<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-03" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="registries">DRIP Entity Tag Registration &amp; Lookup</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-03"/>
    <author initials="A." surname="Wiethuechter (Editor)" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="May" day="11"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to RID. Only very limited information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital as the worry of collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates a lot of the risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an attestation or certificate from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various <xref target="drip-requirements" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="definitions" numbered="true" toc="default">
        <name>Definitions</name>
        <t>See <xref target="drip-requirements" format="default"/> for common DRIP terms.</t>
        <dl newline="false" spacing="normal">
          <dt>HDA:</dt>
          <dd>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</dd>
          <dt>HID:</dt>
          <dd>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</dd>
          <dt>RAA:</dt>
          <dd>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</dd>
        </dl>
      </section>
    </section>
    <section anchor="registries" numbered="true" toc="default">
      <name>Registries</name>
      <section anchor="classes" numbered="true" toc="default">
        <name>Classes</name>
        <t>Under DRIP there 3 classes of registries, with specific variants in each.</t>
        <figure anchor="reg-class-fig">
          <name>Registry Hierarchy</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Root   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
        </figure>
        <!-- Author Note (atw): above figure should match docs/registry-diagram.png -->

<section anchor="root" numbered="true" toc="default">
          <name>Root</name>
          <t>This is a special registry holding the RAA value of 0 and HDA value of 0. It delegates out RAA values only to registries that wish to act as an RAA.</t>
          <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        <section anchor="raa" numbered="true" toc="default">
          <name>Registered Assigning Authorities</name>
          <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of a DET). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their NAS. This is does not preclude other entities to operate an RAA if the Root server allows it.</t>
          <t>The ICAO registration process will be available from ICAO. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>uas.icao.int.</tt> DNS zone for the RAA.</t>
          <t>As HHITs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
          <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
          <section anchor="irm" numbered="true" toc="default">
            <name>ICAO Registry of Manufacturer's (IRM)</name>
            <t>A special RAA that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in ANSI CTA2063-A Serial Numbers.</t>
            <t>It is holds the RAA value of 1 and HDA value of 0.</t>
            <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        </section>
        <section anchor="hda" numbered="true" toc="default">
          <name>Hierarchial HIT Domain Authorities</name>
          <t>An HDA may be an ISP or any third party that takes on the business to provide RVS and other needed services such as those required for HIP-enabled devices.</t>
          <t>The HDA is an 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA. An HDA should maintain a set of RVS servers for UAS clients that may use HIP. How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
          <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
          <section anchor="mra" numbered="true" toc="default">
            <name>Manufacturer's Registry of Aircraft (MRA)</name>
            <t>A registry (HDA) run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
            <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
            <t>Hold RAA value of 1 and HDA values of 1+.</t>
          </section>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>Registry that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent.</t>
            <!-- Author Note (atw): these are contemplated to be part of a USS as a function or a standalone SDSP in the UTM system -->

<t>Hold RAA values of 2+ and HDA values of 1+.</t>
          </section>
        </section>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the entity MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single entity to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
        <!-- Author Note (atw): does someone want to explore this option of federating across multiple DETs with same HID? -->

</section>
    </section>
    <section anchor="drip-fully-qualified-domain-names" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <t>Under DRIP there are a number of FQDN forms used to allow lookups to take place.</t>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the HHIT detail response. A secure connection (e.g., DNS over TLS) to the authoritative zone may be a viable alternative to DNSSEC.</t>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>Serial Number</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.F.8653.mfr.uas.icao.int
]]></artwork>
      </section>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DET</name>
        <t>The DET reverse lookup can be a standard IPv6 reverse look up, or it can leverage off the HHIT structure. If we assume a prefix of 2001:30::/28:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 20010030
FQDN: a3ad19520ad0a69e.5.20.10.20010030.det.uas.icao.int
]]></artwork>
        <t>When building a DET FQDN the following two things must be done:</t>
        <ol spacing="normal" type="1"><li>The RAA and HDA values MUST be converted from hexadecimal to decimal form</li>
          <li>The FQDN must be built using the expanded form of the IPv6 address</li>
        </ol>
        <t>The prefix is included in the FQDN form to support other potential prefixes being used.</t>
        <!-- Author Note (atw): we need a section detailing the potential prefixes to be seen and from whom and why we would want to support such a thing -->
<!-- Author Note (atw): need a section on different TLDs supported - uas.icao.int, remoteid.aero, rid.aero? -->

