<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-12" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-12"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="drip-arch" format="default"/>).</t>
      <t>While it is expected that DRIP Identity Management Entity (DIME) functions will be integrated with UAS Service Suppliers (USS) (Appendix A.2 of <xref target="drip-arch" format="default"/>), who will provide DIME-like functions is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential DIME-like functions (including the management of identifiers (such as the DRIP Entity Tag (DET))) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="drip-arch" format="default"/>) or Network RID (Section 1.2.2 of <xref target="drip-arch" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="drip-arch" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET (Section 9.5 of <xref target="RFC9374" format="default"/>). Forgery of a DET is still possible, but including it as a part of a public registration mitigates this risk.</t>
      <t>This document creates the DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a DET <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry (e.g. DNS) within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number (Section 4.2 of <xref target="RFC9374" format="default"/>). This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA's direct HDA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
      <section anchor="supported-scenarios" numbered="true" toc="default">
        <name>Supported Scenarios</name>
        <ol spacing="normal" type="1"><li>UA using manufacturer generated Serial Number for UAS ID. No additional information provided.</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. Manufacturer using a DIME. Manufacturer MUST provided pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number which is mapped to a DET by manufacturer for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. Manufacturer MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated DRIP enhanced Serial Number for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public information into DNS (i.e. HI) - either directly or as a mapping to a DET. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. UA using user generated DET for Authentication. User uses DIME with capability to publically map Serial Number to a DET (via a USS). DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA provisioned with DET (i.e. Session ID) with a DIME (via a USS) for UAS ID and Authentication. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST NOT (unless required) provide mapping of DET to Serial Number in DNS. USS MUST provide pointer to additional information via DNS (even if null).</li>
        </ol>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="drip-arch" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces MUST NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
        <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the abbreviation MUST be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3).</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver MUST use the uppercase 4-character hexadecimal encoding of the field it is missing.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="drip-arch" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these initial roles (some highly specialized and predetermiend for the UAS use case) are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   o--------.
                +-o------o-+        |
                  |      |          |
******************|******|**********|******************
                  |      |          |
            +-----o-+  +-o-----+  +-o-----+
RAAs        |  MCA  |  |  INN  |  |  RAA  |
            +---o---+  +---o---+  +---o---+
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  |  HDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the values of RAA=0-3 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex is the owner of the IPv6 prefix portion of the DET associated with it (2001:30/28) which is assigned by IANA from the special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. Allocations of RAAs SHOULD be done in contigous groups of 4.</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">RAA Decimal Range</th>
              <th align="left">RAA Hex Range</th>
              <th align="left">Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 - 3</td>
              <td align="left">0x0000 - 0x0003</td>
              <td align="left">Apex</td>
            </tr>
            <tr>
              <td align="left">4 - 3999</td>
              <td align="left">0x0004 - 0x0F9F</td>
              <td align="left">ISO 3166-1 Countries (<xref target="iso3166" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4000 - 4095</td>
              <td align="left">0x0FA0 - 0x0FFF</td>
              <td align="left">Manufacturer Code Authorities (<xref target="irm" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4096 - 16375</td>
              <td align="left">0x1000 - 0x3FFF</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">16376 - 16383</td>
              <td align="left">0x3FF8 - 0x3FFF</td>
              <td align="left">DRIP WG Experimental Use</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true" spacing="normal">
          <li>Note: that the first column of this table is <em>decimal</em> values <strong>not</strong> <em>hexadecimal</em>.</li>
        </ul>
        <t>RAA values of 0 (0x0000) to 3 (0x0003) are reserved to the Apex exclusively.</t>
