<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-06" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-06"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="17"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS technologies and practices. Discovery of DETs and their artifacts are through the existing DNS structure and methods by using FQDNs. A general overview of the interfaces required between components is described in this document with supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an endorsement from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>See <xref target="RFC9153" format="default"/> for common DRIP terms and <xref target="drip-arch" format="default"/> Section 2.2 for additional terms used in this document.</t>
        <t>HDA:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchial HIT Domain Authority. The 14 bit field identifying the HIT Domain Authority under a RAA.</li>
        </ul>
        <t>HID:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchy ID. The 28 bit field providing the HIT Hierarchy ID.</li>
        </ul>
        <t>PII:</t>
        <ul empty="true" spacing="normal">
          <li>Personally Identifiable Information. Any information a cognizant authority (such as a government agency) or a user requires differentiated access to obtain.</li>
        </ul>
        <t>RAA:</t>
        <ul empty="true" spacing="normal">
          <li>Registered Assigning Authority. The 14 bit field identifying the Hierarchical HIT Assigning Authority.</li>
        </ul>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t>The DRIP Identity Management Entity (DIME) is an entity encompassed various logical components (<xref target="dime-arch" format="default"/>) and can be classified to serve a number of different roles (this section). The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>Registry Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The apex is special DIME role that holds the value of RAA=0 and HDA=0. It serves as the branch point from the larger DNS system in which HHITs are defined. The Apex generally has prefix portions of the HHIT associated with it (such as 2001:0030/28) which are assigned by IANA from the non-routable special IPv6 address space for ORCHIDs (where HHITs are derived from).</t>
        <t>The Apex manages all delegations and allocations of the HHIT's RAA to various parties with NS records to redirect DNS queries to proper sub-branches.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of an HHIT). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>For DRIP and the UAS use case ICAO will handle the registration of RAAs. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>&lt;prefix&gt;.hhit.arpa.</tt> DNS zone for the RAA.</t>
        <t>As DETs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
        <section anchor="irm" numbered="true" toc="default">
          <name>ICAO Registry of Manufacturers (IRM)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in <xref target="CTA2063A" format="default"/>.</t>
          <t>To manage the large ICAO Manufacturer Code space (34  character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the DRIP use case. These are the RAA values of 2 (0x0002) up to 96 (0x0060). This allows a single HDA for each Manufacturer Code.</t>
          <t>All IRM's have two reserved HDA values. 0 (0x0000) for itself in its role as an RAA and 1 (0x0001) if it wishes to offer HDA services.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturers Registry of Aircraft (MRA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
          </section>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces SHOULD NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>). For RAAs the abbreviation is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA.</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver SHOULD use the hexadecimal encoding of the field it is missing.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <figure anchor="dime-arch-fig">
        <name>Registry Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+------------o-------+
             |
*************|*************************************************************************
*            |               DRIP Identity Management Entity                          *
*            |                                                                        *
*     +------o-------+              +-------------+              +--------------+     *
*     | DRIP         |              |             |              |              |     *
*     | Provisioning o--------------o             |              |              |     *
*     | Agent        |              |             |              |              |     *
*     +-------o------+              |             |              |              |     *
*             |                     |             |              |              |     *
*             |                     | DRIP        |              | Registration |     *
*     +-------o--+                  | Information o--------------o Data         |     *
*     | Registry o------------------o Agent       |              | Directory    |     *
*     +-------o--+                  |             |              | Service      |     *
*             |                     |             |              |              |     *
*             |                     |             |              |              |     *
*     +-------o-----+               |             |              |              |     *
*     | Name Server |               |             |              |              |     *
*     +------o------+               +-----o-------+              +------o-------+     *
*            |                            |                             |             * 
