<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-14" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-14"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="December" day="04"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>While it is expected that DRIP Identity Management Entity (DIME) functions will be integrated with UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>), who will provide DIME-like functions is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential DIME-like functions (including the management of identifiers (such as the DRIP Entity Tag (DET))) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="RFC9434" format="default"/>) or Network RID (Section 1.2.2 of <xref target="RFC9434" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="RFC9434" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET (Section 9.5 of <xref target="RFC9374" format="default"/>). Forgery of a DET is still possible, but including it as a part of a public registration mitigates this risk.</t>
      <t>This document creates the DRIP registration and discovery ecosystem focusing on the DET. This SHOULD support all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS) that can use a DET.</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a DET <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry (e.g. DNS) within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number (Section 4.2 of <xref target="RFC9374" format="default"/>). This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA's direct HDA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="RFC9434" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these initial roles (some highly specialized and predetermined for the UAS use case) are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   o--------.
                +-o------o-+        |
                  |      |          |
******************|******|**********|******************
                  |      |          |
            +-----o-+  +-o-----+  +-o-----+
RAAs        |  MCA  |  |  INN  |  |  RAA  |
            +---o---+  +---o---+  +---o---+
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  |  HDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the values of RAA=0-3 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex is the owner of the IPv6 prefix portion of the DET associated with it (2001:30/28) which is assigned by IANA from the special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. Allocations of RAAs SHOULD be done in contiguous groups of 4.</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">RAA Decimal Range</th>
              <th align="left">RAA Hex Range</th>
              <th align="left">Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 - 3</td>
              <td align="left">0x0000 - 0x0003</td>
              <td align="left">Apex</td>
            </tr>
            <tr>
              <td align="left">4 - 3999</td>
              <td align="left">0x0004 - 0x0F9F</td>
              <td align="left">ISO 3166-1 Countries (<xref target="iso3166" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4000 - 16375</td>
              <td align="left">0x1000 - 0x3FFF</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">16376 - 16383</td>
              <td align="left">0x3FF8 - 0x3FFF</td>
              <td align="left">DRIP WG Experimental Use</td>
            </tr>
          </tbody>
        </table>
        <!-- | 4000 - 4095       | 0x0FA0 - 0x0FFF | Manufacturer Code Authorities ({{irm}}) | -->

<ul empty="true" spacing="normal">
          <li>Note: that the first column of this table is <em>decimal</em> values <strong>not</strong> <em>hexadecimal</em>.</li>
        </ul>
        <t>RAA values of 0 (0x0000) to 3 (0x0003) are reserved to the Apex exclusively.</t>
        <t>The Experimental range of 16376 (0x3FF8) to 16383 (0x3FFF), eight (8) RAAs, is allocated to the DRIP working group itself. 16376 to 16379 are setup by DRIP experts to act as RAAs for potential HDA users to test against. RAA 16376 is already "in use" with <tt>driptesting.org</tt>. The rest of the range (16377 to 16383) are reserved to be allocate by the DRIP experts to agencies that wish to test.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field, i.e. 16,384 RAAs, of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have a single reserved HDA value: 0 (0x0000) for itself to support various functions or services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contiguous values (<tt>raa_code + 0</tt>, <tt>raa_code + 1</tt>, <tt>raa_code + 2</tt> and <tt>raa_code + 3</tt>) are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <!-- A table of current ISO 3166-1 countries and their RAA allocations are found in {{inn-allocations}}. -->

<t>It should be noted that the range of codes from 900 to 999 are defined as "user assigned code elements" without specific claimant predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants.</t>
          <t>How a CAA handles their 4 allocations are out of scope of this document. Control of these values are expected to be claimed by their respective owner. How a claim is vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <ul empty="true" spacing="normal">
            <li>Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces. How this is claimed and handled is out of scope for this document.</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and infrastructure (such as Supplemental Data Service Providers). It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>A primary function of HDAs for DRIP, in the context of UAS RID is the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain it. The Serial Number MUST be protected in a way only the authorized party can decrypt. As part of the UTM system HDAs can also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |     DRIP Identity Management Entity (DIME)          *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent (DPA)  |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent (DIA) |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      | (RDDS)       |  *
*          |             |             |      |              |  *
*  +-------o----------+  |             |      |              |  *
*  | Name Server (NS) |  |             |      |              |  *
*  +------o-----------+  +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface MUST be provided for clients to access. An HTTPS based interface is RECOMMENDED. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="dpa-figure">
          <name>DPA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+
| Registering |