</section>
      <section anchor="reverse-det" numbered="true" toc="default">
        <name>Reverse DET</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
      </section>
    </section>
    <section anchor="supported-dns-records" numbered="true" toc="default">
      <name>Supported DNS Records</name>
      <t>DRIP requires a number of resource records, some specific to certain registries to function.</t>
      <section anchor="hip-rr" numbered="true" toc="default">
        <name>HIP RR</name>
        <t>All registries will have their own DET associated with them and their respective DNS server will hold a HIP RR that is pointed to by their DET FQDN.</t>
        <t>MRA and RIDR servers will also have HIP RRs for their registered parties (aircraft and operators).</t>
      </section>
      <section anchor="cert-rr" numbered="true" toc="default">
        <name>CERT RR</name>
        <t>Most attestations can be placed into DNS. An exception to this is the Attestation Certificate made during Session ID registration. This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
      </section>
      <section anchor="ns-rr" numbered="true" toc="default">
        <name>NS RR</name>
        <t>Along with their associated "glue" record (A/AAAA) supports the traversal in DNS across the tree.</t>
        <ol spacing="normal" type="1"><li>
            <tt>&lt;mfr.remoteid.aero&gt;</tt> on Root points to specific DET FQDN of IRM</li>
          <li>
            <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero</tt> on IRM points to specific DET FQDN of MRA</li>
          <li>
            <tt>&lt;raa_value&gt;.det.remoteid.aero</tt> on Root pointing to DET FQDN of matching RAA</li>
          <li>
            <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero</tt> on RAA pointing to DET FQDN of matching HDA</li>
        </ol>
      </section>
      <section anchor="aaaa-rr" numbered="true" toc="default">
        <name>AAAA RR</name>
        <t>DRIP requires the use of IPv6.</t>
      </section>
      <section anchor="svr-rr" numbered="true" toc="default">
        <name>SVR RR</name>
        <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
        <t>The best example of this is RIDR would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
        <t>In all cases the server being pointed to MUST be protected using AAA, specifically using RDAP.</t>
      </section>
      <section anchor="tlsa-rr" numbered="true" toc="default">
        <name>TLSA RR</name>
        <t>This RR is mainly used to support DTLS deployments where the DET is used in Network RID and the wider UTM system.</t>
        <!-- Author Note (atw): RFC6698 applies here, but how? Bob M. was the one originally mentioning this to me but context has been lost to time -->

</section>
    </section>
    <section anchor="registry-operations" numbered="true" toc="default">
      <name>Registry Operations</name>
      <t>As a general rule the following processing performed for any registration operation:</t>
      <ol spacing="normal" type="1"><li>Verify input Attestations from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate DNS with required/optional records</li>
        <li>Populate Database with PII and other info</li>
        <li>Generate and return required/optional Attestations/Certificates</li>
      </ol>
      <section anchor="registering-a-registry" numbered="true" toc="default">
        <name>Registering a Registry</name>
        <t>DRIP defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries" format="default"/>.</t>
        <!-- Author Note (atw): is the hhit-registries draft and reference needed anymore? -->

<t>Both the parent and child generate their own keypairs and self-signed attestations if not generated previously. The child sends to the parent its self-signed attestation to be added into the parent DNS.</t>
        <t>The parent confirms the attestation received is valid and that no DET collisions occur before adding a NS RR (and CERT RRs) to its DNS for the new child. An attestation, parent on child, is sent as a confirmation that provisioning was successful.</t>
        <t>The child is now a valid member of the registry tree and uses its keypair and Self-Attestation with all provisioning requests towards it. The HIP RR for the child is populated into the local DNS along with any CERT RRs.</t>
        <section anchor="registering-an-raa" numbered="true" toc="default">
          <name>Registering an RAA</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of RAA</td>
                <td align="left">Root: <tt>&lt;raa_value&gt;.det.remoteid.aero NS &lt;raa_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, RAA</td>
              </tr>
              <tr>
                <td align="left">RAA Self-Attestation</td>
                <td align="left">Root: <tt>&lt;raa_det_fqdn&gt; AAAA &lt;raa_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;raa_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-irm" numbered="true" toc="default">
          <name>Registering an IRM</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of IRM</td>
                <td align="left">Root: <tt>mfr.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, IRM</td>
              </tr>
              <tr>
                <td align="left">IRM Self-Attestation</td>
                <td align="left">Root: <tt>1.det.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">Root: <tt>&lt;irm_det_fqdn&gt; AAAA &lt;irm_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;irm_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-hda" numbered="true" toc="default">
          <name>Registering an HDA</name>
          <t>Specifically handled by an RAA (<xref target="raa" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of HDA</td>
                <td align="left">RAA: <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero NS &lt;hda_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: RAA, HDA</td>
              </tr>
              <tr>
                <td align="left">HDA Self-Attestation</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; AAAA &lt;hda_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;hda_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-mra" numbered="true" toc="default">
          <name>Registering an MRA</name>
          <t>Specifically handled by the IRM (<xref target="irm" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of MRA</td>
                <td align="left">IRM: <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: IRM, MRA</td>
              </tr>
              <tr>
                <td align="left">MRA Self-Attestation</td>
                <td align="left">IRM: <tt>&lt;hda_value&gt;.1.det.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">ICAO Manufacturer Code</td>
                <td align="left">IRM: <tt>&lt;mra_det_fqdn&gt; AAAA &lt;mra_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;mra_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="registering-a-serial-number" numbered="true" toc="default">
        <name>Registering a Serial Number</name>
        <t>Specifically handled by an MRA (<xref target="mra" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt>)</td>
              <td align="left">(Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">(UA Self-Attestation)</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;sn_self_attestation&gt;</tt>)</td>
              <td align="left">(Broadcast Attestation: MRA, UA</td>
            </tr>
            <tr>
              <td align="left">UA Metadata</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;attestation_mra_sn&gt;</tt>)</td>
              <td align="left">(Concise Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;concise_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;broadcast_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <!-- Author Note (atw): when registering a SN it could either be a DRIP encoded SN or it could be a non-DRIP SN. In the former case Attestations are both provided and generated during the registration process. The later case there will be no DRIP Attestations produced and most likely an X.509? Also there would be no RRs - so what do we point to to avoid NXDOMAINs; perhaps SVR/AAAA records? -->