        <t>The Experimental range of 16376 (0x3FF8) to 16383 (0x3FFF), eight (8) RAAs, is allocated to the DRIP working group itself. 16376 to 16379 are setup by DRIP experts to act as RAAs for potential HDA users to test against. RAA 16376 is already "in use" with <tt>driptesting.org</tt>. 16379 is to be setup as an RAA to act as a MCA <xref target="irm" format="default"/> for UAS manufacturers to test their HDAs against and have their Manufacturer Code properly managed. The rest of the range (16380 to 16383) are reserved to be allocate by the DRIP experts to agencies that wish to test being an RAA.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field, i.e. 16,384 RAAs, of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have a single reserved HDA value: 0 (0x0000) for itself to support various functions or services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contigous values are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined as "user assigned code elements" without specific claimaint predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants.</t>
          <t>How a CAA handles their 4 allocations are out of scope of this document. Control of these values are expected to be claimed by their respective owner. How a claim is vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <ul empty="true" spacing="normal">
            <li>Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces. How this is claimed and handled is out of scope for this document.</li>
          </ul>
        </section>
        <section anchor="irm" numbered="true" toc="default">
          <name>Manufacturer Code Authority (MCA)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an Manufacturer Code used in <xref target="CTA2063A" format="default"/> that is issued by ICAO.</t>
          <t>To manage the large Manufacturer Code space (34 character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the use case. These are the RAA values of 4000 (0x0FA0) up to 4095 (0x0FFF). This allows a single HDA for each Manufacturer Code.</t>
          <t>See <xref target="mra" format="default"/> for the HDA allocation of Manufacturer Codes under these RAAs.</t>
          <ul empty="true" spacing="normal">
            <li>Note: the upper RAAs in the range (4083 to 4095) are not used but are left reserved in this space for future action if required.</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and infrastructure (such as Supplemental Data Service Providers). It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>A primary function of HDAs for DRIP, in the context of UAS RID is the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain it. The Serial Number MUST be protected in a way only the authorized party can decrypt. As part of the UTM system HDAs can also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturer Unmanned Aircraft Authority (MAA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific Manufacturer Code (assigned to the manufacturer by ICAO). The specific RAA (out of MCA space) and HDA use the following derivation:</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
mfr_int = base34_decode(mfr_code)
hid = (4000 << 14) + mfr_int
mfr_code = base34_encode(hid)
]]></artwork>
          <t>A character in a UAS Serial Number "shall include any combination of digits and uppercase letters, except the letters O and I, but may include all digits" <xref target="CTA2063A" format="default"/>. For HID determination, the character space [0-9,A-H,J-N,P-Z] is mapped to [0-34] to convert the 4 place Base34 Manufacturer Code to Base10 (Note this is different than the Base32 process in Section 4.2 of <xref target="RFC9374" format="default"/>).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="RFC9374" format="default"/>, Section 4.2) and this DIME MUST hold a mapping from the Serial Number to the DET and its artifacts.</t>
        </section>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |     DRIP Identity Management Entity (DIME)          *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent (DPA)  |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent (DIA) |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      | (RDDS)       |  *
*          |             |             |      |              |  *
*  +-------o----------+  |             |      |              |  *
*  | Name Server (NS) |  |             |      |              |  *
*  +------o-----------+  +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface MUST be provided for clients to access. An HTTPS based interface is RECOMMENDED. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="dpa-figure">
          <name>DPA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+
| Registering |
|   Client    |
+------o------+
       |
       | HTTPS
       |
       |
    +--o--+           +-----+
    | DPA o-----------o DIA |
    +--o--+    TBD    +-----+
       |
       |
       | HTTPS or EPP
       |
+------o---+
| Registry |
+----------+
]]></artwork>
        </figure>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
        <figure anchor="registry-figure">
          <name>Registry Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-----+
    | DPA |
    +--o--+
       |
       | HTTPS or EPP
       |
       |
+------o---+           +-----+
| Registry o-----------o DIA |
+-----o----+    TBD    +-----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +------+
]]></artwork>
        </figure>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
        <figure anchor="ns-figure">
          <name>Name Server Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+-----o----+
      |
      |
      | TBD
      |
  +---o--+
  |  NS  |
  +--o---+
     |
     |
     | DNS Query/Response
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms (see <xref target="dap" format="default"/>).</t>
