<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-02" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="registries">DRIP Entity Tag Registration &amp; Lookup</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-02"/>
    <author initials="A." surname="Wiethuechter (Editor)" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="April" day="30"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to RID. Only very limited information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital as the worry of collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates a lot of the risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an attestation or certificate from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various <xref target="drip-requirements" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="definitions" numbered="true" toc="default">
        <name>Definitions</name>
        <t>See <xref target="drip-requirements" format="default"/> for common DRIP terms.</t>
        <dl newline="false" spacing="normal">
          <dt>HDA:</dt>
          <dd>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</dd>
          <dt>HID:</dt>
          <dd>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</dd>
          <dt>RAA:</dt>
          <dd>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</dd>
        </dl>
      </section>
    </section>
    <section anchor="registries" numbered="true" toc="default">
      <name>Registries</name>
      <section anchor="classes" numbered="true" toc="default">
        <name>Classes</name>
        <t>Under DRIP there 3 classes of registries, with specific variants in each.</t>
        <figure anchor="reg-class-fig">
          <name>Registry Hierarchy</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Root   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
        </figure>
        <!-- Author Note (atw): above figure should match docs/registry-diagram.png -->

<section anchor="root" numbered="true" toc="default">
          <name>Root</name>
          <t>This is a special registry holding the RAA value of 0 and HDA value of 0. It delegates out RAA values only to registries that wish to act as an RAA.</t>
          <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        <section anchor="raa" numbered="true" toc="default">
          <name>Registered Assigning Authorities</name>
          <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of a DET). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their NAS. This is does not preclude other entities to operate an RAA if the Root server allows it.</t>
          <t>The ICAO registration process will be available from ICAO. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>uas.icao.int.</tt> DNS zone for the RAA.</t>
          <t>As HHITs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
          <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
          <section anchor="irm" numbered="true" toc="default">
            <name>ICAO Registry of Manufacturer's (IRM)</name>
            <t>A special RAA that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in ANSI CTA2063-A Serial Numbers.</t>
            <t>It is holds the RAA value of 1 and HDA value of 0.</t>
            <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        </section>
        <section anchor="hda" numbered="true" toc="default">
          <name>Hierarchial HIT Domain Authorities</name>
          <t>An HDA may be an ISP or any third party that takes on the business to provide RVS and other needed services such as those required for HIP-enabled devices.</t>
          <t>The HDA is an 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA. An HDA should maintain a set of RVS servers for UAS clients that may use HIP. How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
          <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
          <section anchor="mra" numbered="true" toc="default">
            <name>Manufacturer's Registry of Aircraft (MRA)</name>
            <t>A registry (HDA) run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
            <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
            <t>Hold RAA value of 1 and HDA values of 1+.</t>
          </section>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>Registry that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent.</t>
            <!-- Author Note (atw): these are contemplated to be part of a USS as a function or a standalone SDSP in the UTM system -->

<t>Hold RAA values of 2+ and HDA values of 1+.</t>
          </section>
        </section>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the entity MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single entity to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
        <!-- Author Note (atw): does someone want to explore this option of federating across multiple DETs with same HID? -->

</section>
    </section>
    <section anchor="drip-fully-qualified-domain-names" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <t>Under DRIP there are a number of FQDN forms used to allow lookups to take place.</t>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the HHIT detail response. A secure connection (e.g., DNS over TLS) to the authoritative zone may be a viable alternative to DNSSEC.</t>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>Serial Number</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.F.8653.mfr.uas.icao.int
]]></artwork>
      </section>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DET</name>
        <t>The DET reverse lookup can be a standard IPv6 reverse look up, or it can leverage off the HHIT structure. If we assume a prefix of 2001:30::/28:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 20010030
FQDN: a3ad19520ad0a69e.5.20.10.20010030.det.uas.icao.int
]]></artwork>
        <t>When building a DET FQDN the following two things must be done:</t>
        <ol spacing="normal" type="1"><li>The RAA and HDA values MUST be converted from hexadecimal to decimal form</li>
          <li>The FQDN must be built using the expanded form of the IPv6 address</li>
        </ol>
        <t>The prefix is included in the FQDN form to support other potential prefixes being used.</t>
        <!-- Author Note (atw): we need a section detailing the potential prefixes to be seen and from whom and why we would want to support such a thing -->
<!-- Author Note (atw): need a section on different TLDs supported - uas.icao.int, remoteid.aero, rid.aero? -->