<figure>
          <name>Manufacturer Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +--------------+    SA-a0a0 +-----------------+
    | Manufacturer | <--------> | Manufacturer CA |
    +--------------+ A-ma0      +-----------------+
        ^    |
        |    |
        |    |
SA-a0a0 |    |   A-ma0
        |    |
        |    v
    +----------+
    | Aircraft |
    +----------+
]]></artwork>
        </figure>
        <t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A Serial Number for UAS. Under DRIP a DET can be encoded as such to be able to convert back and forth between them. This is covered in <xref target="drip-rid" format="default"/>.</t>
        <t>Under DRIP the Manufacturer SHOULD be using DETs and have their own keypair and Self-Attestation: Manufacturer (SA-m). (Ed. Note: some words on aircraft keypair and certs here?).</t>
        <t>Self-Attestation: Aircraft 0 on Aircraft 0 (SA-a0a0) is extracted by the manufacturer and sent to their Certificate Authority (CA) to be verified and added. A resulting attestation (Attestation: Manufacturer on Aircraft 0 [A-ma0]) SHOULD be a DRIP Attestation - however this could be a X.509 certificate binding the serial number to the manufacturer.</t>
      </section>
      <section anchor="registering-an-operator" numbered="true" toc="default">
        <name>Registering an Operator</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <!-- Author Note (atw): this could also be handled by the RAA run by the CAA and act as a registration point for Operators in their NAS in general. Many CAAs, for example the FAA, already have separate systems deployed to handle this information. We could be asking a lot of the user (registering to another place and specifically for DRIP) and CAA to deploy this new database in an attempt to unify the system -->

<table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Operator Self-Attestation</td>
              <td align="left">
                <tt>&lt;op_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Operator PII</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;op_self_attestation&gt;</tt>)</td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;attestation_ridr_op&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;concise_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <figure>
          <name>Operator Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+  [HIP RR]  +---------+
    ^   |
    |   |
    |   |
Coo |   | Aro
    |   |
    |   v
+----------+
| Operator |
+----------+
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in DRIP UAS RID. A self-signed attestation (Self-Attestation: Operator on Operator [SA-oo]) is generated and sent to the desired registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the registry (all over a secure channel - the method of which is out of scope for this document).</t>
        <t>The registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The DET is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the DET/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>
        <t>With the receipt of Attestation: Registry on Operator (A-ro) the provisioning of an Operator is complete.</t>
      </section>
      <section anchor="sid-registration" numbered="true" toc="default">
        <name>Registering a Session ID</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attestation: RIDR, Operator</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Attestation: Operator, UA</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;session_self_attestation&gt;</tt></td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_session&gt;</tt></td>
              <td align="left">Attestation Certificate: RIDR, Operator, UA</td>
            </tr>
            <tr>
              <td align="left">(Concise Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">(Mutual Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;concise_attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Mutual Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Link Attestation: Operator, UA)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Concise Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Operational Intent)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Link Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: RAA, RIDR)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: Root, RAA)</td>
            </tr>
          </tbody>
        </table>
        <section anchor="standard-provisioning" numbered="true" toc="default">
          <name>Standard Provisioning</name>
          <t>Under standard provisioning the Aircraft has its own connectivity to the registry, the method which is out of scope for this document.</t>
          <figure>
            <name>Standard Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        A-a0aN          +----------+
]]></artwork>
          </figure>
          <t>Through mechanisms not specified in this document the Operator should have methods to instruct the Aircraft onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Self-Attestation: Aircraft 0 on Aircraft 0 [SA-a0a0]). This new attestation (Attestation: Aircraft 0 on Aircraft N [A-a0aN]) is securely extracted by the Operator.</t>
          <t>With A-a0aN the sub-attestation (Self-Attestation: Aircraft N on Aircraft N [SA-aNaN]) is used by the Operator to generate Attestation: Operator on Aircraft N (A-oaN). This along with Attestation: Registry on Operator (A-ro) is sent to the registry.</t>
          <figure>
            <name>Standard Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork>
          </figure>
          <t>On the registry, A-ro is verified and used as confirmation that the Operator is already registered. A-oaN also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>
          <t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 to Aircraft N (A-a0aN).</t>
          <figure>
            <name>Standard Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  AC-roaN               BA-raN  |    |  A-ma0, A-a0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork>
          </figure>
          <t>The registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new DET tied to Aircraft N is then checked for collisions in the HDA. With the information the registry generates two items: Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>
          <t>AC-roaN is sent via a secure channel back to the Operator to be stored. BA-raN is sent to the Aircraft to be used in Broadcast RID as specified in <xref target="drip-auth" format="default"/>.</t>
        </section>
        <section anchor="operator-assisted-provisioning" numbered="true" toc="default">
          <name>Operator Assisted Provisioning</name>
          <t>This provisioning scheme is for when the Aircraft is unable to connect to the registry itself or does not have the hardware required to generate keypairs and attestations.</t>
          <figure>
            <name>Operator Assisted Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+     aN, SA-aNaN        +----------+
]]></artwork>
          </figure>
          <t>To start the Operator generates on behalf of the Aircraft a new keypair and Attestation: Aircraft N on Aircraft N (SA-aNaN). This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N (A-a0aN). After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>
          <figure>
            <name>Operator Assisted Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-ma0, A-a0aN, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+      A-ma0, A-a0aN     +----------+
]]></artwork>
          </figure>
          <t>Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 on Aircraft N (A-a0aN) is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator (A-ro), Attestation: Manufacturer on Aircraft 0 (A-ma0), Attestation: Aircraft 0 on Aircraft N (A-a0aN), Attestation: Operator on Aircraft N (A-oaN).</t>
          <figure>
            <name>Operator Assisted Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  AC-roaN, BA-raN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        BA-raN          +----------+
]]></artwork>
          </figure>
          <t>On the registry validation checks are done on all attestations as per the previous sections. Once complete then the registry checks for a DET collision, adding to the HDA if clear and generates Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). Both are sent back to the Operator.</t>
          <t>The Operator securely inject BA-raN and securely stores AC-roaN of Aircraft N.</t>
        </section>
        <section anchor="initial-provisioning" numbered="true" toc="default">
          <name>Initial Provisioning</name>
          <t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>
          <!-- Author Note (atw): this action of registration is the same as an owner needed to use something like FAA DroneZone to register the SN of the aircraft to their CAA Assigned ID. So it doesn't make a whole lot of sense to do this at the HDA level (then it would need to be done for every HDA the user wants to fly under - potentially many). Is this a concern? -->