        <t>For DRIP, the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information from clients.</t>
        <t>There MUST be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
        <figure anchor="dia-figure">
          <name>DIA Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                         +-----+
                         | DPA |
                         +--o--+
                            |
                            |
                            | TBD
                            |
  +----------+    TBD    +--o--+             +------+
  | Registry o-----------o DIA o-------------o RDDS |
  +----------+           +--o--+     TBD     +------+
                            |
                            |
                       RDAP |
                            |
                    +-------o-------+
                    | Lookup Client |
                    +---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
        <figure anchor="rdds-figure">
          <name>RDDS Interface Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
   +-----+
   | DIA |
   +--o--+
      |
      |
      | TBD
      |
  +---o--+
  | RDDS |
  +--o---+
     |
     |
     | RDAP
     |
+----o----------+
| Lookup Client |
+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <t>Each section has an associated appendix (<xref target="dns-examples" format="default"/>) containing DNS examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>There are four ways a Serial Number is supported by DRIP:</t>
        <ol spacing="normal" type="1"><li>As a clear-text string with additional information (<xref target="serial-1" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>manufacturer</strong> (for use in authentication) and additional information (<xref target="serial-2" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>user (via an HDA)</strong> (for use in authentication) and additional information (<xref target="serial-3" format="default"/>)</li>
          <li>As an encoding of an HI and associated DET by the <strong>manufacturer</strong> (for use in authentication) with additional information (<xref target="serial-4" format="default"/>)</li>
        </ol>
        <ul empty="true" spacing="normal">
          <li>Note: additional information here refers to any subset of keys defined in <xref target="ua-info-registry" format="default"/>.</li>
        </ul>
        <section anchor="serial-1" numbered="true" toc="default">
          <name>Serial Method 1</name>
          <t>This is where a UA is provisioned with a Serial Number by the manufacturer. The Serial Number is just text string, defined by <xref target="CTA2063A" format="default"/>. The manufacturer runs an Name Server delegated under the Serial Number apex and points to information using a DET RR (filling in only the Serial Number and URI fields).</t>
          <figure anchor="dime-sn1-example">
            <name>Example DIME:MAA with Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information
(b) Success Code
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-2" numbered="true" toc="default">
          <name>Serial Method 2</name>
          <t>This is where a UAS is provisioned with a Serial Number and DET by the manufacturer enabling their devices to use <xref target="drip-auth" format="default"/> and provide additional information. A public mapping of the Serial Number to DET and all public artifacts MUST be provided by the manufacturer. The manufacturer MUST use an MAA for this task.</t>
          <t>The device MAY allow the DET to be regenerated dynamically with the MAA.</t>
          <figure anchor="dime-sn2-example">
            <name>Example DIME:MAA with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) DET RR, PTR RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-3" numbered="true" toc="default">
          <name>Serial Method 3</name>
          <t>This is where a UAS has a Serial Number (from the manufacturer) and the user (via a DIME) has a mechanism to generate and map a DET to the Serial Number after production. This can provide dynamic signing keys for DRIP Authentication Messages via <xref target="drip-auth" format="default"/> for UAS that MUST fly only using Serial Numbers. Registration SHOULD be allowed to any relevant DIME that supports it. A public mapping of the DET to the Serial Number SHOULD be provided.</t>
          <figure anchor="dime-sn3-example">
            <name>Example DIME with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |      DIME                  *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: DIME on UA
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-4" numbered="true" toc="default">
          <name>Serial Method 4</name>
          <t>This is where a UAS manufacturer chooses to use the Serial Number scheme defined in <xref target="RFC9374" format="default"/> to create Serial Numbers, their associated DETs for <xref target="drip-auth" format="default"/> and provide additional information. This document RECOMMENDEDS that the manufacturer "locks" the device from changing its authentication method so identifiers in both the Basic ID Message and Authentication Message do not de-sync. The manufacturer MUST use an MAA for this task, with the mapping between their Manufacturer Code and the upper portion of the DET publicly available.</t>
          <figure anchor="dime-sn4-example">
            <name>Example DIME:MAA with DRIP Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) DET RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME:HDA                *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) DET RR
(d) Operator Information

Note: (c) MAY be requested by the Operator to be omitted due to PII concerns.