|   Client    |
+------o------+
       |
       | HTTPS
       |
       |
    +--o--+           +-----+
    | DPA o-----------o DIA |
    +--o--+    TBD    +-----+
       |
       |
       | HTTPS or EPP
       |
+------o---+
| Registry |
+----------+
]]></artwork>
        </figure>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="registry-figure">
          <name>Registry Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-----+
    | DPA |
    +--o--+
       |
       | HTTPS or EPP
       |
       |
+------o---+           +-----+
| Registry o-----------o DIA |
+-----o----+    TBD    +-----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +------+
]]></artwork>
        </figure>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
        <figure anchor="ns-figure">
          <name>Name Server Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+-----o----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +--o---+
     |
     |
     | DNS Query/Response
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms (see <xref target="dap" format="default"/>).</t>
        <t>For DRIP, the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information from clients.</t>
        <t>There MUST be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
        <figure anchor="dia-figure">
          <name>DIA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                         +-----+
                         | DPA |
                         +--o--+
                            |
                            |
                            | TBD
                            |
  +----------+    TBD    +--o--+             +------+
  | Registry o-----------o DIA o-------------o RDDS |
  +----------+           +--o--+     TBD     +------+
                            |
                            |
                       RDAP |
                            |
                    +-------o-------+
                    | Lookup Client |
                    +---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
        <figure anchor="rdds-figure">
          <name>RDDS Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
   +-----+
   | DIA |
   +--o--+
      |
      |
      | TBD
      |
  +---o--+
  | RDDS |
  +--o---+
     |
     |
     | RDAP
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <t>Each section has an associated appendix (<xref target="dns-examples" format="default"/>) containing DNS examples.</t>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME:HDA                *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) Operator Information

Note: (c) MAY be requested by the Operator 
      to be omitted due to PII concerns.
]]></artwork>
        </figure>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:HDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: HDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: HDA on UA,
    Generic Endorsement: HDA on UAS
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: HDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: HDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The GCS injects the <tt>Broadcast Endorsement: HDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: HDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    session_context: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based-session-id" numbered="true" toc="default">
          <name>UA Based Session ID</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based-session-id" numbered="true" toc="default">
          <name>UAS Based Session ID</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR, DET RR, TLSA RR, URI RR, PTR RR
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="RFC9434" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>The delegation of civil aviation authorities to RAAs is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. Since these are public, any entity can stand up an RAA with that value. ICAO SHOULD be the root of trust in a Endorsement or certificate chain that provides validation of any of these specific RAAs, in the ISO RAA range, thus protecting against bad actors standing up fraudulent RAAs. This also ensures DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and regulations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an DET resource record (<xref target="det-rr" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for, depending on what is required: HIP, DET, TLSA, URI, or PTR RRTypes.</t>
        <section anchor="det-rr" numbered="true" toc="default">
          <name>DET Resource Record</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: This section is very much a WIP, comments are welcome.</li>
          </ul>
          <t>The DET Resource Record is a metadata record for various bits of DRIP specific information that isn't available in pre-existing DNS RR Types (such as URI or HIP).</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> DET IN ( DET TYPE STATUS HID SN Endorsement )

DET = Base16 DET
TYPE = enumeration of Type of DET
STATUS = enumeration of Status of DET
HID = HID Abbreviation
SN = Serial Number
Endorsement = Broadcast Endorsement
]]></artwork>
          <section anchor="rr-type" numbered="true" toc="default">
            <name>Type</name>
            <t>This field is a single byte with values defined in <xref target="det-type" format="default"/>.</t>
            <t>It is envisioned that there may be many types of DETs in use. In some cases it may be helpful to understand the DETs role in the ecosystem like described in <xref target="drip-dki" format="default"/>.</t>
          </section>
          <section anchor="rr-status" numbered="true" toc="default">
            <name>Status</name>
            <t>This field is a single byte with values defined in <xref target="det-status" format="default"/>.</t>
            <t>A DET can go through various states during its life-cycle in the ecosystem. It is helpful for a querant to understand the current status as a further requirement for verification.</t>
          </section>
          <section anchor="rr-hid" numbered="true" toc="default">
            <name>HID Abbreviation</name>
            <t>This field is an fixed length ASCII encoded string of 20 bytes null padded. When not included the field MUST be filled with nulls.</t>
            <t>The specific contents of this field are not defined here, but a recommendation/example can be found in <xref target="hid-abbreviation" format="default"/>.</t>
          </section>
          <section anchor="rr-sn" numbered="true" toc="default">
            <name>Serial Number</name>
