegistry:hda>
        <dripRegistry:abbreviation>FAA</dripRegistry:abbreviation>
        <dripRegistry:mfrCode>MFR0</dripRegistry:mfrCode>
        <dripRegistry:postalInfo type="int">
          <dripRegistry:name>Federal Aviation Administration</dripRegistry:name>
          <dripRegistry:phys_addr>
            <dripRegistry:street1>Orville Wright Federal Building</dripRegistry:street1>
            <dripRegistry:street2>800 Independence Avenue SW</dripRegistry:street2>
            <dripRegistry:city>Washington</dripRegistry:city>
            <dripRegistry:sp>DC</dripRegistry:sp>
            <dripRegistry:pc>20591</dripRegistry:pc>
            <dripRegistry:cc>US</dripRegistry:cc>
          </dripRegistry:phys_addr>
        </dripRegistry:postalInfo>
        <dripRegistry:voice x="1234">1 (866) 835-5322</dripRegistry:voice>
        <dripRegistry:email>stephen.dickson@faa.gov</dripRegistry:email>
      </dripRegistry:create>
    </create>
    <clTRID>ADD-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripOperator:create xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:postalInfo type="int">
          <dripOperator:name>John Doe</dripOperator:name>
          <dripOperator:phys_addr>
            <dripOperator:street1>123 Example Dr.</dripOperator:street1>
            <dripOperator:street2>Suite 100</dripOperator:street2>
            <dripOperator:city>Dulles</dripOperator:city>
            <dripOperator:sp>VA</dripOperator:sp>
            <dripOperator:pc>20166-6503</dripOperator:pc>
            <dripOperator:cc>US</dripOperator:cc>
          </dripOperator:phys_addr>
          <dripOperator:ma_addr>
            <dripOperator:street1>123 Example Dr.</dripOperator:street1>
            <dripOperator:street2>Suite 100</dripOperator:street2>
            <dripOperator:city>Dulles</dripOperator:city>
            <dripOperator:sp>VA</dripOperator:sp>
            <dripOperator:pc>20166-6503</dripOperator:pc>
            <dripOperator:cc>US</dripOperator:cc>
          </dripOperator:ma_addr>
        </dripOperator:postalInfo>
        <dripOperator:voice x="1234">+1.7035555555</dripOperator:voice>
        <dripOperator:email>jdoe@example.com</dripOperator:email>
        <dripOperator:part107_acct_name>some_faa_account</dripOperator:part107_acct_name>
        <dripOperator:rec_flyer_id>123456</dripOperator:rec_flyer_id>
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
        <dripOperator:hi></dripOperator:hi>
      </dripOperator:create>
    </create>
    <clTRID>ADD-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-sn" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripSerial:create xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
        <dripSerial:det></dripSerial:det>
        <dripSerial:hi></dripSerial:hi>
        <dripSerial:manufacturer>Drones R Us</dripSerial:manufacturer>
        <dripSerial:make>Fast Drone</dripSerial:make>
        <dripSerial:model>9000</dripSerial:model>
        <dripSerial:color>White</dripSerial:color>
        <dripSerial:material>Plastic</dripSerial:material>
        <dripSerial:weight>12.0</dripSerial:weight>
        <dripSerial:length>5.0</dripSerial:length>
        <dripSerial:width>4.0</dripSerial:width>
        <dripSerial:height>3.0</dripSerial:height>
        <dripSerial:numRotors>4</dripSerial:numRotors>
        <dripSerial:propLength>2.0</dripSerial:propLength>
        <dripSerial:batteryCapacity>5000</dripSerial:batterCapacity>
        <dripSerial:batteryVoltage>12</dripSerial:batteryVoltage>
        <dripSerial:batteryWeight>5.2</dripSerial:batteryWeight>
        <dripSerial:batteryChemistry>Lithium-Ion</dripSerial:batteryChemistry>
        <dripSerial:takeOffWeight>15</dripSerial:takeOffWeight>
        <dripSerial:maxTakeOffWeight>25</dripSerial:maxTakeOffWeight>
        <dripSerial:maxPayloadWeight>10</dripSerial:maxPayloadWeight>
        <dripSerial:maxFlightTime>15</dripSerial:maxFlightTime>
        <dripSerial:minOperatingTemp>35</dripSerial:minOperatingTemp>
        <dripSerial:maxOperatingTemp>90</dripSerial:maxOperatingTemp>
        <dripSerial:ipRating>55</dripSerial:ipRating>
      </dripSerial:create>
    </create>
    <clTRID>ADD-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripSession:create xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:serial>0000F000000000000000</dripSession:serial>
        <dripSession:uasId></dripSession:uasId>
        <dripSession:sessionHi></dripSession:sessionHi>
        <dripSession:operationalIntent></dripSession:operationalIntent>
        <dripSession:operationalIntentSrc>uss.example.com</dripSession:operationalIntentSrc>
        <dripSession:operatorId>NOP123456</dripSession:operatorId>
        <dripSession:operatorDet></dripSession:operatorDet>
        <dripSession:fa3>N1232456</dripSession:fa3>
      </dripSession:create>
    </create>
    <clTRID>ADD-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-delete" numbered="true" toc="default">
          <name>EPP &lt;delete&gt; Command</name>
          <section anchor="epp-delete-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripRegistry:delete xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
      </dripRegistry:delete>
    </delete>
    <clTRID>DEL-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripOperator:delete xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
      </dripOperator:delete>
    </delete>
    <clTRID>DEL-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSerial:delete xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
      </dripSerial:delete>
    </delete>
    <clTRID>DEL-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSession:delete xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:uasId></dripSession:uasId>
      </dripSession:delete>
    </delete>
    <clTRID>DEL-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-renew" numbered="true" toc="default">
          <name>EPP &lt;renew&gt; Command</name>
          <t>Renewal semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;renew&gt; command.</t>
        </section>
        <section anchor="epp-transform-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
        <section anchor="epp-transform-update" numbered="true" toc="default">
          <name>EPP &lt;update&gt; Command</name>
          <section anchor="epp-update-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-update-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-update-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-update-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
      </section>
    </section>
    <section anchor="rdap-definitions" numbered="true" toc="default">
      <name>RDAP Definitions</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- Author Note (atw): need help here: EPP/RDAP adds to existing registries, CERT RR update, HIP RR update -->