</section>
      <section anchor="reverse-det" numbered="true" toc="default">
        <name>Reverse DET</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
      </section>
    </section>
    <section anchor="supported-dns-records" numbered="true" toc="default">
      <name>Supported DNS Records</name>
      <t>DRIP requires a number of resource records, some specific to certain registries to function.</t>
      <section anchor="hip-rr" numbered="true" toc="default">
        <name>HIP RR</name>
        <t>All registries will have their own DET associated with them and their respective DNS server will hold a HIP RR that is pointed to by their DET FQDN.</t>
        <t>MRA and RIDR servers will also have HIP RRs for their registered parties (aircraft and operators).</t>
      </section>
      <section anchor="cert-rr" numbered="true" toc="default">
        <name>CERT RR</name>
        <t>Most attestations can be placed into DNS. An exception to this is the Attestation Certificate made during Session ID registration. This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
      </section>
      <section anchor="ns-rr" numbered="true" toc="default">
        <name>NS RR</name>
        <t>Along with their associated "glue" record (A/AAAA) supports the traversal in DNS across the tree.</t>
        <ol spacing="normal" type="1"><li>
            <tt>&lt;mfr.remoteid.aero&gt;</tt> on Root points to specific DET FQDN of IRM</li>
          <li>
            <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero</tt> on IRM points to specific DET FQDN of MRA</li>
          <li>
            <tt>&lt;raa_value&gt;.det.remoteid.aero</tt> on Root pointing to DET FQDN of matching RAA</li>
          <li>
            <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero</tt> on RAA pointing to DET FQDN of matching HDA</li>
        </ol>
      </section>
      <section anchor="aaaa-rr" numbered="true" toc="default">
        <name>AAAA RR</name>
        <t>DRIP requires the use of IPv6.</t>
      </section>
      <section anchor="svr-rr" numbered="true" toc="default">
        <name>SVR RR</name>
        <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
        <t>The best example of this is RIDR would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
        <t>In all cases the server being pointed to MUST be protected using AAA, specifically using RDAP.</t>
      </section>
      <section anchor="tlsa-rr" numbered="true" toc="default">
        <name>TLSA RR</name>
        <t>This RR is mainly used to support DTLS deployments where the DET is used in Network RID and the wider UTM system.</t>
        <!-- Author Note (atw): RFC6698 applies here, but how? Bob M. was the one originally mentioning this to me but context has been lost to time -->

</section>
    </section>
    <section anchor="registry-operations" numbered="true" toc="default">
      <name>Registry Operations</name>
      <t>As a general rule the following processing performed for any registration operation:</t>
      <ol spacing="normal" type="1"><li>Verify input Attestations from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate DNS with required/optional records</li>
        <li>Populate Database with PII and other info</li>
        <li>Generate and return required/optional Attestations/Certificates</li>
      </ol>
      <section anchor="registering-a-registry" numbered="true" toc="default">
        <name>Registering a Registry</name>
        <t>DRIP defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries" format="default"/>.</t>
        <!-- Author Note (atw): is the hhit-registries draft and reference needed anymore? -->

<t>Both the parent and child generate their own keypairs and self-signed attestations if not generated previously. The child sends to the parent its self-signed attestation to be added into the parent DNS.</t>
        <t>The parent confirms the attestation received is valid and that no DET collisions occur before adding a NS RR (and CERT RRs) to its DNS for the new child. An attestation, parent on child, is sent as a confirmation that provisioning was successful.</t>
        <t>The child is now a valid member of the registry tree and uses its keypair and Self-Attestation with all provisioning requests towards it. The HIP RR for the child is populated into the local DNS along with any CERT RRs.</t>
        <section anchor="registering-an-raa" numbered="true" toc="default">
          <name>Registering an RAA</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of RAA</td>
                <td align="left">Root: <tt>&lt;raa_value&gt;.det.remoteid.aero NS &lt;raa_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, RAA</td>
              </tr>
              <tr>
                <td align="left">RAA Self-Attestation</td>
                <td align="left">Root: <tt>&lt;raa_det_fqdn&gt; AAAA &lt;raa_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;raa_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-irm" numbered="true" toc="default">
          <name>Registering an IRM</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of IRM</td>
                <td align="left">Root: <tt>mfr.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, IRM</td>
              </tr>
              <tr>
                <td align="left">IRM Self-Attestation</td>
                <td align="left">Root: <tt>1.det.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">Root: <tt>&lt;irm_det_fqdn&gt; AAAA &lt;irm_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;irm_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-hda" numbered="true" toc="default">
          <name>Registering an HDA</name>
          <t>Specifically handled by an RAA (<xref target="raa" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of HDA</td>
                <td align="left">RAA: <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero NS &lt;hda_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: RAA, HDA</td>
              </tr>
              <tr>
                <td align="left">HDA Self-Attestation</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; AAAA &lt;hda_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;hda_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-mra" numbered="true" toc="default">
          <name>Registering an MRA</name>
          <t>Specifically handled by the IRM (<xref target="irm" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of MRA</td>
                <td align="left">IRM: <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: IRM, MRA</td>
              </tr>
              <tr>
                <td align="left">MRA Self-Attestation</td>
                <td align="left">IRM: <tt>&lt;hda_value&gt;.1.det.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">ICAO Manufacturer Code</td>
                <td align="left">IRM: <tt>&lt;mra_det_fqdn&gt; AAAA &lt;mra_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;mra_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="registering-a-serial-number" numbered="true" toc="default">
        <name>Registering a Serial Number</name>
        <t>Specifically handled by an MRA (<xref target="mra" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt>)</td>
              <td align="left">(Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">(UA Self-Attestation)</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;sn_self_attestation&gt;</tt>)</td>
              <td align="left">(Broadcast Attestation: MRA, UA</td>
            </tr>
            <tr>
              <td align="left">UA Metadata</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;attestation_mra_sn&gt;</tt>)</td>
              <td align="left">(Concise Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;concise_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;broadcast_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <!-- Author Note (atw): when registering a SN it could either be a DRIP encoded SN or it could be a non-DRIP SN. In the former case Attestations are both provided and generated during the registration process. The later case there will be no DRIP Attestations produced and most likely an X.509? Also there would be no RRs - so what do we point to to avoid NXDOMAINs; perhaps SVR/AAAA records? -->