            <t>This field is an fixed length ASCII encoded string of 20 bytes null padded <xref target="CTA2063A" format="default"/>. When not included the field MUST be filled with nulls.</t>
            <t>This covers the "public mapping to DET" when a user/manufacturer already has a Serial Number that can not change and wishes to do DRIP Authentication.</t>
          </section>
          <section anchor="rr-endorsement" numbered="true" toc="default">
            <name>Endorsement</name>
            <t>This field is the binary encoded Broadcast Endorsement (<xref target="be" format="default"/>) of the DET. This object is a fixed length of 136 bytes.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained environments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the Endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific Endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP). The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Authors Note: ACCP is ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>The CBOR Encoded X.509 Certificates (C509 Certificates) <xref target="cbor-cert" format="default"/> provides a standards-based approach to reduce the size of X.509 certificates both on-the-wire and in storage. The PKI-Lite RAA certificate example in Appendix B.2 is 331 bytes. The matching C509 certificate is 183 bytes. This sort of difference may have significant impact both on UAS storage requirements and over-the-air transmission impact.</t>
        <t>C509 provides two approaches for encoding X.509:</t>
        <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280" format="default"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
          <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
        </ol>
        <t>The invertible CBOR encoding may be sufficient for most needs. The CBOR objects clearly indicate which approach was used, so that the receiver can properly process the C509 object. For interoperability in DRIP, it is recommended that invertible CBOR encoding be used.</t>
        <t>Using the invertible CBOR encoding is achieved through in-line libraries that convert in the desired direction. Since it is not expected that DNS protocols to implement this conversion, the DET RR SHOULD contain the normal X.509 DER encoding. The CBOR encoding MAY be used, but operational experience will be needed to see if there are measurable gains in doing so.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="delegation-of-nibble-reversed-ipv6-prefix" numbered="true" toc="default">
        <name>Delegation of Nibble Reversed IPv6 Prefix</name>
        <t>For DRIP to function in a interoperable way the easiest way to allow look up of DETs is through the already existing <tt>ip6.arpa</tt> domain structure (as defined in this document). Here IPv6 addresses are nibble reversed and usually have PTR records.</t>
        <t>With DRIP the prefix <tt>2001:30/28</tt> has been allocated by IANA already for DRIP use. However its representative reverse domain in <tt>ip6.arpa</tt> has not.</t>
        <t>There are a number of questions in this area for DRIP:</t>
        <ol spacing="normal" type="1"><li>
            <t>What organization would have administrative control over the nibble-reversed <tt>ip6.arpa</tt> block for <tt>2001:30/28</tt>?
            </t>
            <ul spacing="normal">
              <li>How do they obtain this and from whom?</li>
              <li>What is the SLA between IANA/ICANN and the administrative organization for nibble-reversed <tt>2001:30/28</tt>?</li>
            </ul>
          </li>
          <li>What organization would have technical control (i.e. day to day operations) over the nibble-reversed <tt>ip6.arpa</tt> block for <tt>2001:30/28</tt>?</li>
          <li>
            <t>How are delegation/allocation of further nibble-reversed sub-blocks from <tt>2001:30/28</tt> handled by the administrative organization?
            </t>
            <ul spacing="normal">
              <li>This is partly covered in this document already (Apex-&gt;RAA-&gt;HDA)</li>
              <li>What is the SLA between the administrative organization and sub-organizations given delegations/allocations? This might be more general guidelines than an actual SLA?</li>
            </ul>
          </li>
          <li>What goes into a nibble-reversed <tt>ip6.arpa</tt> domain for DRIP at each level?</li>
        </ol>
        <t>This is not an exhaustive list of questions, this is more to get discussion going.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="endorsement-fields" numbered="true" toc="default">
          <name>Endorsement Fields</name>
          <t>This document requests a new registry for Endorsement fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Endorsement Fields:</dt>
            <dd>
  list of field keys to be used in an Endorsement and what section(s) they can be used in. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Field Name</th>
                <th align="left">Type</th>
                <th align="left">Useable Sections</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">vna</td>
                <td align="left">number</td>
                <td align="left">scope</td>
                <td align="left">Valid Not After, UTC Unix Timestamp</td>
              </tr>
              <tr>
                <td align="left">vnb</td>
                <td align="left">number</td>
                <td align="left">scope</td>
                <td align="left">Valid Not Before, UTC Unix Timestamp</td>
              </tr>
              <tr>
                <td align="left">hhit</td>
                <td align="left">bstr</td>
                <td align="left">identity</td>
                <td align="left">Hierarchial Host Identity Tag (HHIT), fixed size of 16</td>
              </tr>
              <tr>
                <td align="left">hi</td>
                <td align="left">bstr</td>
                <td align="left">identity</td>
                <td align="left">Host Identity (HI)</td>
              </tr>
              <tr>
                <td align="left">sig</td>
                <td align="left">bstr</td>
                <td align="left">signature</td>
                <td align="left">Signature</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="det-type" numbered="true" toc="default">
          <name>DET Type</name>
          <t>This document requests a new registry for DET Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>DET Type:</dt>
            <dd>
  numeric, 8 bit, field of the DET RR to encode the DET Type. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Type</th>
                <th align="left">Value</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Not Defined</td>