]]></artwork>
        </figure>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:HDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: HDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: HDA on UA,
    Generic Endorsement: HDA on UAS
(c) DET RR, PTR RR
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: HDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: HDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The GCS injects the <tt>Broadcast Endorsement: HDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: HDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based-session-id" numbered="true" toc="default">
          <name>UA Based Session ID</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based-session-id" numbered="true" toc="default">
          <name>UAS Based Session ID</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR,
    CERT RRs
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="drip-arch" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>The delegation of civil aviation authorities to RAAs is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. Since these are public, any entity can stand up an RAA with that value. ICAO SHOULD be the root of trust in a Endorsement or certificate chain that provides validation of any of these specific RAAs, in the ISO RAA range, thus protecting against bad actors standing up fraudlant RAAs. This also ensures DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and reguations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an DET resource record (<xref target="det-resource-record" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for an DET RRtype and not a PTR RRtype.</t>
        <section anchor="det-resource-record" numbered="true" toc="default">
          <name>DET Resource Record</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: This section is very much a WIP, comments are welcome.</li>
          </ul>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> DET IN ( OGAID DET HI RVS HID [SN] URI Endorsement )

OGAID = Integer value of OGA ID -- taken from HIP RR
DET = Base16 DET -- taken from HIP RR
HI = Base64 Host Identity -- taken from HIP RR
RVS = List of Rendevous Server addresses -- taken from HIP RR
HID = HID Abbreviation
SN = Serial Number
URI = URI to associated DIA
Endorsement = Broadcast Endorsements in CBOR encoding
]]></artwork>
          <t>With the SN parameter this covers the "public mapping to DET" when using Sections 6.1.2 to 6.1.4. Section 6.1.1 does not use this RR and instead opts for a URI RR.</t>
        </section>
      </section>
      <section anchor="serial-numbers-other-uas-id-types" numbered="true" toc="default">
        <name>Serial Numbers &amp; Other UAS ID Types</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: There MUST be an entry point in DNS for the lookup of UAS Serial Numbers. This section is very much a shot in the dark.</li>
        </ul>
        <t>This document specifies the creation and delegation to ICAO of the subdomain <tt>uas.icao.arpa</tt>. To enable lookup of Serial Numbers a subdomains of <tt>sn.uas.icao.arpa</tt> is maintained. All entries under <tt>sn.uas.icao.arpa</tt> are to follow the convention found in <xref target="sn-fqdn" format="default"/>. This is to enable a singular lookup point for Serial Numbers for UAS.</t>
        <t>Note that other subdomains under <tt>uas.icao.arpa</tt> can be made to support other identifiers in UAS. The creation and use of other such other subdomains are out of scope for this document. The further use and creation of items under <tt>icao.arpa</tt> is the authority of ICAO (which has been delegated control).</t>
        <t>DETs MUST not have a subdomain in <tt>uas.icao.arpa</tt> (such as <tt>det.uas.icao.arpa</tt>) as they fit within the predefined <tt>ip6.arpa</tt> as they are IPv6 addresses.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained envirornments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the Endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific Endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP) [ICAO-IATF-CP-draft]. The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Note ACCP is: ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Registry</name>
          <t>This document requests a new registry for aircraft information fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="drip-arch" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-arch-31">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-31"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-30">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="27" month="March" year="2023"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   The document defines message types and associated formats (sent
   within the Authentication Message) that can be used to authenticate
   past messages sent by an unmanned aircraft (UA) and provide proof of
   UA trustworthiness even in the absence of Internet connectivity at
   the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-30"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-12">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-12"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-02">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="12" month="May" year="2023"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-02"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-06">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="June" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-06"/>
        </reference>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .det.uas.icao.arpa.
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.det.uas.icao.arpa.
]]></artwork>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>UAS Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>{id}.{length}.{manufacturer-code}.{apex}.</li>
        </ul>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .sn.uas.icao.arpa.
Serial: MFR0ADR1P1SC00L
Manufacturer Code: MFR0
Length: A
ID: DR1P1SC00L
FQDN: dr1p1sc00l.a.mfr0.sn.uas.icao.arpa.