<figure>
          <name>Manufacturer Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +--------------+    SA-a0a0 +-----------------+
    | Manufacturer | <--------> | Manufacturer CA |
    +--------------+ A-ma0      +-----------------+
        ^    |
        |    |
        |    |
SA-a0a0 |    |   A-ma0
        |    |
        |    v
    +----------+
    | Aircraft |
    +----------+
]]></artwork>
        </figure>
        <t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A Serial Number for UAS. Under DRIP a DET can be encoded as such to be able to convert back and forth between them. This is covered in <xref target="drip-rid" format="default"/>.</t>
        <t>Under DRIP the Manufacturer SHOULD be using DETs and have their own keypair and Self-Attestation: Manufacturer (SA-m). (Ed. Note: some words on aircraft keypair and certs here?).</t>
        <t>Self-Attestation: Aircraft 0 on Aircraft 0 (SA-a0a0) is extracted by the manufacturer and sent to their Certificate Authority (CA) to be verified and added. A resulting attestation (Attestation: Manufacturer on Aircraft 0 [A-ma0]) SHOULD be a DRIP Attestation - however this could be a X.509 certificate binding the serial number to the manufacturer.</t>
      </section>
      <section anchor="registering-an-operator" numbered="true" toc="default">
        <name>Registering an Operator</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <!-- Author Note (atw): this could also be handled by the RAA run by the CAA and act as a registration point for Operators in their NAS in general. Many CAAs, for example the FAA, already have separate systems deployed to handle this information. We could be asking a lot of the user (registering to another place and specifically for DRIP) and CAA to deploy this new database in an attempt to unify the system -->

