<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-08" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-08"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="28"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through the existing DNS structure and methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="drip-arch" format="default"/>).</t>
      <t>While it is expected that DIME functions will be integrated with UAS Service Supplier (USS) (Appendix A.2 of <xref target="drip-arch" format="default"/>), who will provide them is not yet determined in most, and is expected to vary between jurisdictions. However this evolves, the essential DIME functions (including the management of identifiers) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="drip-arch" format="default"/>) or Network RID (Section 1.2.2 of <xref target="drip-arch" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="drip-arch" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DRIP Entity Tags (DETs). Forgery of the DETs is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a full DRIP Entity Tag <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
      <section anchor="supported-scenarios" numbered="true" toc="default">
        <name>Supported Scenarios</name>
        <ol spacing="normal" type="1"><li>UA using manufacturer generated Serial Number for UAS ID. No additional information provided.</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. Manufacturer using a DIME. Manufacturer MUST provided pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number which is mapped to a DET by manufacturer for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. Manufacturer MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated DRIP enhanced Serial Number for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public information into DNS (i.e. HI) - either directly or as a mapping to a DET. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. UA using user generated DET for Authentication. User uses DIME with capability to publically map Serial Number to a DET (via a USS). DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA provisioned with DET (i.e. Session ID) with a DIME (via a USS) for UAS ID and Authentication. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST NOT (unless required) provide mapping of DET to Serial Number in DNS. USS MUST provide pointer to additional information via DNS (even if null).</li>
        </ol>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="drip-arch" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="drip-arch" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers back Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IAM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  | SIDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the value of RAA=0 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex generally has as the prefix portion of the HHIT associated with it (such as 2001:30/28) which is assigned by IANA from the non-routable special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. For DRIP and the UAS use case it is hoped that ICAO will handle the role of registering RAAs as an Apex.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have two reserved HDA values. 0 (0x0000) for itself in its role as an RAA and 1 (0x0001) if it wishes to offer HDA services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <ul empty="true" spacing="normal">
          <li>Note: A single RAA may control more than one NAS (for example LU and BE being covered by Skeyes.be). In such a scenario the CAA could either request two different RAA values for each larger region with HDAs delegating smaller spaces; or run under a single RAA with HDAs delegated to cover specific regions. A similar scenario could also occur in the US with the FAA requesting RAAs for each region, for example: North East, South Eat, Midwest, North West, South West. This is up to regulators and their policies.</li>
        </ul>
        <section anchor="irm" numbered="true" toc="default">
          <name>ICAO Authority of Manufacturers (IAM)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in <xref target="CTA2063A" format="default"/>.</t>
          <t>To manage the large ICAO Manufacturer Code space (34  character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the DRIP use case. These are the RAA values of 2 (0x0002) up to 96 (0x0060). This allows a single HDA for each Manufacturer Code.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturers Authority of Aircraft (MAA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="RFC9374" format="default"/>, Section 4.2) and this DIME would hold a mapping from the Serial Number to the DET and its artifacts.</t>
        </section>
        <section anchor="ridr" numbered="true" toc="default">
          <name>Session ID Authority (SIDA)</name>
          <t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
          <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces SHOULD NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>). For RAAs the abbreviation is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) when allocated to a CAA.</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver SHOULD use the uppercase 4-character hexadecimal encoding of the field it is missing.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |        DRIP Identity Management Entity              *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent        |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent       |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      |              |  *
*          |             |             |      |              |  *
*  +-------o-----+       |             |      |              |  *
*  | Name Server |       |             |      |              |  *
*  +------o------+       +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information (such as the DRIP Endorsements) coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON or CBOR encoding of objects being sent to the DPA. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if as RAA.</li>