*            |                            |                             |             *
*************|****************************|*****************************|**************
             |                            |                             |
             |                    +-------o-------+                     |
             '--------------------o Lookup Client o---------------------'
                                  +---------------+
]]></artwork>
      </figure>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that perform specific functions. Any of these components in <xref target="dime-arch" format="default"/> could be delegated to other entities as a service both co-located or remote. For example the Name Server component could be handled by a well established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them. Another common example may be the DPA, Registry and Name Server are all co-located in one implementation with an interface to a DRIP Information Agent (DIA) offered by another organization.</t>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information (such as the DRIP Endorsements) coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON or CBOR encoding of objects being sent to the DPA. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records which use the DRIP FQDNs (<xref target="drip-fqdn" format="default"/>).</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The specifications of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if as RAA.</t>
        <t>Most of time is probably outsourced.</t>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA via a SVR RR to obtain information not available via DNS.</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms. As an example the Serial Number, under the FAA, is classified as PII and can only be accessed by federal entities (such as the FAA themselves).</t>
        <t>For DRIP the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON/CBOR encoding of objects being sent to the DIA. There MUST also be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Both of these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope as they are typically implementation specific.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with required/optional resource records using the FQDN</li>
        <li>Populate DIA/RDDS with PII and other info</li>
        <li>Generate and return required/optional Endorsements/Certificates</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using component abbreviations is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>Primarily registered to MRA's (<xref target="mra" format="default"/>) by the Manufacturers. Could be also registered to CAA's (using their HDA functionality) as part of Operator registration or to USS's in their capacity as HDAs. In the later two cases no DNS RRs are made to protect the privacy of the registering parties.</t>
        <t>When the Serial Number is really an encoded DET the DET FQDN is used to point to HIP and CERT RRs rather than the Serial Number FQDN. Instead a CNAME is made between the Serial Number FQDN and the DET FQDN. The same can still happen if the manufacturer chooses to use their own Serial Number formatting (still within the specification of <xref target="CTA2063A" format="default"/>) and create the CNAME back to a DET loaded into the unmanned aircraft.</t>
        <figure anchor="dime-sn-example">
          <name>Example DIME:MRA with Serial Number (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MRA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number, UA Information, UA Self-Endorsement
(b) Success Code, Broadcast Endorsement: MRA on UA
(c) HIP RR, CERT RRs
(d) UA Information
]]></artwork>
        </figure>
        <t>The unmanned aircraft, intending to use DRIP, generates a keypair, DET and <tt>Self-Endorsement: UA</tt> using the RAA and HDA values specified by the manufacturers DIME (running as an MRA). The DET is converted into a Serial Number (per <xref target="drip-rid" format="default"/>) or the manufacturer creates their own Serial Number.</t>
        <t>The Serial Number, UA information and the <tt>Self-Endorsement: UA</tt> are sent to the manufacturers DIME. The DIME validates the Self-Endorsement and checks for DET and HI collisions in the Name Server/DIA. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated which is provisioned into the aircraft for use when using the Serial Number as its UAS ID. In the Name Server HIP RRs are created using the DET FQDN while a CNAME points the Serial Number FQDN to the DET FQDN.</t>
        <ul empty="true" spacing="normal">
          <li>Note: <xref target="dime-sn-example" format="default"/> is specific for a DET encoded Serial Number. The Endorsements in (a) and (b) as well as RRs in (c) would not be present for non-DET based Serial Numbers.</li>
        </ul>
        <t>Additional UA Information has a set of valid item keys defined in <xref target="ua-info-registry" format="default"/>. The items present for a given interaction is defined by future documents, local regulations and implementation specific details/capabilities.</t>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information, Operator Self-Endorsement
(b) Success Code, Generic Endorsement: HDA on Operator
(c) HIP RR, CERT RRs
(d) Operator Information
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in <xref target="drip-rid" format="default"/> along with a self-signed endorsement (<tt>Self-Endorsement: Operator</tt>). The RAA and HDA values used in the DET generation for the Operator are found by referencing their selected DIME of choice (in <xref target="dime-operator-example" format="default"/> an HDA).</t>