</section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="det-generation" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <dl newline="false" spacing="normal">
          <dt>1</dt>
          <dd>
  The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Attestation) or denied.</dd>
          <dt>2</dt>
          <dd>
  The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</dd>
        </dl>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations" format="default"/>) and connectivity it is acceptable under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning" format="default"/>). The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
        <t>In either case the registry must decide on if the HI/DET pairing is valid. This in its simplest form is checking the current registry for a collision on the DET and HI.</t>
        <t>Upon accepting a HI/DET pair the registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The registry MUST also generate the appropriate attestations/certificates for the given operation.</t>
        <t>If the registry denied the HI/DET pair, because there was a DET collision or any other reason, the registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>Scott Hollenbeck for his guidance with EPP/RDAP</li>
        <li>Andrei Gurtov for his insights as a pilot</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="F3411-19">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="drip-requirements" target="https://www.ietf.org/archive/id/draft-ietf-drip-reqs-18.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="8" month="September" year="2021"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group.  These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications).  DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-reqs-18"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-20.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao">
              <organization>Tencent</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="28" month="January" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System Remote Identification and tracking
   (UAS RID), plus RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-20"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="hhit-registries" target="https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt">
          <front>
            <title>Hierarchical HIT Registries</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-hip-hhit-registries-02"/>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-04.txt">
          <front>
            <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="20" month="December" year="2021"/>
            <abstract>
              <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-04"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-attestations-certificates" numbered="true" toc="default">
      <name>DRIP Attestations &amp; Certificates</name>
      <t>See <xref target="drip-arch" format="default"/> for definitions of claim, assertion, attestation and certificate as used in this document.</t>
      <section anchor="attestation-structure" numbered="true" toc="default">
        <name>Attestation Structure</name>
        <t>All Attestations (<xref target="attestations" format="default"/>) and Certificates (<xref target="certificates" format="default"/>) under DRIP share the following format structure:</t>
        <figure anchor="att-struct">
          <name>Attestation Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                 Attestor Identity Information                 .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                       Attestation Data                        .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|               Expiration Timestamp by Attestor                |
+---------------+---------------+---------------+---------------+
|                 Signing Timestamp by Attestor                 |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                     Signature by Attestor                     |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Attestor Identity Information: (0, 16-bytes or 120-bytes)
    Field containing Attestor Identity Information in various forms.

Attestation Data:
    A field of variable length containing the attestation data.

Expiration Timestamp by Attestor (4 bytes):
    Timestamp denoting recommended time to trust data to.

Signing Timestamp by Attestor (4 bytes):
    Current time at signing.

Attestor Signature (64 bytes):
    Signature over preceding fields using the keypair of 
    the Attestor.
]]></artwork>
        </figure>
        <section anchor="attestor-identity-information" numbered="true" toc="default">
          <name>Attestor Identity Information</name>
          <t>This can be either of the following:</t>
          <ol spacing="normal" type="1"><li>Attestor DET: 16-bytes</li>
            <li>Attestor Self-Attestation: 120-bytes</li>
          </ol>
          <t>A specific definition of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) defines which of these are used.</t>
        </section>
        <section anchor="attestation-data" numbered="true" toc="default">
          <name>Attestation Data</name>
          <t>The data being attested to. It can be one of the following forms:</t>
          <ol spacing="normal" type="1"><li>Claims</li>
            <li>Assertions</li>
            <li>Attestations</li>
          </ol>
          <t>This field is variable length with no limit and specific definitions of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) indicate the fields, size and ordering of any subfields.</t>
        </section>
        <section anchor="expiration-timestamp" numbered="true" toc="default">
          <name>Expiration Timestamp</name>
          <t>A UTC timestamp set some time into the future to indicate a point the Attestation Structure should not be trusted.</t>
          <!-- Author Note (atw): we need to highlight here how important the delta needs to be, but not over constrain -->