        </ul>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms. As an example the Serial Number, under the FAA, is classified as PII and can only be accessed by federal entities (such as the FAA themselves).</t>
        <t>For DRIP the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON/CBOR encoding of objects being sent to the DIA. There MUST also be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource records</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return DRIP Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>There are four ways a Serial Number is supported (by DRIP):</t>
        <ol spacing="normal" type="1"><li>As itself as a clear-text string with additional information</li>
          <li>As itself as a clear-text string mapped to a DET "post" generation by the manufacturer (for use in authentication) and additional information</li>
          <li>As itself as a clear-text string mapped to a DET "post" generation by the user (for use in authentication) and additional information</li>
          <li>As an encoding of an HI and associated DET by the manufacturer (for use in authentication) with additional information</li>
        </ol>
        <ul empty="true" spacing="normal">
          <li>Note: additional information here refers to any subset of keys defined in <xref target="ua-info-registry" format="default"/>.</li>
        </ul>
        <t>(1) is where a UA is provisioned with a Serial Number by the manufacturer. The manufacturer is runs an MAA and uses the mechanisms of this document to provide additional information.</t>
        <t>(2) is where a UAS is provisioned with a Serial Number and DET by the manufacturer enabling their devices to use <xref target="drip-auth" format="default"/> and provide additional information. A public mapping of the Serial Number to DET and all public artifacts MUST be provided by the manufacturer. This document RECOMMENDS the manufacturer use an MAA for this task.</t>
        <t>(3) is where a UAS has a Serial Number (from the manufacturer) and the user has a mechanism to generate and map a DET to the Serial Number after production. This can provide dynamic signing keys for DRIP Authentication Messages via <xref target="drip-auth" format="default"/> for UAS that MUST fly only using Serial Numbers. Registration SHOULD be allowed to any relevant DIME that supports it.</t>
        <t>(4) is where a UAS manufacturer chooses to use the Serial Number scheme defined in <xref target="RFC9374" format="default"/> to create Serial Numbers, their associated DETs for <xref target="drip-auth" format="default"/> and provide additional information. This document RECOMMENDED that the manufacturer "locks" the device from changing its authentication method so identifiers in both the Basic ID and Authentication Message do not de-sync. The manufacturer MUST use an MAA for this task, with the mapping between their Manufacturer Code and the upper portion of the DET publicly available.</t>
        <figure anchor="dime-sn-example">
          <name>Example DIME:MAA with Serial Number (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) HIP RR,
    CERT RRs
(d) UA Information
]]></artwork>
        </figure>
        <t>The unmanned aircraft, intending to use DRIP, generates a keypair, DET and <tt>Self-Endorsement: UA</tt> using the RAA and HDA values specified by the manufacturers DIME (running as an MAA). The DET is converted into a Serial Number (per <xref target="RFC9374" format="default"/>) or the manufacturer creates their own Serial Number.</t>
        <t>The Serial Number, UA information and the <tt>Self-Endorsement: UA</tt> are sent to the manufacturers DIME. The DIME validates the Self-Endorsement and checks for DET and HI collisions in the Name Server/DIA. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated which is provisioned into the aircraft for use when using the Serial Number as its UAS ID. In the Name Server HIP RRs are created using the DET FQDN while a CNAME points the Serial Number FQDN to the DET FQDN.</t>
        <ul empty="true" spacing="normal">
          <li>Note: <xref target="dime-sn-example" format="default"/> is specific for a DET-encoded or DET-linked Serial Number. The Endorsements in (a) and (b) as well as RRs in (c) would not be present for non-DET based Serial Numbers.</li>
        </ul>
        <t>Additional UA Information has a set of valid item keys defined in <xref target="ua-info-registry" format="default"/>. The items present for a given interaction is defined by future documents, local regulations and implementation specific capabilities.</t>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR,
    CERT RRs
(d) Operator Information
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in <xref target="RFC9374" format="default"/> along with a self-signed endorsement (<tt>Self-Endorsement: Operator</tt>). The RAA and HDA values used in the DET generation for the Operator are found by referencing their selected DIME of choice (in <xref target="dime-operator-example" format="default"/> an HDA).</t>
        <t>The self-signed endorsement along with other relevant information (such as Operator PII) is sent to the DIME over a secure channel. The specification of this secure channel is out of scope for this document.</t>
        <t>The DIME cross checks any personally identifiable information as required. <tt>Self-Endorsement: Operator</tt> is verified. The DET and HI is searched in the DIME DIA and Name Server to confirm that no collisions occur. A new endorsement is generated (<tt>Generic Endorsement: DIME on Operator</tt>) and sent securely back to the Operator. Resource Records for the HI and Endorsements are added to the DIME Registry/Name Server.</t>
        <t>With the receipt of <tt>Generic Endorsement: DIME on Operator</tt> the registration of the Operator is complete.</t>
        <ul empty="true" spacing="normal">
          <li>Note: (c) in <xref target="dime-operator-example" format="default"/> MAY be requested by the Operator to be omitted due to PII concerns.</li>
        </ul>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically SIDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:SIDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: SIDA              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: SIDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: SIDA on UA,
