<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-13" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-13"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="18"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>While it is expected that DRIP Identity Management Entity (DIME) functions will be integrated with UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>), who will provide DIME-like functions is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential DIME-like functions (including the management of identifiers (such as the DRIP Entity Tag (DET))) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="RFC9434" format="default"/>) or Network RID (Section 1.2.2 of <xref target="RFC9434" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="RFC9434" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET (Section 9.5 of <xref target="RFC9374" format="default"/>). Forgery of a DET is still possible, but including it as a part of a public registration mitigates this risk.</t>
      <t>This document creates the DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a DET <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry (e.g. DNS) within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number (Section 4.2 of <xref target="RFC9374" format="default"/>). This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA's direct HDA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
      <section anchor="supported-scenarios" numbered="true" toc="default">
        <name>Supported Scenarios</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section most likely is removed or merged with another. The only point to merge is #6.</li>
        </ul>
        <ol spacing="normal" type="1"><li>UA using manufacturer generated Serial Number for UAS ID. No additional information provided.</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. Manufacturer using a DIME. Manufacturer MUST provided pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number which is mapped to a DET by manufacturer for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. Manufacturer MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated DRIP enhanced Serial Number for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public information into DNS (i.e. HI) - either directly or as a mapping to a DET. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. UA using user generated DET for Authentication. User uses DIME with capability to publicly map Serial Number to a DET (via a USS). DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA provisioned with DET (i.e. Session ID) with a DIME (via a USS) for UAS ID and Authentication. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST NOT (unless required) provide mapping of DET to Serial Number in DNS. USS MUST provide pointer to additional information via DNS (even if null).</li>
        </ol>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="RFC9434" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these initial roles (some highly specialized and predetermined for the UAS use case) are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   o--------.
                +-o------o-+        |
                  |      |          |
******************|******|**********|******************
                  |      |          |
            +-----o-+  +-o-----+  +-o-----+
RAAs        |  MCA  |  |  INN  |  |  RAA  |
            +---o---+  +---o---+  +---o---+
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  |  HDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the values of RAA=0-3 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex is the owner of the IPv6 prefix portion of the DET associated with it (2001:30/28) which is assigned by IANA from the special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. Allocations of RAAs SHOULD be done in contiguous groups of 4.</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">RAA Decimal Range</th>
              <th align="left">RAA Hex Range</th>
              <th align="left">Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 - 3</td>
              <td align="left">0x0000 - 0x0003</td>
              <td align="left">Apex</td>
            </tr>
            <tr>
              <td align="left">4 - 3999</td>
              <td align="left">0x0004 - 0x0F9F</td>
              <td align="left">ISO 3166-1 Countries (<xref target="iso3166" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4000 - 4095</td>
              <td align="left">0x0FA0 - 0x0FFF</td>
              <td align="left">Manufacturer Code Authorities (<xref target="irm" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4096 - 16375</td>
              <td align="left">0x1000 - 0x3FFF</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">16376 - 16383</td>
              <td align="left">0x3FF8 - 0x3FFF</td>
              <td align="left">DRIP WG Experimental Use</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true" spacing="normal">
          <li>Note: that the first column of this table is <em>decimal</em> values <strong>not</strong> <em>hexadecimal</em>.</li>
        </ul>
        <t>RAA values of 0 (0x0000) to 3 (0x0003) are reserved to the Apex exclusively.</t>
        <t>The Experimental range of 16376 (0x3FF8) to 16383 (0x3FFF), eight (8) RAAs, is allocated to the DRIP working group itself. 16376 to 16379 are setup by DRIP experts to act as RAAs for potential HDA users to test against. RAA 16376 is already "in use" with <tt>driptesting.org</tt>. 16379 is to be setup as an RAA to act as a MCA <xref target="irm" format="default"/> for UAS manufacturers to test their HDAs against and have their Manufacturer Code properly managed. The rest of the range (16380 to 16383) are reserved to be allocate by the DRIP experts to agencies that wish to test being an RAA.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field, i.e. 16,384 RAAs, of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have a single reserved HDA value: 0 (0x0000) for itself to support various functions or services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contiguous values are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined as "user assigned code elements" without specific claimant predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants.</t>
          <t>How a CAA handles their 4 allocations are out of scope of this document. Control of these values are expected to be claimed by their respective owner. How a claim is vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <ul empty="true" spacing="normal">
            <li>Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces. How this is claimed and handled is out of scope for this document.</li>
          </ul>
        </section>
        <section anchor="irm" numbered="true" toc="default">
          <name>Manufacturer Code Authority (MCA)</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section is either moved to a new document or left here.</li>