<t>For this either Standard or Operator Assisted methods can be used.</t>
        </section>
      </section>
    </section>
    <section anchor="epp-command-mappings" numbered="true" toc="default">
      <name>EPP Command Mappings</name>
      <section anchor="common-attributes" numbered="true" toc="default">
        <name>Common Attributes</name>
        <t>There are a number of common attributes between the various EPP commands under DRIP that has specific encoding rules.</t>
        <ul spacing="normal">
          <li>The <tt>hi</tt> attribute is a Base64 encoding of the Host Identity.</li>
          <li>The <tt>det</tt> attribute is a string from of the DET.</li>
        </ul>
      </section>
      <section anchor="epp-query-commands" numbered="true" toc="default">
        <name>EPP Query Commands</name>
        <section anchor="epp-query-check" numbered="true" toc="default">
          <name>EPP &lt;check&gt; Command</name>
          <section anchor="epp-check-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-check-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-check-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-check-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-info" numbered="true" toc="default">
          <name>EPP &lt;info&gt; Command</name>
          <section anchor="epp-info-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-info-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-info-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-info-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
      </section>
      <section anchor="epp-transform-commands" numbered="true" toc="default">
        <name>EPP Transform Commands</name>
        <!-- Author Note (atw): TODO: add DET/HI pairs to examples -->

<section anchor="epp-transform-create" numbered="true" toc="default">
          <name>EPP &lt;create&gt; Command</name>
          <section anchor="epp-create-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>The <tt>abbreviation</tt> field has a max of 6 characters, and is used by RID receivers to display a short decoded form for display of a received DET in the form of <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. If the abbreviation is unknown then the receiver SHOULD use the hexadecimal encoding of the respective RAA/HDA field of the HID as the value in the form. For example if the HDA is unknown and the HDA value is 20 then the decoded display would be: <tt>DE 14 FE23</tt>. Typically for RAAs the <tt>abbreviation</tt> is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA. Dashes or underscores should be used in place of spaces.</t>
            <!-- Author Note (atw): does the above text need to be moved to DET draft instead (and possible expanded)? -->