<t>The time delta into the future is of important concern as replay attacks on during flight could compromise the goals of DRIP. Attestations and certificates intended for public use and lower in the tree (importantly any generated for a Session ID (<xref target="sid-registration" format="default"/>)).</t>
          <t>For this reason deltas SHOULD be kept as short as possible for the given use-case to avoid issues with replays.</t>
        </section>
        <section anchor="signing-timestamp" numbered="true" toc="default">
          <name>Signing Timestamp</name>
          <t>A UTC timestamp set to the time when the Attestation Structure was signed.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>An EdDSA25519 signature using the signing parties private key over the preceding fields in the Attestation Structure.</t>
          <ul empty="true" spacing="normal">
            <li>
              <ul empty="true" spacing="normal">
                <li>Note: the preceding fields of the Attestation Structure actually form an Assertion, with all fields acting as Claims</li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="attestations" numbered="true" toc="default">
        <name>Attestations</name>
        <section anchor="self-attestation" numbered="true" toc="default">
          <name>Self-Attestation (SA-x)</name>
          <t>The only attestation to use a claim (the Host Identity) in the <tt>Attestation Data</tt> with the DET acting as the <tt>Attestor Identity Information</tt>.</t>
          <figure anchor="axx-fig">
            <name>DRIP Self-Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                         Trust Timestamp                       |
+---------------+---------------+---------------+---------------+
|                        Signing Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 120-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="attestation" numbered="true" toc="default">
          <name>Attestation (A-x.y)</name>
          <t>The standard first level DRIP Attestation form using a Self-Attestations of the signer and of the data being signed.</t>
          <figure anchor="axy-fig">
            <name>DRIP Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-xx                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-yy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 312-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-attestation" numbered="true" toc="default">
          <name>Concise Attestation (CA-x.y)</name>
          <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this attestation can be used.</t>
          <figure anchor="c-axy-fig">
            <name>DRIP Concise Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 104-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-attestation" numbered="true" toc="default">
          <name>Mutual Attestation (MA-x.y)</name>
          <t>An attestation that perform a sign over an existing Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="m-axy-fig">
            <name>DRIP Mutual Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 400-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-attestation" numbered="true" toc="default">
          <name>Link Attestation (LA-x.y)</name>
          <t>An attestations that perform a sign over an existing Concise Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="l-axy-fig">
            <name>DRIP Link Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="broadcast-attestation" numbered="true" toc="default">
          <name>Broadcast Attestation (BA-x.y)</name>
          <t>Required by DRIP Authentication Formats for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="drip-requirements" format="default"/> GEN-1 and GEN-3.</t>
          <figure anchor="b-axy-fig">
            <name>DRIP Broadcast Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 136-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificates" numbered="true" toc="default">
        <name>Certificates</name>
        <t>In DRIP certificates are signed by a third party that has no stake in the claims/assertions/attestations being attested to.</t>
        <t>It is analogous to a third party in legal system that signs a document as a "witness" and bears no responsibility in the document.</t>
        <section anchor="attestation-certificate" numbered="true" toc="default">
          <name>Attestation Certificate (AC-z.x.y)</name>
          <figure anchor="a-cxy-fig">
            <name>DRIP Attestation Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 504-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-certificate" numbered="true" toc="default">
          <name>Concise Certificate (CC-z.x.y)</name>
          <figure anchor="c-cxy-fig">
            <name>DRIP Concise Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-certificate" numbered="true" toc="default">
          <name>Link Certificate (LC-z.x.y)</name>
          <figure anchor="l-cxy-fig">
            <name>DRIP Link Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             LA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 300-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-certificate" numbered="true" toc="default">
          <name>Mutual Certificate (MC-z.x.y)</name>
          <figure anchor="m-cxy-fig">
            <name>DRIP Mutual Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             MA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 576-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of attestation and certificates can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular attestation/certification can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Attestation: Unmanned Aircraft</tt></li>
            <li>
              <tt>Attestation: Operator on Aircraft</tt> or <tt>Attestation: Operator, Aircraft</tt></li>
            <li>
              <tt>Attestation Certificate: Registry on Operator on Aircraft</tt> or <tt>Attestation Certificate: Registry, Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SA(Unmanned Aircraft)</tt> or <tt>SA-ua</tt></li>
            <li>
              <tt>A(Operator, Unmanned Aircraft)</tt> or <tt>A-op.ua</tt></li>
            <li>
              <tt>AC(Registry, Operator, Aircraft)</tt> or <tt>AC-reg.op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various certificates a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-{hash of entity}</tt></li>
            <li>
              <tt>a-{hash of entity x}_{hash of entity y}</tt></li>
            <li>
              <tt>ac-{hash of entity z}_{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>a-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ac-aac6b00abba268b7_120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <!-- Author Note (atw): to be provided by Bob M.-->

</section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