          </ul>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an Manufacturer Code used in <xref target="CTA2063A" format="default"/> that is issued by ICAO.</t>
          <t>To manage the large Manufacturer Code space (34 character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the use case. These are the RAA values of 4000 (0x0FA0) up to 4095 (0x0FFF). This allows a single HDA for each Manufacturer Code.</t>
          <t>See <xref target="mra" format="default"/> for the HDA allocation of Manufacturer Codes under these RAAs.</t>
          <ul empty="true" spacing="normal">
            <li>Note: the upper RAAs in the range (4083 to 4095) are not used but are left reserved in this space for future action if required.</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and infrastructure (such as Supplemental Data Service Providers). It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>A primary function of HDAs for DRIP, in the context of UAS RID is the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain it. The Serial Number MUST be protected in a way only the authorized party can decrypt. As part of the UTM system HDAs can also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturer Unmanned Aircraft Authority (MAA)</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section can be moved to the new document or left here.</li>
          </ul>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific Manufacturer Code (assigned to the manufacturer by ICAO). The specific RAA (out of MCA space) and HDA use the following derivation:</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
mfr_int = base34_decode(mfr_code)
hid = (4000 << 14) + mfr_int
mfr_code = base34_encode(hid)
]]></artwork>
          <t>A character in a UAS Serial Number "shall include any combination of digits and uppercase letters, except the letters O and I, but may include all digits" <xref target="CTA2063A" format="default"/>. For HID determination, the character space [0-9,A-H,J-N,P-Z] is mapped to [0-34] to convert the 4 place Base34 Manufacturer Code to Base10 (Note this is different than the Base32 process in Section 4.2 of <xref target="RFC9374" format="default"/>).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="RFC9374" format="default"/>, Section 4.2) and this DIME MUST hold a mapping from the Serial Number to the DET and its artifacts.</t>
        </section>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |     DRIP Identity Management Entity (DIME)          *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent (DPA)  |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent (DIA) |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      | (RDDS)       |  *
*          |             |             |      |              |  *
*  +-------o----------+  |             |      |              |  *
*  | Name Server (NS) |  |             |      |              |  *
*  +------o-----------+  +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface MUST be provided for clients to access. An HTTPS based interface is RECOMMENDED. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="dpa-figure">
          <name>DPA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+
| Registering |
|   Client    |
+------o------+
       |
       | HTTPS
       |
       |
    +--o--+           +-----+
    | DPA o-----------o DIA |
    +--o--+    TBD    +-----+
       |
       |
       | HTTPS or EPP
       |
+------o---+
| Registry |
+----------+
]]></artwork>
        </figure>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="registry-figure">
          <name>Registry Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-----+
    | DPA |
    +--o--+
       |
       | HTTPS or EPP
       |
       |
+------o---+           +-----+
| Registry o-----------o DIA |
+-----o----+    TBD    +-----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +------+
]]></artwork>
        </figure>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
        <figure anchor="ns-figure">
          <name>Name Server Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+-----o----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +--o---+
     |
     |
     | DNS Query/Response
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms (see <xref target="dap" format="default"/>).</t>
        <t>For DRIP, the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information from clients.</t>
        <t>There MUST be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
        <figure anchor="dia-figure">
          <name>DIA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                         +-----+
                         | DPA |
                         +--o--+
                            |
                            |
                            | TBD
                            |
  +----------+    TBD    +--o--+             +------+
  | Registry o-----------o DIA o-------------o RDDS |
  +----------+           +--o--+     TBD     +------+
                            |
                            |
                       RDAP |
                            |
                    +-------o-------+
                    | Lookup Client |
                    +---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
        <figure anchor="rdds-figure">
          <name>RDDS Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
   +-----+
   | DIA |
   +--o--+
      |
      |
      | TBD
      |
  +---o--+
  | RDDS |
  +--o---+
     |
     |
     | RDAP
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <t>Each section has an associated appendix (<xref target="dns-examples" format="default"/>) containing DNS examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section becomes the basis for a new document and is removed from here.</li>
        </ul>
        <t>There are four ways a Serial Number is supported by DRIP:</t>
        <ol spacing="normal" type="1"><li>As a clear-text string with additional information (<xref target="serial-1" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>manufacturer</strong> (for use in authentication) and additional information (<xref target="serial-2" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>user (via an HDA)</strong> (for use in authentication) and additional information (<xref target="serial-3" format="default"/>)</li>
          <li>As an encoding of an HI and associated DET by the <strong>manufacturer</strong> (for use in authentication) with additional information (<xref target="serial-4" format="default"/>)</li>
        </ol>
        <ul empty="true" spacing="normal">
          <li>Note: additional information here refers to any subset of keys defined in <xref target="ua-info-registry" format="default"/>.</li>
        </ul>
        <section anchor="serial-1" numbered="true" toc="default">
          <name>Serial Method 1</name>