        <t>The self-signed endorsement along with other relevant information (such as Operator PII) is sent to the DIME over a secure channel. The specification of this secure channel is out of scope for this document.</t>
        <t>The DIME cross checks any personally identifiable information as required. <tt>Self-Endorsement: Operator</tt> is verified. The DET and HI is searched in the DIME DIA and Name Server to confirm that no collisions occur. A new endorsement is generated (<tt>Generic Endorsement: DIME on Operator</tt>) and sent securely back to the Operator. Resource Records for the HI and Endorsements are added to the DIME Registry/Name Server.</t>
        <t>With the receipt of <tt>Generic Endorsement: DIME on Operator</tt> the registration of the Operator is complete.</t>
        <ul empty="true" spacing="normal">
          <li>Note: (c) in <xref target="dime-operator-example" format="default"/> MAY be requested by the Operator to be omitted due to PII concerns.</li>
        </ul>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically RIDRs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:RIDR with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RIDR              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: RIDR on GCS, Generic Endorsement: GCS on UA, Session ID Information
(b) Success Code, Broadcast Endorsement: RIDR on UA, Generic Endorsement: RIDR on UAS
(c) HIP RR, CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and Self-Endorsement: UA. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: RIDR on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: RIDR on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The DIME validates all the endorsements and checks for DET and HI collisions in the Name Server/DIA using the proposed UA DET. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated. An <tt>Generic Endorsement: RIDR on UAS</tt> is generated using the <tt>Generic Endorsement: GCS on UA</tt>. HIP and CERT RRs are provisioned into the Registry/Name server. Both endorsements are back to the GCS on a secure channel.</t>
        <t>The GCS then injects the <tt>Broadcast Endorsement: RIDR on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: RIDR on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There MAY be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the posession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>TODO</t>
      </section>
    </section>
    <section anchor="differentiated-access-process" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>High level explanation of differentiated access goals and requirements.</t>
    </section>
    <section anchor="drip-in-the-domain-name-system" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the DET detail response.</t>
      <t>DNSSEC is strongly recommended (especially for RAA-level zones). Frequency of updates, size of the zone, and registry policy may impact its use.</t>
      <t>Per <xref target="drip-arch" format="default"/> all public information is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>. CERT RRs (<xref target="cert" format="default"/>) contain public Endorsements or X.509 Certificate relevant to a given Session ID. SVR RRs (<xref target="svr" format="default"/>) point an Observer to a service to obtain further information if they have and can prove duly constituted authority.</t>
      <section anchor="prefix-to-tld-mapping" numbered="true" toc="default">
        <name>Prefix to TLD Mapping</name>
        <t>For DRIP, the prefix <tt>2001:0030/28</tt> is slated for DETs being used in UAS. Other prefixes may be allocated by IANA in future for different use cases that do not fit cleanly into an existing prefix.</t>
        <t>IANA registry for this?</t>
        <t>If so we could remove prefix from FQDN form...Stu would like this to happen</t>
      </section>
      <section anchor="drip-fqdn" numbered="true" toc="default">
        <name>DRIP Fully Qualified Domain Names</name>
        <section anchor="det-fqdn" numbered="true" toc="default">
          <name>DRIP Entity Tag</name>
          <section anchor="forward-lookup" numbered="true" toc="default">
            <name>Forward Lookup</name>
            <t>The DET has the following FQDN form:</t>
            <ul empty="true" spacing="normal">
              <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.hhit.arpa.</li>
            </ul>
            <t>When building a DET FQDN the following two things must be done:</t>
            <ol spacing="normal" type="1"><li>The RAA, HDA and OGA ID values MUST be converted from hexadecimal to decimal form.</li>
              <li>The FQDN must be built using the exploded (all padding present) form of the IPv6 address.</li>
            </ol>
            <t>Below is an example:</t>
            <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 2001003
FQDN: a3ad19520ad0a69e.5.20.10.2001003.hhit.arpa.
]]></artwork>
            <ul empty="true" spacing="normal">
              <li>Note: any of the fields in the FQDN could be CNAME'd to more human readable interpretations. For example the DET FQDN <tt>204.2001003.hhit.arpa.</tt> may have a CNAME to <tt>uas.faa.gov</tt>; if RAA 204 was delegated to the FAA.</li>
            </ul>
          </section>
          <section anchor="reverse-lookup" numbered="true" toc="default">
            <name>Reverse Lookup</name>
            <t>The DET reverse lookup should be a standard IPv6 reverse address in <tt>ip6.arpa.</tt>.</t>
            <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
            <!-- TODO: make this a MUST, do not use PTR but instead required RRs for DRIP (HIP, TLSA, CERT, etc.) -->

</section>
        </section>
        <section anchor="sn-fqdn" numbered="true" toc="default">
          <name>Serial Number</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.8653.mfr.hhit.arpa.