<table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Operator Self-Attestation</td>
              <td align="left">
                <tt>&lt;op_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Operator PII</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;op_self_attestation&gt;</tt>)</td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;attestation_ridr_op&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;concise_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <figure>
          <name>Operator Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+  [HIP RR]  +---------+
    ^   |
    |   |
    |   |
Coo |   | Aro
    |   |
    |   v
+----------+
| Operator |
+----------+
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in DRIP UAS RID. A self-signed attestation (Self-Attestation: Operator on Operator [SA-oo]) is generated and sent to the desired registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the registry (all over a secure channel - the method of which is out of scope for this document).</t>
        <t>The registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The DET is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the DET/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>
        <t>With the receipt of Attestation: Registry on Operator (A-ro) the provisioning of an Operator is complete.</t>
      </section>
      <section anchor="sid-registration" numbered="true" toc="default">
        <name>Registering a Session ID</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attestation: RIDR, Operator</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Attestation: Operator, UA</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;session_self_attestation&gt;</tt></td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_session&gt;</tt></td>
              <td align="left">Attestation Certificate: RIDR, Operator, UA</td>
            </tr>
            <tr>
              <td align="left">(Concise Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">(Mutual Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;concise_attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Mutual Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Link Attestation: Operator, UA)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Concise Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Operational Intent)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Link Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: RAA, RIDR)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: Root, RAA)</td>
            </tr>
          </tbody>
        </table>
        <section anchor="standard-provisioning" numbered="true" toc="default">
          <name>Standard Provisioning</name>
          <t>Under standard provisioning the Aircraft has its own connectivity to the registry, the method which is out of scope for this document.</t>
          <figure>
            <name>Standard Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        A-a0aN          +----------+
]]></artwork>
          </figure>
          <t>Through mechanisms not specified in this document the Operator should have methods to instruct the Aircraft onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Self-Attestation: Aircraft 0 on Aircraft 0 [SA-a0a0]). This new attestation (Attestation: Aircraft 0 on Aircraft N [A-a0aN]) is securely extracted by the Operator.</t>
          <t>With A-a0aN the sub-attestation (Self-Attestation: Aircraft N on Aircraft N [SA-aNaN]) is used by the Operator to generate Attestation: Operator on Aircraft N (A-oaN). This along with Attestation: Registry on Operator (A-ro) is sent to the registry.</t>
          <figure>
            <name>Standard Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork>
          </figure>
          <t>On the registry, A-ro is verified and used as confirmation that the Operator is already registered. A-oaN also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>
          <t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 to Aircraft N (A-a0aN).</t>
          <figure>
            <name>Standard Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  AC-roaN               BA-raN  |    |  A-ma0, A-a0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork>
          </figure>
          <t>The registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new DET tied to Aircraft N is then checked for collisions in the HDA. With the information the registry generates two items: Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>
          <t>AC-roaN is sent via a secure channel back to the Operator to be stored. BA-raN is sent to the Aircraft to be used in Broadcast RID as specified in <xref target="drip-auth" format="default"/>.</t>
        </section>
        <section anchor="operator-assisted-provisioning" numbered="true" toc="default">
          <name>Operator Assisted Provisioning</name>
          <t>This provisioning scheme is for when the Aircraft is unable to connect to the registry itself or does not have the hardware required to generate keypairs and attestations.</t>
          <figure>
            <name>Operator Assisted Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+     aN, SA-aNaN        +----------+
]]></artwork>
          </figure>
          <t>To start the Operator generates on behalf of the Aircraft a new keypair and Attestation: Aircraft N on Aircraft N (SA-aNaN). This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N (A-a0aN). After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>
          <figure>
            <name>Operator Assisted Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-ma0, A-a0aN, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+      A-ma0, A-a0aN     +----------+
]]></artwork>
          </figure>
          <t>Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 on Aircraft N (A-a0aN) is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator (A-ro), Attestation: Manufacturer on Aircraft 0 (A-ma0), Attestation: Aircraft 0 on Aircraft N (A-a0aN), Attestation: Operator on Aircraft N (A-oaN).</t>
          <figure>
            <name>Operator Assisted Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  AC-roaN, BA-raN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        BA-raN          +----------+
]]></artwork>
          </figure>
          <t>On the registry validation checks are done on all attestations as per the previous sections. Once complete then the registry checks for a DET collision, adding to the HDA if clear and generates Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). Both are sent back to the Operator.</t>
          <t>The Operator securely inject BA-raN and securely stores AC-roaN of Aircraft N.</t>
        </section>
        <section anchor="initial-provisioning" numbered="true" toc="default">
          <name>Initial Provisioning</name>
          <t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>
          <!-- Author Note (atw): this action of registration is the same as an owner needed to use something like FAA DroneZone to register the SN of the aircraft to their CAA Assigned ID. So it doesn't make a whole lot of sense to do this at the HDA level (then it would need to be done for every HDA the user wants to fly under - potentially many). Is this a concern? -->

<t>For this either Standard or Operator Assisted methods can be used.</t>
        </section>
      </section>
    </section>
    <section anchor="epp-command-mappings" numbered="true" toc="default">
      <name>EPP Command Mappings</name>
      <section anchor="common-attributes" numbered="true" toc="default">
        <name>Common Attributes</name>
        <t>There are a number of common attributes between the various EPP commands under DRIP that has specific encoding rules.</t>
        <ul spacing="normal">
          <li>The <tt>hi</tt> attribute is a Base64 encoding of the Host Identity.</li>
          <li>The <tt>det</tt> attribute is a string from of the DET.</li>
        </ul>
      </section>
      <section anchor="epp-query-commands" numbered="true" toc="default">
        <name>EPP Query Commands</name>
        <section anchor="epp-query-check" numbered="true" toc="default">
          <name>EPP &lt;check&gt; Command</name>
          <section anchor="epp-check-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-check-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-check-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-check-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-info" numbered="true" toc="default">
          <name>EPP &lt;info&gt; Command</name>
          <section anchor="epp-info-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-info-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-info-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-info-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
      </section>
      <section anchor="epp-transform-commands" numbered="true" toc="default">
        <name>EPP Transform Commands</name>
        <!-- Author Note (atw): TODO: add DET/HI pairs to examples -->

<section anchor="epp-transform-create" numbered="true" toc="default">
          <name>EPP &lt;create&gt; Command</name>
          <section anchor="epp-create-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>The <tt>abbreviation</tt> field has a max of 6 characters, and is used by RID receivers to display a short decoded form for display of a received DET in the form of <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. If the abbreviation is unknown then the receiver SHOULD use the hexadecimal encoding of the respective RAA/HDA field of the HID as the value in the form. For example if the HDA is unknown and the HDA value is 20 then the decoded display would be: <tt>DE 14 FE23</tt>. Typically for RAAs the <tt>abbreviation</tt> is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA. Dashes or underscores should be used in place of spaces.</t>
            <!-- Author Note (atw): does the above text need to be moved to DET draft instead (and possible expanded)? -->