<t>The <tt>mfrCode</tt> field is only used by an MRA (<xref target="mra" format="default"/>) when registering with an IRM (<xref target="irm" format="default"/>) and holds the ICAO assigned Manufacturer Code for ANSI CTA2063-A Serial Numbers. It has a max of 4 characters.</t>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripRegistry:dripRegistry xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
    <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
    <dripRegistry:hi></dripRegistry:hi>
    <dripRegistry:selfAttestation>Hex of SelfAttestation(Registry)</dripRegistry:selfAttestation>
    <dripRegistry:raa>10</dripRegistry:raa>
    <dripRegistry:hda>20</dripRegistry:hda>
    <dripRegistry:abbreviation>FAA</dripRegistry:abbreviation>
    <dripRegistry:mfrCode>MFR0</dripRegistry:mfrCode>
    <dripRegistry:postalInfo type="int">
      <dripRegistry:name>Federal Aviation Administration</dripRegistry:name>
      <dripRegistry:phys_addr>
        <dripRegistry:street1>Orville Wright Federal Building</dripRegistry:street1>
        <dripRegistry:street2>800 Independence Avenue SW</dripRegistry:street2>
        <dripRegistry:city>Washington</dripRegistry:city>
        <dripRegistry:sp>DC</dripRegistry:sp>
        <dripRegistry:pc>20591</dripRegistry:pc>
        <dripRegistry:cc>US</dripRegistry:cc>
      </dripRegistry:phys_addr>
    </dripRegistry:postalInfo>
    <dripRegistry:voice x="1234">1 (866) 835-5322</dripRegistry:voice>
    <dripRegistry:email>stephen.dickson@faa.gov</dripRegistry:email>
  </dripRegistry:dripRegistry>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripOperator:dripOperator xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
    <dripOperator:postalInfo type="int">
      <dripOperator:phys_addr>
        <dripOperator:street1>123 Example Dr.</dripOperator:street1>
        <dripOperator:street2>Suite 100</dripOperator:street2>
        <dripOperator:city>Dulles</dripOperator:city>
        <dripOperator:sp>VA</dripOperator:sp>
        <dripOperator:pc>20166-6503</dripOperator:pc>
        <dripOperator:cc>US</dripOperator:cc>
      </dripOperator:phys_addr>
    </dripOperator:postalInfo>
    <dripOperator:part107_acct_name>some_faa_account</dripOperator:part107_acct_name>
    <dripOperator:rec_flyer_id>123456</dripOperator:rec_flyer_id>
    <dripOperator:caaId></dripOperator:caaId>
    <dripOperator:det></dripOperator:det>
    <dripOperator:hi></dripOperator:hi>
    <dripOperator:selfAttestation>Hex of SelfAttestation(Operator)</dripOperator:selfAttestation>
    <dripOperator:attestation>Hex of Attestation(Registry, Operator)</dripOperator:attestation>
  </dripOperator::dripOperator>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-sn" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSerial:dripSerial xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
    <dripSerial:serial>0000F000000000000000</dripSerial:serial>
    <dripSerial:det></dripSerial:det>
    <dripSerial:hi></dripSerial:hi>
    <dripSerial:selfAttestation>Hex of SelfAttestation(Aircraft)</dripSerial:selfAttestation>
    <dripSerial:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSerial:broadcastAttestation>
    <dripSerial:manufacturer>Drones R Us</dripSerial:manufacturer>
    <dripSerial:make>Fast Drone</dripSerial:make>
    <dripSerial:model>9000</dripSerial:model>
    <dripSerial:color>White</dripSerial:color>
    <dripSerial:material>Plastic</dripSerial:material>
    <dripSerial:weight>12.0</dripSerial:weight>
    <dripSerial:length>5.0</dripSerial:length>
    <dripSerial:width>4.0</dripSerial:width>
    <dripSerial:height>3.0</dripSerial:height>
    <dripSerial:numRotors>4</dripSerial:numRotors>
    <dripSerial:propLength>2.0</dripSerial:propLength>
    <dripSerial:batteryCapacity>5000</dripSerial:batterCapacity>
    <dripSerial:batteryVoltage>12</dripSerial:batteryVoltage>
    <dripSerial:batteryWeight>5.2</dripSerial:batteryWeight>
    <dripSerial:batteryChemistry>Lithium-Ion</dripSerial:batteryChemistry>
    <dripSerial:takeOffWeight>15</dripSerial:takeOffWeight>
    <dripSerial:maxTakeOffWeight>25</dripSerial:maxTakeOffWeight>
    <dripSerial:maxPayloadWeight>10</dripSerial:maxPayloadWeight>
    <dripSerial:maxFlightTime>15</dripSerial:maxFlightTime>
    <dripSerial:minOperatingTemp>35</dripSerial:minOperatingTemp>
    <dripSerial:maxOperatingTemp>90</dripSerial:maxOperatingTemp>
    <dripSerial:ipRating>55</dripSerial:ipRating>
  </dripSerial:dripSerial>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSession:dripSession xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
    <dripSession:serial>0000F000000000000000</dripSession:serial>
    <dripSession:uasId></dripSession:uasId>
    <dripSession:sessionHi></dripSession:sessionHi>
    <dripSession:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSession:broadcastAttestation>
    <dripSession:attestationCertificate>Hex of AttestationCertificate(Registry, Operator, Aircraft)</dripSession:attestationCertificate>
    <dripSession:operationalIntent></dripSession:operationalIntent>
    <dripSession:operationalIntentSrc>uss.example.com</dripSession:operationalIntentSrc>
    <dripSession:operatorId>NOP123456</dripSession:operatorId>
    <dripSession:operatorDet></dripSession:operatorDet>
    <dripSession:attestation>Hex of Attestation(Operator, Aircraft)</dripSession:attestation>
    <dripSession:mutualAttestation>Hex of MutualAttestation(Registry, Operator)</dripSession:mutualAttestation>
    <dripSession:fa3>N1232456</dripSession:fa3>
    <dripSession:sessionStart>2022-04-09T15:43:13Z</dripSession:sessionStart>
    <dripSession:sessionEnd>2022-04-09T20:43:13Z</dripSession:sessionEnd>
  </dripSession:dripSession>
</extension>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-delete" numbered="true" toc="default">
          <name>EPP &lt;delete&gt; Command</name>
          <section anchor="epp-delete-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripRegistry:delete xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
      </dripRegistry:delete>
    </delete>
    <clTRID>DEL-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripOperator:delete xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
      </dripOperator:delete>
    </delete>
    <clTRID>DEL-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSerial:delete xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
      </dripSerial:delete>
    </delete>
    <clTRID>DEL-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSession:delete xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:uasId></dripSession:uasId>
      </dripSession:delete>
    </delete>
    <clTRID>DEL-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-renew" numbered="true" toc="default">
          <name>EPP &lt;renew&gt; Command</name>
          <t>Renewal semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;renew&gt; command.</t>
        </section>
        <section anchor="epp-transform-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
        <section anchor="epp-transform-update" numbered="true" toc="default">
          <name>EPP &lt;update&gt; Command</name>
          <section anchor="epp-update-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-update-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-update-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-update-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
      </section>
    </section>
    <section anchor="rdap-definitions" numbered="true" toc="default">
      <name>RDAP Definitions</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- Author Note (atw): need help here: EPP/RDAP adds to existing registries, CERT RR update, HIP RR update -->