]]></artwork>
          <t>Serial Number pose a unique problem. If we explicitly only allow HHITs be under the <tt>hhit.arpa.</tt> domain structure how do we standardize the lookup of Serial Numbers? Perhaps to look up Serial Numbers one must go to a different tree like <tt>mfr.icao.int.</tt>? We can have CNAMEs in MRAs for this but they probably need the same TLD (<tt>hhit.arpa.</tt>) to be found properly and these are clearly not HHITs.</t>
          <t>Serial Numbers MAY be a direct encoding of a DET (as defined in Section 4.2 of <xref target="drip-rid" format="default"/>). A Serial Number MAY also be a simple linking to a DET using a CNAME. DNAMEs (or PTRs) could be used to redirect a Serial Number that is not part of an public MRA but is instead registered by the operator to their HDA. The operator in this scenario MAY generate a DET for the Serial Number themselves - also stored in the HDA. The mapping of the Serial Number to this 'private' DET MUST NOT be made public.</t>
        </section>
      </section>
      <section anchor="supported-dns-records" numbered="true" toc="default">
        <name>Supported DNS Records</name>
        <section anchor="hip" numbered="true" toc="default">
          <name>HIP</name>
          <t>All DIMEs will use HIP RR <xref target="RFC8005" format="default"/> as the primary public source of DET HIs. The DETs are encoded in an FQDN (<xref target="det-fqdn" format="default"/>) and are the lookup key (QNAME) for the RR. DIMEs have their own DET associated with them and their respective name server will hold a HIP RR that is pointed to by their DET FQDN.</t>
          <t>MRA (<xref target="mra" format="default"/>) and RIDR (<xref target="ridr" format="default"/>) DIMEs will also have HIP RRs for their registered parties (aircraft and operators respectfully).</t>
        </section>
        <section anchor="tlsa" numbered="true" toc="default">
          <name>TLSA</name>
          <t>This RR, <xref target="RFC6698" format="default"/>, is mainly used to support DTLS deployments where the DET is used (e.g. Network RID and the wider UTM system). The HI is encoded using the SubjectPublicKeyInfo selector. DANE <xref target="RFC6698" format="default"/> is for servers, DANCE <xref target="dane-clients" format="default"/> is for clients.</t>
          <t>The TLSA RR MAY be used in place of the HIP RR, where to primary need of the DET HI is for DTLS authentication. This DNS server side optimization is for where the overhead of both RR is onerous. Thus all clients that work with the HIP RR SHOULD be able to able to extract the HI from the TLSA RR.</t>
        </section>
        <section anchor="cert" numbered="true" toc="default">
          <name>CERT</name>
          <t>Endorsements can be placed into DNS in the CERT RRs <xref target="RFC4398" format="default"/>.</t>
          <t>Endorsements will be stored in Certificate Type OID Private (value 254) with a base OID of <tt>1.3.6.1.4.1.6715.2</tt> and further classified by the Endorsement/Certificate Type and then Entities involved.</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Endorsement Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Self-Endorsement</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Generic Endorsement</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Concise Endorsement</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Mutual Endorsement</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">Link Endorsement</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Entity Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Unmanned Aircraft (UA)</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Operator (OP)</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HDA</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">RAA</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Root</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <t>As an example the following OID: <tt>1.3.6.1.4.1.6715.2.6.4.1</tt> would decompose into: the base OID (<tt>1.3.6.1.4.1.6715.2</tt>), the Endorsement Type (<tt>6</tt>: Broadcast Endorsement) and then the parties involved (<tt>4</tt>: HDA, <tt>1</tt>: UA)</t>
          <t>Certificate Type X.509 as per PKIX (value 1) MAY be used to store X.509 certificates as discussed in (Appendix B).</t>
          <t>Editor Note: This OID is an initial allocation under the IANA Enterprise Number OID. It is expect that a general OID will be allocated at some point.</t>
          <!-- TODO: in very informal discussions with Russ ? at IETF115 the concept of a CBOR CERT RR was not considered a terrible idea and would be more flexible than using OIDs. We should talk to Carsten about this. -->

</section>
        <section anchor="ns" numbered="true" toc="default">
          <name>NS</name>
          <t>Used to interconnect entities</t>
        </section>
        <section anchor="svr" numbered="true" toc="default">
          <name>SVR</name>
          <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
          <t>The best example of this is RIDR (<xref target="ridr" format="default"/>) would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA (<xref target="mra" format="default"/>) has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
          <t>In all cases the server being pointed to MUST be protected using AAA, such as using RDAP.</t>
        </section>
        <section anchor="cname" numbered="true" toc="default">
          <name>CNAME</name>
          <t>Used for SN -&gt; DET mapping and other cross TLD jumps?</t>
        </section>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>Under DRIP Endorsements are defined in a CDDL structure that can be encode to CBOR, JSON or have their keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing.</t>