                <td align="left">0</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Endpoint Entity (EE)</td>
                <td align="left">1</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Issuer CA</td>
                <td align="left">2</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Authentication CA</td>
                <td align="left">3</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="det-status" numbered="true" toc="default">
          <name>DET Status</name>
          <t>This document requests a new registry for DET Status under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>DET Status:</dt>
            <dd>
  numeric, 8 bit, field of the DET RR to encode the DET Status. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Status</th>
                <th align="left">Value</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Not Defined</td>
                <td align="left">0</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Inactive</td>
                <td align="left">1</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Active</td>
                <td align="left">2</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="public-key-exposure" numbered="true" toc="default">
      <name>Public Key Exposure</name>
      <t>DETs are built upon asymmetric keypairs. As such the public key must be revealed to enable clients to perform signature verifications.</t>
      <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (using the HIP RR) until it is required.</t>
      <t>Optimally this requires the UAS somehow signal the DIME that a flight using a specific Session ID is underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-41">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="4" month="December" year="2023"/>
            <abstract>
              <t>   The Drone Remote Identification Protocol (DRIP), plus trust policies
   and periodic access to registries, augments Unmanned Aircraft System
   (UAS) Remote Identification (RID), enabling local real time
   assessment of trustworthiness of received RID messages and observed
   UAS, even by Observers then lacking Internet access.  This document
   defines DRIP message types and formats to be sent in Broadcast RID
   Authentication Messages to verify that attached and recent detached
   messages were signed by the registered owner of the DRIP Entity Tag
   (DET) claimed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-41"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-13">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="19" month="September" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Uncrewed Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-13"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-02">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="12" month="May" year="2023"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-02"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-09">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="cbor-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-07">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="20" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
        </reference>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="hid-abbreviation" numbered="true" toc="default">
      <name>HID Abbreviation Recommendation</name>
      <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>.</t>
      <t>To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters (for each section) in length. Spaces MUST NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
      <t>The concatenation of <tt>{RAA Abbreviation}</tt> and <tt>{HDA Abbreviation}</tt> with a space between them can be what fills in the <tt>HID</tt> field of the DET RR in <xref target="det-rr" format="default"/>.</t>
      <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the RAA abbreviation SHOULD be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3). A common abbreviation for an RAAs four allocated RAA values are out of scope. Other documents such as <xref target="drip-dki" format="default"/> may have more specific recommendations or requirements.</t>
      <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver MUST use the uppercase 4-character hexadecimal encoding of the field it is missing when using this form.</t>
    </section>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .example.com
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.example.com
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t><tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases. As an example this format is used by <xref target="drip-auth" format="default"/> to support Authentication over F3411 constrained links. <tt>evidence</tt> data is defined by <xref target="drip-auth" format="default"/> for DRIP Wrapper, Manifest and Frame formats.</t>
      </section>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {

        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatenation of a child entities (e.g. a UA) DET/HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <section anchor="dns-op" numbered="true" toc="default">
        <name>Operator</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN DET 
( 2001003fff800005ba8af5252a35030e 0 1 "TEST DRIP" "" ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN HIP 
( 5 2001003fff800005ba8af5252a35030e ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN URI 
( https://example.com/operator/* )
]]></artwork>
      </section>
      <section anchor="dns-sid" numbered="true" toc="default">
        <name>Session ID</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN DET 
( 2001003fff800005b6ce935b616306d4 0 1 "TEST DRIP" "" ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN HIP 
( 5 2001003fff800005b6ce935b616306d4 ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN URI 
( https://example.com/session/* )
]]></artwork>
      </section>
      <section anchor="dns-child" numbered="true" toc="default">
        <name>Child DIME</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
RAA:
@ORIGIN 8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
0.0.0 IN NS 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa

HDA:
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN DET 
( 2001003fff8000054e486394a60bb669 0 1 "TEST DRIP" "" ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN HIP 
( 5 2001003fff8000054e486394a60bb669 ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN URI 
( https://example.com/dime/* )
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