</section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="det-generation" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <dl newline="false" spacing="normal">
          <dt>1</dt>
          <dd>
  The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Attestation) or denied.</dd>
          <dt>2</dt>
          <dd>
  The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</dd>
        </dl>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations" format="default"/>) and connectivity it is acceptable under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning" format="default"/>). The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
        <t>In either case the registry must decide on if the HI/DET pairing is valid. This in its simplest form is checking the current registry for a collision on the DET and HI.</t>
        <t>Upon accepting a HI/DET pair the registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The registry MUST also generate the appropriate attestations/certificates for the given operation.</t>
        <t>If the registry denied the HI/DET pair, because there was a DET collision or any other reason, the registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>
      </section>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>Scott Hollenbeck for his initial guidance with EPP/RDAP</li>
      </ul>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>Andrei Gurtov for his insights as a pilot</li>
        <li>Len Bayles for his help in formatting EPP definitions and creating an extension for FRED</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="F3411-19">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="drip-requirements" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao">
              <organization>Tencent</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-22"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="hhit-registries" target="https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt">
          <front>
            <title>Hierarchical HIT Registries</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-hip-hhit-registries-02"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-06.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="5" month="May" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (N-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the N-RID messaging.  This is
   secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-06"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-00.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="24" month="March" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-00"/>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-09.txt">
          <front>
            <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="30" month="April" year="2022"/>
            <abstract>
              <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-09"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-attestations-certificates" numbered="true" toc="default">
      <name>DRIP Attestations &amp; Certificates</name>
      <t>See <xref target="drip-arch" format="default"/> for definitions of claim, assertion, attestation and certificate as used in this document.</t>
      <section anchor="attestation-structure" numbered="true" toc="default">
        <name>Attestation Structure</name>
        <t>All Attestations (<xref target="attestations" format="default"/>) and Certificates (<xref target="certificates" format="default"/>) under DRIP share the following format structure:</t>
        <figure anchor="att-struct">
          <name>Attestation Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                 Attestor Identity Information                 .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                       Attestation Data                        .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|               Expiration Timestamp by Attestor                |
+---------------+---------------+---------------+---------------+
|                 Signing Timestamp by Attestor                 |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                     Signature by Attestor                     |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Attestor Identity Information: (0, 16-bytes or 120-bytes)
    Field containing Attestor Identity Information in various forms.

Attestation Data:
    A field of variable length containing the attestation data.

Expiration Timestamp by Attestor (4 bytes):
    Timestamp denoting recommended time to trust data to.

Signing Timestamp by Attestor (4 bytes):
    Current time at signing.

Attestor Signature (64 bytes):
    Signature over preceding fields using the keypair of 
    the Attestor.
]]></artwork>
        </figure>
        <section anchor="attestor-identity-information" numbered="true" toc="default">
          <name>Attestor Identity Information</name>
          <t>This can be either of the following:</t>
          <ol spacing="normal" type="1"><li>Attestor DET: 16-bytes</li>
            <li>Attestor Self-Attestation: 120-bytes</li>
          </ol>
          <t>A specific definition of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) defines which of these are used.</t>
        </section>
        <section anchor="attestation-data" numbered="true" toc="default">
          <name>Attestation Data</name>
          <t>The data being attested to. It can be one of the following forms:</t>
          <ol spacing="normal" type="1"><li>Claims</li>
            <li>Assertions</li>
            <li>Attestations</li>
          </ol>
          <t>This field is variable length with no limit and specific definitions of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) indicate the fields, size and ordering of any subfields.</t>
        </section>
        <section anchor="expiration-timestamp" numbered="true" toc="default">
          <name>Expiration Timestamp</name>
          <t>A UTC timestamp set some time into the future to indicate a point the Attestation Structure should not be trusted.</t>
          <!-- Author Note (atw): we need to highlight here how important the delta needs to be, but not over constrain -->