      <t>The first subsection defines the structure of an Endorsement while the remain subsections define specific forms that are commonly used. The binary forms of the subsections can be found in <xref target="bin-examples" format="default"/>.</t>
      <!-- TODO: do we have a iana registry with accepted keys for the various sections or endorsements in general? -->

<section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-json">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
  identity: {
      (hit: bstr .size 16, ? hi: bstr) // (hhit: bstr .size 16, ? hi: bstr)
      * tstr: any
  },
  evidence: bstr,
  scope: {
      vnb: number,
      vna: number,
      * tstr: any
  }
  signature: {
      sig: bstr
      * tstr: any
  }
}
]]></artwork>
        </figure>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the endorsement is found. The identity can take many forms such as a handle to the identity (an HHIT), and can include more explicit data such as the public key (an HI). Other keys can be provided and MUST be defined in their specific endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> or <tt>hi</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific endorsement.</t>
        </section>
      </section>
      <section anchor="self-endorsement" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="se-x">
          <name>Self-Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>In a Self-Endorsement the <tt>identity</tt> is a HHIT/DET and the <tt>evidence</tt> is the associate HI. The HI could be removed, resulting in an "empty" Endorsement, when obtaining the HI via other means (such as DNS) is guaranteed. This behavior is NOT RECOMMENDED as the data being signed would be very short.</t>
        <!-- TODO: do we specify HI in 'evidence' or place it in 'identity'? There is no difference when encoded. Perhaps semantically there MUST always be evidence of some form; justifying the separation? -->

</section>
      <section anchor="endorsement" numbered="true" toc="default">
        <name>Generic Endorsement (GE-x.y)</name>
        <figure anchor="e-xy">
          <name>Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
  identity: {
      hhit: bstr .size 16,
      hi: bstr
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement used to sign over evidence that is being endorsed. Typically the <tt>evidence</tt> is filled with a byte string of a Self-Endorsement (<xref target="self-endorsement" format="default"/>) of another party.</t>
      </section>
      <section anchor="concise-endorsement" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <figure anchor="ce-xy">
          <name>Concise Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
concise_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement signing over only the HHIT/DET of Y (as <tt>evidence</tt>) and the HHIT/DET of X (as <tt>identity</tt>). In constrained environments and when there is the guarantee of being able to lookup the HHITs/DETs to obtain HIs this endorsement can be used.</t>
      </section>
      <section anchor="mutual-endorsement" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <figure anchor="me-xy">
          <name>Mutual Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
mutual_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement that perform a sign over an existing Generic Endorsement (as a byte string of <tt>evidence</tt>) where the signer is the second party of the embedded endorsement. The HHIT/DET of party Y is used as the <tt>identity</tt>.</t>
      </section>
      <section anchor="link-endorsement" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <figure anchor="le-xy">
          <name>Link Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
link_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement that performs a sign over an existing Concise Endorsement (in byte string form for <tt>evidence</tt>) where the signer is the second party of the embedded endorsement. The HHIT/DET of party Y is used as the <tt>identity</tt>.</t>
      </section>
      <section anchor="broadcast-endorsement" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="be-xy">
          <name>Broadcast Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>This endorsement is required by DRIP Authentication Formats &amp; Protocols for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="RFC9153" format="default"/> GEN-1 and GEN-3 and is sent in its binary form (<xref target="bin-be" format="default"/>).</t>
        <t>The <tt>evidence</tt> is a concatenated byte string of the HHIT/DET of Y and the HI of Y in HHIT/HI order. The <tt>identity</tt> is the HHIT/DET of X.</t>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of endorsements can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular endorsement can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Endorsement: Unmanned Aircraft</tt></li>
            <li>
              <tt>Generic Endorsement: Operator on Aircraft</tt> or <tt>Generic Endorsement: Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SE(Unmanned Aircraft)</tt> or <tt>SE-ua</tt></li>
            <li>
              <tt>GE(Operator, Unmanned Aircraft)</tt> or <tt>GE-op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various endorsements a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>se-{hash of entity}</tt></li>
            <li>
              <tt>ge-{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>se-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ge-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>TODO: requesting <tt>hhit.arpa</tt></t>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="drip-endorsement-subregistries" numbered="true" toc="default">
          <name>DRIP Endorsement Subregistries</name>