<t>The <tt>mfrCode</tt> field is only used by an MRA (<xref target="mra" format="default"/>) when registering with an IRM (<xref target="irm" format="default"/>) and holds the ICAO assigned Manufacturer Code for ANSI CTA2063-A Serial Numbers. It has a max of 4 characters.</t>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripRegistry:create xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
        <dripRegistry:hi></dripRegistry:hi>
        <dripRegistry:raa>10</dripRegistry:raa>
        <dripRegistry:hda>20</dripRegistry:hda>
        <dripRegistry:abbreviation>FAA</dripRegistry:abbreviation>
        <dripRegistry:mfrCode>MFR0</dripRegistry:mfrCode>
        <dripRegistry:postalInfo type="int">
          <dripRegistry:name>Federal Aviation Administration</dripRegistry:name>
          <dripRegistry:phys_addr>
            <dripRegistry:street1>Orville Wright Federal Building</dripRegistry:street1>
            <dripRegistry:street2>800 Independence Avenue SW</dripRegistry:street2>
            <dripRegistry:city>Washington</dripRegistry:city>
            <dripRegistry:sp>DC</dripRegistry:sp>
            <dripRegistry:pc>20591</dripRegistry:pc>
            <dripRegistry:cc>US</dripRegistry:cc>
          </dripRegistry:phys_addr>
        </dripRegistry:postalInfo>
        <dripRegistry:voice x="1234">1 (866) 835-5322</dripRegistry:voice>
        <dripRegistry:email>stephen.dickson@faa.gov</dripRegistry:email>
      </dripRegistry:create>
    </create>
    <clTRID>ADD-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripOperator:create xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:postalInfo type="int">
          <dripOperator:name>John Doe</dripOperator:name>
          <dripOperator:phys_addr>
            <dripOperator:street1>123 Example Dr.</dripOperator:street1>
            <dripOperator:street2>Suite 100</dripOperator:street2>
            <dripOperator:city>Dulles</dripOperator:city>
            <dripOperator:sp>VA</dripOperator:sp>
            <dripOperator:pc>20166-6503</dripOperator:pc>
            <dripOperator:cc>US</dripOperator:cc>
          </dripOperator:phys_addr>
          <dripOperator:ma_addr>
            <dripOperator:street1>123 Example Dr.</dripOperator:street1>
            <dripOperator:street2>Suite 100</dripOperator:street2>
            <dripOperator:city>Dulles</dripOperator:city>
            <dripOperator:sp>VA</dripOperator:sp>
            <dripOperator:pc>20166-6503</dripOperator:pc>
            <dripOperator:cc>US</dripOperator:cc>
          </dripOperator:ma_addr>
        </dripOperator:postalInfo>
        <dripOperator:voice x="1234">+1.7035555555</dripOperator:voice>
        <dripOperator:email>jdoe@example.com</dripOperator:email>
        <dripOperator:part107_acct_name>some_faa_account</dripOperator:part107_acct_name>
        <dripOperator:rec_flyer_id>123456</dripOperator:rec_flyer_id>
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
        <dripOperator:hi></dripOperator:hi>
      </dripOperator:create>
    </create>
    <clTRID>ADD-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-sn" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripSerial:create xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
        <dripSerial:det></dripSerial:det>
        <dripSerial:hi></dripSerial:hi>
        <dripSerial:manufacturer>Drones R Us</dripSerial:manufacturer>
        <dripSerial:make>Fast Drone</dripSerial:make>
        <dripSerial:model>9000</dripSerial:model>
        <dripSerial:color>White</dripSerial:color>
        <dripSerial:material>Plastic</dripSerial:material>
        <dripSerial:weight>12.0</dripSerial:weight>
        <dripSerial:length>5.0</dripSerial:length>
        <dripSerial:width>4.0</dripSerial:width>
        <dripSerial:height>3.0</dripSerial:height>
        <dripSerial:numRotors>4</dripSerial:numRotors>
        <dripSerial:propLength>2.0</dripSerial:propLength>
        <dripSerial:batteryCapacity>5000</dripSerial:batterCapacity>
        <dripSerial:batteryVoltage>12</dripSerial:batteryVoltage>
        <dripSerial:batteryWeight>5.2</dripSerial:batteryWeight>
        <dripSerial:batteryChemistry>Lithium-Ion</dripSerial:batteryChemistry>
        <dripSerial:takeOffWeight>15</dripSerial:takeOffWeight>
        <dripSerial:maxTakeOffWeight>25</dripSerial:maxTakeOffWeight>
        <dripSerial:maxPayloadWeight>10</dripSerial:maxPayloadWeight>
        <dripSerial:maxFlightTime>15</dripSerial:maxFlightTime>
        <dripSerial:minOperatingTemp>35</dripSerial:minOperatingTemp>
        <dripSerial:maxOperatingTemp>90</dripSerial:maxOperatingTemp>
        <dripSerial:ipRating>55</dripSerial:ipRating>
      </dripSerial:create>
    </create>
    <clTRID>ADD-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-create-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <create>
      <dripSession:create xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:serial>0000F000000000000000</dripSession:serial>
        <dripSession:uasId></dripSession:uasId>
        <dripSession:sessionHi></dripSession:sessionHi>
        <dripSession:operationalIntent></dripSession:operationalIntent>
        <dripSession:operationalIntentSrc>uss.example.com</dripSession:operationalIntentSrc>
        <dripSession:operatorId>NOP123456</dripSession:operatorId>
        <dripSession:operatorDet></dripSession:operatorDet>
        <dripSession:fa3>N1232456</dripSession:fa3>
      </dripSession:create>
    </create>
    <clTRID>ADD-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-delete" numbered="true" toc="default">
          <name>EPP &lt;delete&gt; Command</name>
          <section anchor="epp-delete-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripRegistry:delete xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
      </dripRegistry:delete>
    </delete>
    <clTRID>DEL-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripOperator:delete xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
      </dripOperator:delete>
    </delete>
    <clTRID>DEL-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSerial:delete xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
      </dripSerial:delete>
    </delete>
    <clTRID>DEL-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSession:delete xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:uasId></dripSession:uasId>
      </dripSession:delete>
    </delete>
    <clTRID>DEL-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-renew" numbered="true" toc="default">
          <name>EPP &lt;renew&gt; Command</name>
          <t>Renewal semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;renew&gt; command.</t>
        </section>
        <section anchor="epp-transform-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
        <section anchor="epp-transform-update" numbered="true" toc="default">
          <name>EPP &lt;update&gt; Command</name>
          <section anchor="epp-update-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-update-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-update-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-update-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
      </section>
    </section>
    <section anchor="rdap-definitions" numbered="true" toc="default">
      <name>RDAP Definitions</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- Author Note (atw): need help here: EPP/RDAP adds to existing registries, CERT RR update, HIP RR update -->