          <t>This is where a UA is provisioned with a Serial Number by the manufacturer. The Serial Number is just text string, defined by <xref target="CTA2063A" format="default"/>. The manufacturer runs an Name Server delegated under the Serial Number apex and points to information using a DET RR (filling in only the Serial Number and URI fields).</t>
          <figure anchor="dime-sn1-example">
            <name>Example DIME:MAA with Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information
(b) Success Code
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-2" numbered="true" toc="default">
          <name>Serial Method 2</name>
          <t>This is where a UAS is provisioned with a Serial Number and DET by the manufacturer enabling their devices to use <xref target="drip-auth" format="default"/> and provide additional information. A public mapping of the Serial Number to DET and all public artifacts MUST be provided by the manufacturer. The manufacturer MUST use an MAA for this task.</t>
          <t>The device MAY allow the DET to be regenerated dynamically with the MAA.</t>
          <figure anchor="dime-sn2-example">
            <name>Example DIME:MAA with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) DET RR, PTR RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-3" numbered="true" toc="default">
          <name>Serial Method 3</name>
          <t>This is where a UAS has a Serial Number (from the manufacturer) and the user (via a DIME) has a mechanism to generate and map a DET to the Serial Number after production. This can provide dynamic signing keys for DRIP Authentication Messages via <xref target="drip-auth" format="default"/> for UAS that MUST fly only using Serial Numbers. Registration SHOULD be allowed to any relevant DIME that supports it. A public mapping of the DET to the Serial Number SHOULD be provided.</t>
          <figure anchor="dime-sn3-example">
            <name>Example DIME with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |      DIME                  *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: DIME on UA
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-4" numbered="true" toc="default">
          <name>Serial Method 4</name>
          <t>This is where a UAS manufacturer chooses to use the Serial Number scheme defined in <xref target="RFC9374" format="default"/> to create Serial Numbers, their associated DETs for <xref target="drip-auth" format="default"/> and provide additional information. This document RECOMMENDS that the manufacturer "locks" the device from changing its authentication method so identifiers in both the Basic ID Message and Authentication Message do not de-sync. The manufacturer MUST use an MAA for this task, with the mapping between their Manufacturer Code and the upper portion of the DET publicly available.</t>
          <figure anchor="dime-sn4-example">
            <name>Example DIME:MAA with DRIP Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME:HDA                *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) Operator Information

Note: (c) MAY be requested by the Operator to be omitted due to PII concerns.
]]></artwork>
        </figure>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:HDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: HDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: HDA on UA,
    Generic Endorsement: HDA on UAS
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: HDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: HDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The GCS injects the <tt>Broadcast Endorsement: HDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: HDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    session_context: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based-session-id" numbered="true" toc="default">
          <name>UA Based Session ID</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based-session-id" numbered="true" toc="default">
          <name>UAS Based Session ID</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="RFC9434" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>The delegation of civil aviation authorities to RAAs is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. Since these are public, any entity can stand up an RAA with that value. ICAO SHOULD be the root of trust in a Endorsement or certificate chain that provides validation of any of these specific RAAs, in the ISO RAA range, thus protecting against bad actors standing up fraudulent RAAs. This also ensures DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and regulations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an DET resource record (<xref target="det-rr" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for, depending on what is required: HIP, DET, TLSA, URI, or PTR RRTypes.</t>
        <section anchor="det-rr" numbered="true" toc="default">
          <name>DET Resource Record</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: This section is very much a WIP, comments are welcome.</li>
          </ul>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> DET IN ( DET TYPE STATUS HID [SN] Endorsement )

DET = Base16 DET
TYPE = enumeration of Type of DET
STATUS = enumeration of Status of DET
HID = HID Abbreviation
SN = Serial Number (optional)
Endorsement = Broadcast Endorsement in CBOR encoding
]]></artwork>
          <t>With the SN parameter this covers the "public mapping to DET" when a user/manufacturer already has a Serial Number that can not change and wishes to do DRIP Authentication.</t>
          <section anchor="hid-abbreviation" numbered="true" toc="default">
            <name>HID Abbreviation</name>
            <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>.</t>
            <t>To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters (for each section) in length. Spaces MUST NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
            <t>The concatenation of <tt>{RAA Abbreviation}</tt> and <tt>{HDA Abbreviation}</tt> with a space between them is what fills in the <tt>HID</tt> field of the DET RR in <xref target="det-rr" format="default"/>.</t>
            <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the RAA abbreviation MUST be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3).</t>
            <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver MUST use the uppercase 4-character hexadecimal encoding of the field it is missing.</t>
          </section>
        </section>
      </section>
      <section anchor="serial-numbers-other-uas-id-types" numbered="true" toc="default">
        <name>Serial Numbers &amp; Other UAS ID Types</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section is removed and becomes part of a new document.</li>
        </ul>
        <ul empty="true" spacing="normal">
          <li>Author Note: There MUST be an entry point in DNS for the lookup of UAS Serial Numbers. This section is very much a shot in the dark.</li>
        </ul>