<t>The time delta into the future is of important concern as replay attacks on during flight could compromise the goals of DRIP. Attestations and certificates intended for public use and lower in the tree (importantly any generated for a Session ID (<xref target="sid-registration" format="default"/>)).</t>
          <t>For this reason deltas SHOULD be kept as short as possible for the given use-case to avoid issues with replays.</t>
        </section>
        <section anchor="signing-timestamp" numbered="true" toc="default">
          <name>Signing Timestamp</name>
          <t>A UTC timestamp set to the time when the Attestation Structure was signed.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>An EdDSA25519 signature using the signing parties private key over the preceding fields in the Attestation Structure.</t>
          <ul empty="true" spacing="normal">
            <li>
              <ul empty="true" spacing="normal">
                <li>Note: the preceding fields of the Attestation Structure actually form an Assertion, with all fields acting as Claims</li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="attestations" numbered="true" toc="default">
        <name>Attestations</name>
        <section anchor="self-attestation" numbered="true" toc="default">
          <name>Self-Attestation (SA-x)</name>
          <t>The only attestation to use a claim (the Host Identity) in the <tt>Attestation Data</tt> with the DET acting as the <tt>Attestor Identity Information</tt>.</t>
          <figure anchor="axx-fig">
            <name>DRIP Self-Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                         Trust Timestamp                       |
+---------------+---------------+---------------+---------------+
|                        Signing Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 120-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="attestation" numbered="true" toc="default">
          <name>Attestation (A-x.y)</name>
          <t>The standard first level DRIP Attestation form using a Self-Attestations of the signer and of the data being signed.</t>
          <figure anchor="axy-fig">
            <name>DRIP Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-xx                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-yy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 312-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-attestation" numbered="true" toc="default">
          <name>Concise Attestation (CA-x.y)</name>
          <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this attestation can be used.</t>
          <figure anchor="c-axy-fig">
            <name>DRIP Concise Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 104-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-attestation" numbered="true" toc="default">
          <name>Mutual Attestation (MA-x.y)</name>
          <t>An attestation that perform a sign over an existing Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="m-axy-fig">
            <name>DRIP Mutual Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 400-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-attestation" numbered="true" toc="default">
          <name>Link Attestation (LA-x.y)</name>
          <t>An attestations that perform a sign over an existing Concise Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="l-axy-fig">
            <name>DRIP Link Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="broadcast-attestation" numbered="true" toc="default">
          <name>Broadcast Attestation (BA-x.y)</name>
          <t>Required by DRIP Authentication Formats for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="drip-requirements" format="default"/> GEN-1 and GEN-3.</t>
          <figure anchor="b-axy-fig">
            <name>DRIP Broadcast Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 136-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificates" numbered="true" toc="default">
        <name>Certificates</name>
        <t>In DRIP certificates are signed by a third party that has no stake in the claims/assertions/attestations being attested to.</t>
        <t>It is analogous to a third party in legal system that signs a document as a "witness" and bears no responsibility in the document.</t>
        <section anchor="attestation-certificate" numbered="true" toc="default">
          <name>Attestation Certificate (AC-z.x.y)</name>
          <figure anchor="a-cxy-fig">
            <name>DRIP Attestation Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 504-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-certificate" numbered="true" toc="default">
          <name>Concise Certificate (CC-z.x.y)</name>
          <figure anchor="c-cxy-fig">
            <name>DRIP Concise Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-certificate" numbered="true" toc="default">
          <name>Link Certificate (LC-z.x.y)</name>
          <figure anchor="l-cxy-fig">
            <name>DRIP Link Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             LA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 300-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-certificate" numbered="true" toc="default">
          <name>Mutual Certificate (MC-z.x.y)</name>
          <figure anchor="m-cxy-fig">
            <name>DRIP Mutual Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             MA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 576-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of attestation and certificates can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular attestation/certification can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Attestation: Unmanned Aircraft</tt></li>
            <li>
              <tt>Attestation: Operator on Aircraft</tt> or <tt>Attestation: Operator, Aircraft</tt></li>
            <li>
              <tt>Attestation Certificate: Registry on Operator on Aircraft</tt> or <tt>Attestation Certificate: Registry, Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SA(Unmanned Aircraft)</tt> or <tt>SA-ua</tt></li>
            <li>
              <tt>A(Operator, Unmanned Aircraft)</tt> or <tt>A-op.ua</tt></li>
            <li>
              <tt>AC(Registry, Operator, Aircraft)</tt> or <tt>AC-reg.op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various certificates a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-{hash of entity}</tt></li>
            <li>
              <tt>a-{hash of entity x}_{hash of entity y}</tt></li>
            <li>