</section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="det-generation" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <dl newline="false" spacing="normal">
          <dt>1</dt>
          <dd>
  The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Attestation) or denied.</dd>
          <dt>2</dt>
          <dd>
  The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</dd>
        </dl>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations" format="default"/>) and connectivity it is acceptable under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning" format="default"/>). The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
        <t>In either case the registry must decide on if the HI/DET pairing is valid. This in its simplest form is checking the current registry for a collision on the DET and HI.</t>
        <t>Upon accepting a HI/DET pair the registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The registry MUST also generate the appropriate attestations/certificates for the given operation.</t>
        <t>If the registry denied the HI/DET pair, because there was a DET collision or any other reason, the registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>
      </section>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>Scott Hollenbeck for his guidance with EPP/RDAP</li>
      </ul>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>Andrei Gurtov for his insights as a pilot</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="F3411-19">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="drip-requirements" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao">
              <organization>Tencent</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-22"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="hhit-registries" target="https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt">
          <front>
            <title>Hierarchical HIT Registries</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-hip-hhit-registries-02"/>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-09.txt">
          <front>
            <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="30" month="April" year="2022"/>
            <abstract>
              <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-09"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-attestations-certificates" numbered="true" toc="default">
      <name>DRIP Attestations &amp; Certificates</name>
      <t>See <xref target="drip-arch" format="default"/> for definitions of claim, assertion, attestation and certificate as used in this document.</t>
      <section anchor="attestation-structure" numbered="true" toc="default">
        <name>Attestation Structure</name>
        <t>All Attestations (<xref target="attestations" format="default"/>) and Certificates (<xref target="certificates" format="default"/>) under DRIP share the following format structure:</t>
        <figure anchor="att-struct">
          <name>Attestation Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                 Attestor Identity Information                 .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                       Attestation Data                        .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|               Expiration Timestamp by Attestor                |
+---------------+---------------+---------------+---------------+
|                 Signing Timestamp by Attestor                 |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                     Signature by Attestor                     |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Attestor Identity Information: (0, 16-bytes or 120-bytes)
    Field containing Attestor Identity Information in various forms.

Attestation Data:
    A field of variable length containing the attestation data.

Expiration Timestamp by Attestor (4 bytes):
    Timestamp denoting recommended time to trust data to.

Signing Timestamp by Attestor (4 bytes):
    Current time at signing.