        <t>This document specifies the creation and delegation to ICAO of the subdomain <tt>uas.icao.arpa</tt>. To enable lookup of Serial Numbers a subdomains of <tt>sn.uas.icao.arpa</tt> is maintained. All entries under <tt>sn.uas.icao.arpa</tt> are to follow the convention found in <xref target="sn-fqdn" format="default"/>. This is to enable a singular lookup point for Serial Numbers for UAS.</t>
        <t>Note that other subdomains under <tt>uas.icao.arpa</tt> can be made to support other identifiers in UAS. The creation and use of other such other subdomains are out of scope for this document. The further use and creation of items under <tt>icao.arpa</tt> is the authority of ICAO (which has been delegated control).</t>
        <t>DETs MUST not have a subdomain in <tt>uas.icao.arpa</tt> (such as <tt>det.uas.icao.arpa</tt>) as they fit within the predefined <tt>ip6.arpa</tt> as they are IPv6 addresses.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained envirornments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the Endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific Endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP) [ICAO-IATF-CP-draft]. The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Note ACCP is: ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="delegation-of-nibble-reversed-ipv6-prefix" numbered="true" toc="default">
        <name>Delegation of Nibble Reversed IPv6 Prefix</name>
        <t>For DRIP to function in a interoperable way the easiest way to allow look up of DETs is through the already existing <tt>ip6.arpa</tt> domain structure (as defined in this document). Here IPv6 addresses are nibble reversed and usually have PTR records.</t>
        <t>With DRIP the prefix <tt>2001:30/28</tt> has been allocated by IANA already for DRIP use. However its representative reverse domain in <tt>ip6.arpa</tt> has not.</t>
        <t>There are a number of questions in this area for DRIP:</t>
        <ol spacing="normal" type="1"><li>
            <t>What organization would have administrative control over the nibble-reversed <tt>ip6.arpa</tt> block for <tt>2001:30/28</tt>?
            </t>
            <ul spacing="normal">
              <li>How do they obtain this and from whom?</li>
              <li>What is the SLA between IANA/ICANN and the administrative organization for nibble-reversed <tt>2001:30/28</tt>?</li>
            </ul>
          </li>
          <li>What organization would have technical control (i.e. day to day operations) over the nibble-reversed <tt>ip6.arpa</tt> block for <tt>2001:30/28</tt>?</li>
          <li>
            <t>How are delegation/allocation of further nibble-reversed sub-blocks from <tt>2001:30/28</tt> handled by the administrative organization?
            </t>
            <ul spacing="normal">
              <li>This is partly covered in this document already (Apex-&gt;RAA-&gt;HDA)</li>
              <li>What is the SLA between the administrative organization and sub-organizations given delegations/allocations? This might be more general guidelines than an actual SLA?</li>
            </ul>
          </li>
          <li>What goes into a nibble-reversed <tt>ip6.arpa</tt> domain for DRIP at each level?</li>
        </ol>
        <t>This is not an exhaustive list of questions, this is more to get discussion going.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Registry</name>
          <t>This document requests a new registry for aircraft information fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="endorsement-fields" numbered="true" toc="default">
          <name>Endorsement Fields</name>
          <t>This document requests a new registry for Endorsement fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Endorsement Fields:</dt>
            <dd>
  list of field keys to be used in an Endorsement and what section(s) they can be used in. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Field Name</th>
                <th align="left">Type</th>
                <th align="left">Useable Sections</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">vna</td>
                <td align="left">number</td>
                <td align="left">scope</td>
                <td align="left">Valid Not After, UTC Unix Timestamp</td>
              </tr>
              <tr>
                <td align="left">vnb</td>
                <td align="left">number</td>
                <td align="left">scope</td>
                <td align="left">Valid Not Before, UTC Unix Timestamp</td>
              </tr>
              <tr>
                <td align="left">hhit</td>
                <td align="left">bstr</td>
                <td align="left">identity</td>
                <td align="left">Hierarchial Host Identity Tag (HHIT), fixed size of 16</td>
              </tr>
              <tr>
                <td align="left">hi</td>
                <td align="left">bstr</td>
                <td align="left">identity</td>
                <td align="left">Host Identity (HI)</td>
              </tr>
              <tr>
                <td align="left">sig</td>
                <td align="left">bstr</td>
                <td align="left">signature</td>
                <td align="left">Signature</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-32">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="18" month="September" year="2023"/>
            <abstract>
              <t>   The Drone Remote Identification Protocol (DRIP), plus trust policies
   and periodic access to registries, augments Unmanned Aircraft System
   Remote Identification (UAS RID), enabling local real time assessment
   of trustworthiness of received RID messages and observed UAS, even by
   Observers then lacking Internet access.  This document defines DRIP
   message types and formats to be sent in Broadcast RID Authentication
   Messages to verify that attached and recent detached messages were
   signed by the registered owner of the DRIP Entity Tag (DET) claimed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-32"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-12">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-12"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-02">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="12" month="May" year="2023"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-02"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-07">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-07"/>
        </reference>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .example.com
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.example.com
]]></artwork>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>UAS Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, this section is removed and part of a new document.</li>
        </ul>
        <ul empty="true" spacing="normal">
          <li>{id}.{length}.{manufacturer-code}.{apex}.</li>
        </ul>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .sn.uas.icao.arpa.