    Generic Endorsement: SIDA on UAS
(c) HIP RR,
    TLSA, RR,
    CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: SIDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: SIDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The DIME validates all the endorsements and checks for DET and HI collisions in the Name Server/DIA using the proposed UA DET. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated. An <tt>Generic Endorsement: SIDA on UAS</tt> is generated using the <tt>Generic Endorsement: GCS on UA</tt>. HIP and CERT RRs are provisioned into the Registry/Name server. Both endorsements are back to the GCS on a secure channel.</t>
        <t>The GCS then injects the <tt>Broadcast Endorsement: SIDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: SIDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR,
    CERT RRs
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="drip-arch" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>ICAO SHOULD delegate domains beneath these apexes to national civil aviation authorities. This ensures DRIP complies with national law and regulation since these are matters of national sovereignty. The HHIT has a designated field, the RAA, for this exact purpose and SHOULD be used instead of a ISO-3166 entries: ie a two- or three-letter or a three digit country code.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and reguations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies (both DIME-level and national-level).</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of ICAO. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, ICAO SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done on a country by country basis, using the 14-bit RAA space as a framework. ICAO SHOULD allocate blocks to each National Aviation Authority who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for an HHIT RRtype and not a PTR RRtype.</t>
      </section>
      <section anchor="serial-numbers-other-uas-id-types" numbered="true" toc="default">
        <name>Serial Numbers &amp; Other UAS ID Types</name>
        <t>This document specifies the creation and delegation to ICAO of the subdomain <tt>uas.icao.arpa</tt>. To enable lookup of Serial Numbers a subdomains of <tt>sn.uas.icao.arpa</tt> is maintained. All entries under <tt>sn.uas.icao.arpa</tt> are to follow the convention found in <xref target="sn-fqdn" format="default"/>. This is to enable a singular lookup point for Serial Numbers for UAS.</t>
        <t>Note that other subdomains under <tt>uas.icao.arpa</tt> can be made to support other identifiers in UAS. The creation and use of other such other subdomains are out of scope for this document. The further use and creation of items under <tt>icao.arpa</tt> is the authority of ICAO (which has been delegated control).</t>
        <t>DETs MUST not have a subdomain in <tt>uas.icao.arpa</tt> (such as <tt>det.uas.icao.arpa</tt>) as they fit within the predefined <tt>ip6.arpa</tt> as they are IPv6 addresses.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained envirornments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Registry</name>
          <t>This document requests a new registry for aircraft information fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links in DNS.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single DIME to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="S. Card" initials="S." surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking. </t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs).  HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement. </t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="drip-arch" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-arch-31">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-31"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren">
              <organization/>
            </author>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder">
              <organization/>
            </author>
            <author fullname="T. Okubo" initials="T." surname="Okubo">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement.  This document is not an Internet Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-30">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="27" month="March" year="2023"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   The document defines message types and associated formats (sent
   within the Authentication Message) that can be used to authenticate
   past messages sent by an unmanned aircraft (UA) and provide proof of
   UA trustworthiness even in the absence of Internet connectivity at
   the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-30"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-12">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-12"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-01">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="8" month="November" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-01"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .det.uas.icao.arpa.
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.det.uas.icao.arpa.
]]></artwork>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>UAS Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>{id}.{length}.{manufacturer-code}.{apex}.</li>
        </ul>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .sn.uas.icao.arpa.
Serial: MFR0ADR1P1SC00L
Manufacturer Code: MFR0
Length: A
ID: DR1P1SC00L
FQDN: dr1p1sc00l.a.mfr0.sn.uas.icao.arpa.
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in DRIP Wrapper, Manifest and Frame formats. <tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases.</t>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatination of a child entities (e.g. a UA) HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                            of Child                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                           HI of Child                         |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                           of Parent                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