Attestor Signature (64 bytes):
    Signature over preceding fields using the keypair of 
    the Attestor.
]]></artwork>
        </figure>
        <section anchor="attestor-identity-information" numbered="true" toc="default">
          <name>Attestor Identity Information</name>
          <t>This can be either of the following:</t>
          <ol spacing="normal" type="1"><li>Attestor DET: 16-bytes</li>
            <li>Attestor Self-Attestation: 120-bytes</li>
          </ol>
          <t>A specific definition of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) defines which of these are used.</t>
        </section>
        <section anchor="attestation-data" numbered="true" toc="default">
          <name>Attestation Data</name>
          <t>The data being attested to. It can be one of the following forms:</t>
          <ol spacing="normal" type="1"><li>Claims</li>
            <li>Assertions</li>
            <li>Attestations</li>
          </ol>
          <t>This field is variable length with no limit and specific definitions of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) indicate the fields, size and ordering of any subfields.</t>
        </section>
        <section anchor="expiration-timestamp" numbered="true" toc="default">
          <name>Expiration Timestamp</name>
          <t>A UTC timestamp set some time into the future to indicate a point the Attestation Structure should not be trusted.</t>
          <!-- Author Note (atw): we need to highlight here how important the delta needs to be, but not over constrain -->

<t>The time delta into the future is of important concern as replay attacks on during flight could compromise the goals of DRIP. Attestations and certificates intended for public use and lower in the tree (importantly any generated for a Session ID (<xref target="sid-registration" format="default"/>)).</t>
          <t>For this reason deltas SHOULD be kept as short as possible for the given use-case to avoid issues with replays.</t>
        </section>
        <section anchor="signing-timestamp" numbered="true" toc="default">
          <name>Signing Timestamp</name>
          <t>A UTC timestamp set to the time when the Attestation Structure was signed.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>An EdDSA25519 signature using the signing parties private key over the preceding fields in the Attestation Structure.</t>
          <ul empty="true" spacing="normal">
            <li>
              <ul empty="true" spacing="normal">
                <li>Note: the preceding fields of the Attestation Structure actually form an Assertion, with all fields acting as Claims</li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="attestations" numbered="true" toc="default">
        <name>Attestations</name>
        <section anchor="self-attestation" numbered="true" toc="default">
          <name>Self-Attestation (SA-x)</name>
          <t>The only attestation to use a claim (the Host Identity) in the <tt>Attestation Data</tt> with the DET acting as the <tt>Attestor Identity Information</tt>.</t>
          <figure anchor="axx-fig">
            <name>DRIP Self-Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                         Trust Timestamp                       |
+---------------+---------------+---------------+---------------+
|                        Signing Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 120-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="attestation" numbered="true" toc="default">
          <name>Attestation (A-x.y)</name>
          <t>The standard first level DRIP Attestation form using a Self-Attestations of the signer and of the data being signed.</t>
          <figure anchor="axy-fig">
            <name>DRIP Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-xx                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-yy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 312-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-attestation" numbered="true" toc="default">
          <name>Concise Attestation (CA-x.y)</name>
          <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this attestation can be used.</t>
          <figure anchor="c-axy-fig">
            <name>DRIP Concise Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 104-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-attestation" numbered="true" toc="default">
          <name>Mutual Attestation (MA-x.y)</name>
          <t>An attestation that perform a sign over an existing Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="m-axy-fig">
            <name>DRIP Mutual Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 400-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-attestation" numbered="true" toc="default">
          <name>Link Attestation (LA-x.y)</name>
          <t>An attestations that perform a sign over an existing Concise Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="l-axy-fig">
            <name>DRIP Link Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="broadcast-attestation" numbered="true" toc="default">
          <name>Broadcast Attestation (BA-x.y)</name>
          <t>Required by DRIP Authentication Formats for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="drip-requirements" format="default"/> GEN-1 and GEN-3.</t>
          <figure anchor="b-axy-fig">
            <name>DRIP Broadcast Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 136-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificates" numbered="true" toc="default">
        <name>Certificates</name>
        <t>In DRIP certificates are signed by a third party that has no stake in the claims/assertions/attestations being attested to.</t>
        <t>It is analogous to a third party in legal system that signs a document as a "witness" and bears no responsibility in the document.</t>
        <section anchor="attestation-certificate" numbered="true" toc="default">
          <name>Attestation Certificate (AC-z.x.y)</name>
          <figure anchor="a-cxy-fig">
            <name>DRIP Attestation Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 504-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-certificate" numbered="true" toc="default">
          <name>Concise Certificate (CC-z.x.y)</name>
          <figure anchor="c-cxy-fig">
            <name>DRIP Concise Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-certificate" numbered="true" toc="default">
          <name>Link Certificate (LC-z.x.y)</name>
          <figure anchor="l-cxy-fig">
            <name>DRIP Link Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             LA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 300-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-certificate" numbered="true" toc="default">
          <name>Mutual Certificate (MC-z.x.y)</name>
          <figure anchor="m-cxy-fig">
            <name>DRIP Mutual Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             MA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 576-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of attestation and certificates can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular attestation/certification can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Attestation: Unmanned Aircraft</tt></li>
            <li>
              <tt>Attestation: Operator on Aircraft</tt> or <tt>Attestation: Operator, Aircraft</tt></li>
            <li>
              <tt>Attestation Certificate: Registry on Operator on Aircraft</tt> or <tt>Attestation Certificate: Registry, Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SA(Unmanned Aircraft)</tt> or <tt>SA-ua</tt></li>
            <li>
              <tt>A(Operator, Unmanned Aircraft)</tt> or <tt>A-op.ua</tt></li>
            <li>
              <tt>AC(Registry, Operator, Aircraft)</tt> or <tt>AC-reg.op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various certificates a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-{hash of entity}</tt></li>
            <li>
              <tt>a-{hash of entity x}_{hash of entity y}</tt></li>
            <li>
              <tt>ac-{hash of entity z}_{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>a-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ac-aac6b00abba268b7_120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <!-- Author Note (atw): to be provided by Bob M.-->