Serial: MFR0ADR1P1SC00L
Manufacturer Code: MFR0
Length: A
ID: DR1P1SC00L
FQDN: dr1p1sc00l.a.mfr0.sn.uas.icao.arpa.
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t><tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases. As an example this format is used by <xref target="drip-auth" format="default"/> to support Authentication over F3411 constrained links. <tt>evidence</tt> data is defined by <xref target="drip-auth" format="default"/> for DRIP Wrapper, Manifest and Frame formats.</t>
      </section>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {

        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatination of a child entities (e.g. a UA) HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <ul empty="true" spacing="normal">
        <li>Author Note: with the proposal to remove solving the issue of putting Serial Numbers into DNS from this document, Serial Numbers section is removed and part of a new document.</li>
      </ul>
      <section anchor="dns-s1" numbered="true" toc="default">
        <name>Serial Method 1</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example1.8 IN URI ( https://example.com/sn/EXAMPLE1 )
]]></artwork>
      </section>
      <section anchor="dns-s2" numbered="true" toc="default">
        <name>Serial Method 2</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example2.8 IN DET ( 5 20010033e872f705f3ce91124b677d65 ... "MFR MFR0" MFR08EXAMPLE2 https://example.com/sn/EXAMPLE2 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
6.5.d.7.7.6.b.4.2.1.1.9.e.c.3.f.5.0 IN PTR example2.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-s3" numbered="true" toc="default">
        <name>Serial Method 3</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example3.8 IN DET ( 5 20010033e872f70584b1fa2b70421112 ... "MFR MFR0" MFR08EXAMPLE3 https://example.com/sn/EXAMPLE3 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
2.1.1.1.2.4.0.7.b.2.a.f.1.b.4.8.5.0 IN PTR example3.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-s4" numbered="true" toc="default">
        <name>Serial Method 4</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example4.8 IN DET ( 5 20010033e872f705ba8af5252a35030e ... "MFR MFR0" MFR08EXAMPLE4 https://example.com/sn/EXAMPLE4 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN PTR example4.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-op" numbered="true" toc="default">
        <name>Operator</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0000.3ffe.2001003.hhit.arpa
ba8af5252a35030e.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff800005ba8af5252a35030e ... "TEST DRIP" null https://example.com/operator/* ... active )

@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN PTR ba8af5252a35030e.05.0000.3ffe.2001003.hhit.arpa
]]></artwork>
      </section>
      <section anchor="dns-sid" numbered="true" toc="default">
        <name>Session ID</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0000.3ffe.2001003.hhit.arpa
b6ce935b616306d4.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff800005b6ce935b616306d4 ... "TEST DRIP" null https://example.com/session/* ... active )

@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN PTR b6ce935b616306d4.05.0000.3ffe.2001003.hhit.arpa
]]></artwork>
      </section>
      <section anchor="dns-child" numbered="true" toc="default">
        <name>Child DIME</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
RAA:
@ORIGIN 8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
0.0.0 IN NS 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa

HDA:
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN PTR 4e486394a60bb669.05.0000.3ffe.2001003.hhit.arpa

@ORIGIN 0000.3ffe.2001003.hhit.arpa
4e486394a60bb669.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff8000054e486394a60bb669 ... "TEST DRIP" null https://example.com/session/* ... active )
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