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t><tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases. As an example this format is used by <xref target="drip-auth" format="default"/> to support Authentication over F3411 constrained links. <tt>evidence</tt> data is defined by <xref target="drip-auth" format="default"/> for DRIP Wrapper, Manifest and Frame formats.</t>
      </section>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {

        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatination of a child entities (e.g. a UA) HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <section anchor="dns-s1" numbered="true" toc="default">
        <name>Serial Method 1</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example1.8 IN URI ( https://example.com/sn/EXAMPLE1 )
]]></artwork>
      </section>
      <section anchor="dns-s2" numbered="true" toc="default">
        <name>Serial Method 2</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example2.8 IN DET ( 5 20010033e872f705f3ce91124b677d65 ... "MFR MFR0" MFR08EXAMPLE2 https://example.com/sn/EXAMPLE2 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
6.5.d.7.7.6.b.4.2.1.1.9.e.c.3.f.5.0 IN PTR example2.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-s3" numbered="true" toc="default">
        <name>Serial Method 3</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example3.8 IN DET ( 5 20010033e872f70584b1fa2b70421112 ... "MFR MFR0" MFR08EXAMPLE3 https://example.com/sn/EXAMPLE3 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
2.1.1.1.2.4.0.7.b.2.a.f.1.b.4.8.5.0 IN PTR example3.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-s4" numbered="true" toc="default">
        <name>Serial Method 4</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN mfr0.uas-sn.arpa
example4.8 IN DET ( 5 20010033e872f705ba8af5252a35030e ... "MFR MFR0" MFR08EXAMPLE4 https://example.com/sn/EXAMPLE4 ... active )

@ORIGIN 3.2.f.7.0.f.a.1.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN PTR example4.8.mfr0.uas-sn.arpa
]]></artwork>
      </section>
      <section anchor="dns-op" numbered="true" toc="default">
        <name>Operator</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0000.3ffe.2001003.hhit.arpa
ba8af5252a35030e.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff800005ba8af5252a35030e ... "TEST DRIP" null https://example.com/operator/* ... active )