              <tt>ac-{hash of entity z}_{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>a-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ac-aac6b00abba268b7_120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this
document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators)
may benefit from having X.509 certificates.  Most of these certificates
will be for their DET and some will be for other UAS identities.  To
provide for these certificates, some of the other entities covered in
this document will also have certificates to create and manage the
necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to
the ICAO's International Aviation Trust Framework (IATF) Certificate
Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either
be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey
(i.e. HI) in authentication protocols (as not all may support
rawPublicKey identities).  Some EE HI may not be 'worth' supporting the
overhead of X.509.  Short lived DETs like those used for a single
operation or even for a day's operations may not benefit from X.509. 
Creating then almost immediately revoking these certificates is a
considerable burden on all parts of the system.  Even using a short
notAfterDate will completely mitigate the burden of managing these
certificates.  That said, many EEs will benefit to offset the effort. 
It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its
DETs.  An RAA may specifically have some HDAs for DETs that do not
want/need certificates and other HDAs for DETs that do need them.  These
types of HDAs could be managed by a single entity thus providing both
environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA
Resource Records.  This not only generally improves certificate lookups,
but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the
UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). 
All DRIP certificates MUST be available via RDAP.  LDAP/OCSP access for
other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used.  The certificate
request SHOULD be included in the DET registration request (<xref target="registry-operations" format="default"/>).  A successful DET registration then MUST
include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation.  TLSA RR MUST be
deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. 
CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and
further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="blockchain-based-registries" numbered="true" toc="default">
      <name>Blockchain-based Registries</name>
      <t>The implementation of the registries and Network Remote Identification
(Network RID; identify a UA through the network) in DRIP
is yet to be determined. Blockchain, being synonymous with ledger,
is a technology that could naturally fulfil the role of a registry, while
simultaneously offering its benefits such as auditability, persistency
and decentralization. We suggest that blockchain is an
ample candidate to be used as registry within DRIP. We also show
that it can be used to effectively leverage Network RID in certain
scenarios. Thus 1) We propose a novel drone ID architecture based on Hyperledger
Iroha and describe its proof-of-concept implementation with DRIP.
2) Its performance and scalability is empirically evaluated. 3) We
perform an informal security analysis of the system against various
types of attacks [<eref target="https://doi.org/10.1145/3479243.3487305">Secure Drone Identification with Hyperledger Iroha</eref>].</t>
      <t>Figure 1: Architecture using blockchain as registry for DRIP</t>
      <t>The proposed architecture is presented in Fig. 1. It consists of the
usual actors in a UAS network, along with the blockchain registry
based on Hyperledger Iroha. Key components:
o Authorized users (administrators) can register new UAs to
the network, and store with them any relevant data such as
public keys and certificates.</t>
      <t>Drones can either send location updates directly to the blockchain,
given that they are connected to the Internet, or send location
updates to their connected Ground Control Station (GCS)
that forwards it on behalf of the drones.
o Observers can receive drone messages either through bluetooth
and WiFi broadcasts from drones, or by polling the
blockchain. They can also fetch the public key associated
with a drone in order to validate its messages.
o The blockchain network and its nodes are an entirely separate
entity, no other actor participates in the consensus of
new blocks.</t>
      <t>Actors within DRIP (except observers) will be registered as accounts
on the blockchain network. Each of these accounts will have their
DRIP identities, certificates and public keys stored and available so
that they can be validated and used for validation by any account
on the blockchain. Note that DRIP crypto key-pairs are separate
from the blockchain crypto key-pairs. DRIP key-pairs are used to
sign, verify and validate DRIP identities and messages, while the
blockchain key-pairs are used to sign, verify and validate transactions
on the blockchain.</t>
      <t>The DRIP requirements for a registry are the following:
(1) REG-1: Public lookup
(2) REG-2: Private lookup
(3) REG-3: Provisioning (of static/dynamic data of UAs)
(4) REG-4: AAA Policy</t>
      <t>REG-1 &amp; REG-2. In Hyperledger Iroha, accounts are created
on domains. The same account name can be used for multiple domains,
and these are seen as separate accounts on Iroha. PII for
an account can therefore be stored on a separate account (with
the same account name) existing on a separate domain, that only
allows certain accounts to view its account details. Accordingly, a
registry using Iroha would need at least two domains associated
with it for any given account, one for public lookup and one for
private lookup.</t>
      <t>REG-3 &amp; REG-4. The details for an account are set with a
key/value pair. Key/value pairs can not be removed once they are
set, values can only be modified through the corresponding key.
Furthermore, the account that sets a key/value pair is included in
the account details as a key/value pair itself, meaning one account
can not modify details set by another account. See Listing 1 for
clarification. Notice that both accounts have set the same key but
contain different values. This sort of implementation supports both
non-repudiation, but also trust in the sense that a drone (assuming
the drone is not compromised) can always trust its own data, and
does not have to interpret data coming from other accounts. Similarly,
other accounts accessing another account's data can trust
that it is set by the corresponding account (e.g. fetching gps data).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