</section>
    <section anchor="blockchain-based-registries" numbered="true" toc="default">
      <name>Blockchain-based Registries</name>
      <t>The implementation of the registries and Network Remote Identification
(Network RID; identify a UA through the network) in DRIP
is yet to be determined. Blockchain, being synonymous with ledger,
is a technology that could naturally fulfil the role of a registry, while
simultaneously offering its benefits such as auditability, persistency
and decentralization. We suggest that blockchain is an
ample candidate to be used as registry within DRIP. We also show
that it can be used to effectively leverage Network RID in certain
scenarios. Thus 1) We propose a novel drone ID architecture based on Hyperledger
Iroha and describe its proof-of-concept implementation with DRIP.
2) Its performance and scalability is empirically evaluated. 3) We
perform an informal security analysis of the system against various
types of attacks [<eref target="https://doi.org/10.1145/3479243.3487305">Secure Drone Identification with Hyperledger Iroha</eref>].</t>
      <t>Figure 1: Architecture using blockchain as registry for DRIP</t>
      <t>The proposed architecture is presented in Fig. 1. It consists of the
usual actors in a UAS network, along with the blockchain registry
based on Hyperledger Iroha. Key components:
o Authorized users (administrators) can register new UAs to
the network, and store with them any relevant data such as
public keys and certificates.</t>
      <t>Drones can either send location updates directly to the blockchain,
given that they are connected to the Internet, or send location
updates to their connected Ground Control Station (GCS)
that forwards it on behalf of the drones.
o Observers can receive drone messages either through bluetooth
and WiFi broadcasts from drones, or by polling the
blockchain. They can also fetch the public key associated
with a drone in order to validate its messages.
o The blockchain network and its nodes are an entirely separate
entity, no other actor participates in the consensus of
new blocks.</t>
      <t>Actors within DRIP (except observers) will be registered as accounts
on the blockchain network. Each of these accounts will have their
DRIP identities, certificates and public keys stored and available so
that they can be validated and used for validation by any account
on the blockchain. Note that DRIP crypto key-pairs are separate
from the blockchain crypto key-pairs. DRIP key-pairs are used to
sign, verify and validate DRIP identities and messages, while the
blockchain key-pairs are used to sign, verify and validate transactions
on the blockchain.</t>
      <t>The DRIP requirements for a registry are the following:
(1) REG-1: Public lookup
(2) REG-2: Private lookup
(3) REG-3: Provisioning (of static/dynamic data of UAs)
(4) REG-4: AAA Policy</t>
      <t>REG-1 &amp; REG-2. In Hyperledger Iroha, accounts are created
on domains. The same account name can be used for multiple domains,
and these are seen as separate accounts on Iroha. PII for
an account can therefore be stored on a separate account (with
the same account name) existing on a separate domain, that only
allows certain accounts to view its account details. Accordingly, a
registry using Iroha would need at least two domains associated
with it for any given account, one for public lookup and one for
private lookup.</t>
      <t>REG-3 &amp; REG-4. The details for an account are set with a
key/value pair. Key/value pairs can not be removed once they are
set, values can only be modified through the corresponding key.
Furthermore, the account that sets a key/value pair is included in
the account details as a key/value pair itself, meaning one account
can not modify details set by another account. See Listing 1 for
clarification. Notice that both accounts have set the same key but
contain different values. This sort of implementation supports both
non-repudiation, but also trust in the sense that a drone (assuming
the drone is not compromised) can always trust its own data, and
does not have to interpret data coming from other accounts. Similarly,
other accounts accessing another account's data can trust
that it is set by the corresponding account (e.g. fetching gps data).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