@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN PTR ba8af5252a35030e.05.0000.3ffe.2001003.hhit.arpa
]]></artwork>
      </section>
      <section anchor="dns-sid" numbered="true" toc="default">
        <name>Session ID</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0000.3ffe.2001003.hhit.arpa
b6ce935b616306d4.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff800005b6ce935b616306d4 ... "TEST DRIP" null https://example.com/session/* ... active )

@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN PTR b6ce935b616306d4.05.0000.3ffe.2001003.hhit.arpa
]]></artwork>
      </section>
      <section anchor="dns-child" numbered="true" toc="default">
        <name>Child DIME</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
RAA:
@ORIGIN 8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
0.0.0 IN NS 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa

HDA:
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN PTR 4e486394a60bb669.05.0000.3ffe.2001003.hhit.arpa

@ORIGIN 0000.3ffe.2001003.hhit.arpa
4e486394a60bb669.05.0000.3ffe.2001003.hhit.arpa IN DET ( 5 2001003fff8000054e486394a60bb669 ... "TEST DRIP" null https://example.com/session/* ... active )
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAHkhrGQAA+19e3fbVpLn//wUWOWcCemQtCjJiqxMeobRI1aPLasluZPe
nt4IJEERbRLgAKBkxc6e+Ri75+x+ufkkW7+qug88KNlxNp2esWbakYCL+6hb
t95Vt9frtcbpJE6u94NVMe3ttVpFXMyj/eDw/OQsOEror7vgMrwO2odHl53g
ZBLJoxdhEl5HC/orGGbjWVxE42KVRa1wNMqiG/r86PLkRfnVJB0n4YK6nmTh
tOjFEY03yeJlL4uu47zI4ijvDbZa47CIrtPsbj+Ik2naasXLbD8oslVebG1u
Pt3caoVZFO4HJ0kRZUlUtG6v0WO8DL5Ls9e0kODbLF0tW69vXZveIUZEz6bT
vAiTyQ/hPE1oPndR3lrG+8Gfi3TcDfI0K7JomtNvdwv5ZZwusNL8L61WuCpm
abbf6gUBdZXvB8N+8B0tZbaKxjMarUXPA1nmcBIu6u/SjOY7/B6gjbJlFv8Y
dYPnzw/4HQEhimiOO093vgwOMGg2jsN5cJjFNxG3GBPs94M/0Upv4vlcngF8
abIfnP5JmqQTGnywvfP0if69SgqA89XFkB9EizCe7wchTa9/603vn8M3kZ1U
n9bsFvn7fnAexRNvcb+PF+4Rr+n88vhFMJ8vSyu5IPRIJll0mwfP0lXuL2J7
byt4RougLSvSJDhPw0k3+HYe5tfpbXAxTos5bZG3om+fDIKdb55X1vQv/pL+
Gi/+OZuOB5vbT3j+rSTNFmFBwNvnZoxtIeEkoUbvsO8wEM9a3OT8+GBvd7C5
H3wWHBwePjfPng6ebOOZ4uu/reKMkT+3Dba/3LENJoSWLSBaw+iEP7XR6Zlr
kUdjOi29JIsnvfGWtF2k+ev0Ni5+7DU0kU/DJOqN5zHm5PcfJmPzvDLO5HXc
2Dk9t6AY7O3tYlXx8mY3mKfp69XSvHqytbe5b//4cptBFi3t+93dp3sMEJrY
42Keh/bF3s6AXyQ5rSNYpvN4fGdefrmzxx1lk3DZmxXFsmeQBhsz2JLZEO3p
Xa/iSUTIE7kt2Nzbst/+2yrK7nqyA16Dbdvgr3ma0E7myzTJqQ9uc3A53Nrc