          <t>This document requests a new subregistries for Endorsement Type and Entity Type under the <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-rid-28#section-8.2">DRIP registry</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>DRIP Endorsement Type:</dt>
            <dd>
  This 8-bit valued subregistry is for Endorsement Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Endorsement Type</th>
                <th align="left">Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Self-Endorsement</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Generic Endorsement</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Concise Endorsement</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Mutual Endorsement</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">Link Endorsement</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <dl newline="false" spacing="normal">
            <dt>DRIP Entity Type:</dt>
            <dd>
  This 8-bit valued subregistry is for Entity Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Entity Type</th>
                <th align="left">Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Unmanned Aircraft (UA)</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Operator (OP)</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HDA</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">RAA</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Root</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Subregistry</name>
          <t>This document requests a new subregistry for aircraft information fields under the <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-rid-28#section-8.2">DRIP registry</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to an MRA or HDA. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <!-- TODO: maybe first come first served instead of expert review? -->

<table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
            </tbody>
          </table>
          <!-- TODO: add more keys that are common and well defined -->

</section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-29.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-29"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4398" target="https://www.rfc-editor.org/info/rfc4398">
          <front>
            <title>Storing Certificates in the Domain Name System (DNS)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>Cryptographic public keys are frequently published, and their authenticity is demonstrated by certificates.  A CERT resource record (RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4398"/>
          <seriesInfo name="DOI" value="10.17487/RFC4398"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8005" target="https://www.rfc-editor.org/info/rfc8005">
          <front>
            <title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8005"/>
          <seriesInfo name="DOI" value="10.17487/RFC8005"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-26.txt">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="14" month="October" year="2022"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   It defines message types and associated formats (sent within the
   Authentication Message) that can be used to authenticate past
   messages sent by an unmanned aircraft (UA) and provide proof of UA
   trustworthiness even in the absence of Internet connectivity at the
   receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-26"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-11.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="23" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the Net-RID messaging.  This
   is secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure
   messaging Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-11"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-01.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="8" month="November" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-01"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="bin-examples" numbered="true" toc="default">
      <name>Binary Endorsements</name>
      <!-- TODO: add explicit byte lengths for fields for each example -->

<section anchor="bin-se" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="bin-se-x">
          <name>Binary Self-Endorsement (Length: 120-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                        Valid Not Before                       |
+---------------+---------------+---------------+---------------+
|                        Valid Not After                        |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-e" numbered="true" toc="default">
        <name>Endorsement (E-x.y)</name>
        <figure anchor="bin-e-xy">
          <name>Binary Endorsement (Length: 240-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of X                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SE-y                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-ce" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <figure anchor="bin-ce-xy">
          <name>Binary Concise Endorsement (Length: 104-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-me" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <figure anchor="bin-m-xy">
          <name>Binary Mutual Endorsement (Length: 328-bytes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              E-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-le" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <figure anchor="bin-le-xy">
          <name>DRIP Link Endorsement (Length: 192-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-be" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="bin-be-xy">
          <name>DRIP Broadcast Endorsement (Length: 136-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