3R7KuvCjxHB4enHymN4GeN0bBheLcD4PXiWLMEmiSTCMMhzTi7u8iBZ5cLpa
jKIst50YmmH+5uOycUADr+iEB5d0/JJ0nl7fBcM8T+nEF3SegzaN19lwMwmz
a5woACXff/w4n6XL/rgI+0ReZ4+XWTpZjYv8cY6Z9VY6s17IM+vlMjNCHP4z
qUxwQiR3n9Y2eNrbfMpPT8/OX9SgsHGaFvE4CtJpcJalyzSnpZ+v5hExAya8
OMXRIi0iZRPTeCxLoQ8crOJsDGpsoLXxAJheJcRAJkRIaI55cBxNooxAPbxR
KA0nizgB91CgHQ99oHkLI87S6vV6QThC4zEd0MtZnAfElFbMxSZRPs7iEY1R
zKJgFl/Pgnl0E82D0ONhASEUv1eWJYMSnQomcT5ObwjnsNgK78yZeeadYJUD
TIenF/3gsNSe3nIv1HWc0YgEO5oiPaMhixnxM5oNd5ovozHgik5AZFc8LfmY
eVqYTfjdguh6Osn7wTC4jhKGGYa7iaNbjIg1xCD2NA59rhRtEoyi4jaKEnp3
k85v6AGRUTohoCoBoKVAmlAD6sOHHxGQWTBdMZTy1XJJXBSLNe/z4Dq+wQOg
a0KIMbdrYSDmfdmeRTyZEF9rfQbmLUhNb1utcysjMFCmK1oq+qV+inQtdgXt
V8OLjsXKw6B9fnLY6Qcvk/ldwNCfxwvGr3QZyW5Sh5Zy096Ow4SAEnyTEXsa
h3nRDUarIojeFFEyYTC4pgSNPCW4xwuaZBIRpk76wSUBmggsfULUjjCCuo/m
IjfRNlQ+x67QhGmiXf59lcREx4LX0R0jnhBgfNc8fkL7SDgbUt9OpAraeRQF
x/E1NmYHH799a3neTz91CO7fzWI6xHGBKURvaFcAkGIWFoJzTTKfInf78OTF
UQe7wduUExYQXRwJbl0TQKkjRgys6gLoR+TjgrCDGFJGU3t1QbvTHi6XtJr4
DclSW/UJdoPbWSodE5W7IaofYNTePH4deSPT3JO0IFkOR5kQm8iCoCmg3+UD
UlpeGtyEtP+K8N3gr6ssziex9NYnaeWWTn8mSB7xYchlU9xGNk2jHSfj+WrC
mI6tdyDDditZ5LXnq/EsCGXTG4XtTodR3Z9yBkEn4U9yQn8Iq9xGjxI1mkVZ
FCd2Uxn1iAqG+Jr2BVMPiHY6hA7OcSwuIp5/MOhv9Qf1PSBaHJwSpEjurLdv
2DOAerkaEWfvBgusU0nOery16GowiKTQG8IfImA5E9dVnst+mqG/rA3bDYbE
QgBioSn0d0FMozB/MH+JfzR/jony5SRmg87M+W9IlbRz/B2RuZU0BOoMaUsL
wlTiLnwUvQkDPwxKdBkH/0q6CuAdEYNnAk4nKZTRqDEdi4QpDmgQtaJu0uSa
fg/d5CMShScrfYY5U/sl2AKQEAQonNPO42OhtPTfUU40HLsburkDQmFCRC4K
X9OHIS+CnuFAyYQqW3FLE+D1Yo23mPdylYHR8zZY5kNgCHwhWDZNztNd6STR
KSFQreYKcz3AWTCepUQKoFoRrFJIQRNC7YSWHRXjPh+0O8bseTRlWJaYBdCA
5UaGx+0sJgwjeWg1BwMLZivqiYYlBWdER4A+JiYXz2NIELS4cH6Xx7ll2oRX
dpcXIbH6JCp9GyX8G21EumB6FgFeY154Vzl6GJCucr2ikx6AKZlPRylRvnbU
v6YFRd8T5ucx3pQRj6hqBqr+3PTQ/n548OJ5B4T5Urm0UA8cIEWjsX5b2oQ0
qaBlBQWTlKQCCH6mMzmhwa0FXExnE1LANEsXOhSWp+08RGGg01IYh9cgqutX
IMIETOevh9vvsh+8iIv42gqMh1ECGku/Gb7RPkyJWxB6h+PXsn+kna9ykQBI
6iW1EZRuFOaguzQKySrhEguwM8E7nDxaPiE1PZmFN3GaybEFXhlWhyOeziML
KVrSHQ4ZCQuFoe2sYgQkNxBVlVOJJ+C+thv/bC1IpCwwCVrjjMHcpsPCqhya
qoiOIwJhkwVFcIV4sRR5QcSkDqbJrGMR52b+fSsfyVAr7KN+nhO5VylJmJHK
fhEeAx3HKengufBQYS2zMJ8FLMDJVjCHOrp0VP9p/4kQX1V8IUYExySvqzwb
cnPIQwWz7TRnzBcgOQZJxIj4X8jQlc8U00rS9ULQggVz6pJoy+t+VXgf04kt
VHTH0PeI59E4FVD3g4A7kflArqSp+uKuAMO2Nye5LmuSkElSiuwAbyypcfF1
giUqz4GodD5Eq2fE/FmjgAT87OQyOEyZpXsNnx2iIaxYNHFDJS4KVXC+Pbjo
CLWC8FSDBKnLAgb6cBwTjh+C+R9GU9KSuANHZ2Df6MgmwuTx009M9VXEN0he
giSOVx+y+VCVKOiBfKAxn/MoJJ2aPmy1ThLBvogIahB5smI3eMmCNs7cq6FQ
+05VMBOFBcSaN9NDMzm6xBVSgG8SMV0QpQlCcqUfOmsEDhHCCRJgJ5nbJJZL
w+BMUO7EO6l6lu5kx6FOdbi1OR66hUT05imoCzoCs2SBkYWt2Fep7vircUoY
8SOowwFxT1X2WIQk3ko8+oyEQvBLoqVGe+bj6U+sfXZy0pFzlWYiDdEClJY2
rkCpCcvzokYSjV/pK9pAwA/cnDZe5JAo61NPgTGMqMgrO8hcPh0VwFfisCTJ
pVkuwi1zDLMgYfMEGaZTPgYR8pASsYJyS2wpy4Ux3cZEb2i/mHGM46VwBlV4
ha0LfZ7fWYGHXzL1uIiYg0O7K+6WVkWHHm0OKMjOmPthuamCX5C6aDGwMlqS
dCEWHbHkOMK3Y4Rdn/DxAbzV7sGF7LhCh7HfkG2EQpE0QsvgtdCMLzHjAQbw
xuvoZIV6rnLVD1hCgTwPTYII1IiWMaVf+sHRDVT2qaX4gJYCKhJZrtR/DpwM
A38nVPubkRqsqh9LYLfePLIVsI33l6XWNDNHr9I55imAgMIarJY5T4GhTidt
QXCelzk/Q1Ab69ohNrDMxydiFs2X0xW+Cl5dvpAVxcXKKOzDWzrbCeiQCrBu
CwjYsTmj1W1lg4YeDzdpdO73QMg8jVWgi8BIlvPwjqhKq2VIWb6GtIiZDdvl
yWUWO8VsT7MhxqAgEJsP8I8oiZN2x7No/FqXBnTIIHQAfNQbRIkykbaWjPyr
wOiYfCBxSlha9RZnZhrdeueIKABjQ8idJRBrchG7oU5YCm5XzFgtiwKut0EH
aFGfQ3HLCLwBOBoWvljNi5jEGbAuegtO93lOJ4jImpEzbOeCeqJTOKkt4hGs
diAHrERMW63jmMlo162SEdpQDiOy4+jLIBY6LMxN5yyoQabEPFlpIQnGfSSL
tSfBoybENVmwMVY0ltitlOAA3C0jorDzl54F6oSFfuLzqQEHWgizuPQ7Zdo1
TYG4uVWGSZQgVgmBL4oKgDBOV3lZV2B6LWRs8GSbWk9ICuUVyvLB5T9jS43Q
kIsxCfHUT95qDfrEuRWKC5+EGEBMKscMB0qsWv3glKA6mcQNhjZVDelcbX3M
ACWiZreaAVd69eLVxaUdkyRUNobypjdPDzYT2FXbkdLaZDWfk/i1/aGTFW2V
TtciXC5VKWK0Ippc6sBf1UND4Hu0L9s/7oUGo69AYR6OrTLIgnvJOEMT5IXH
/ahPEmun9Kka5LAW9gBMK6vFx9yjWL3XbsFH7MDOe4CHZdFkBmfYfcjz64H5
fhAHvSCKmbILAZ2zQsqMwUDaoE3Tbvx8WD75mKNnv2QW9TDUXuUMLeKJvARm
ReNwGY5gq2HTmACLJQBadx215OC0sZpQ1KG/DVr/kluwy4C0LMlIE7xQnqtj
Ix3Dvnl8Dwzetqj1sgz5XwRIpy9pRqtkDrHLKDudJtApz6zIXgo6mu4vBTnS
Sy/Z7i++1LefFe6vn5ifnRudzGsnVrbXLOxmkzzYwGw2uvJfLBK/nx/94dXJ
+dEhfr94Nnz+3P5iWlw8e/nq+aH7zX158PLFi6PTQ/kYQKs8ejH804ZIABsv
zy5PXp4On2/U3WvsCUyNayVbZhFLrRWX3DcHZ8Fghxj7fyPOvjUYPCXOLn/s
DVh/hhApg7EGIn+KOEXcKOR9YTtIuITVCEbjHDrYbcKeBRELhm5fnGEhr1oi
FuFrOtrQXlS0w3bkrMN2RbAS5X+CLmT6nkDSD14yAdSPxHZw5DRO8zU7A0WY
KXkC1D6JPnK2vXQhhTZ8ZTU5Wds5rH5DDmKKra0Z/lkS96EWj6OYtXw2PeRK
gdRJSBJ4ks/DwnD1BVSkijUaaGzE8v3g6i3NrDQc7RfNs/roORw1O8HBLITS
jiXpuXoW5rOfrmBBCKI3IUyFAu3YM79evboIjmmY46OtbWp66bwG3A6gFQ3G
Q0wsYBbeRKws+NBgUdqqaDCvqMIds5a3sMYW76M80DMxipiDvYkXqwXmmcdv
SLmxayJIz6PkupgRkVuyX9oSGjMWMHcEXYsJl9JG5ZWsDOTjFP7w9tUPV6xy
TAhA/HfvCiTimB4RyNnYl7Kjxdj5Ti5eBrR/1xHhRJyn24PdXeARi/A+AHhK
7EkrjCaAT9G+NzCBSRyyRARKJjacL2dhbwvTkV+3MZWTqaHckzQSnb0R4ikr
50AxNBlFrCjTvElVZulfrHSKlzw7nDl2H9ORzsYwh+/0LJjpHL8JJ6RYL+CK
TiT4zxzRaRzRxootYBGz9V+OxWX0poBJ8QZshA/7dzx2OOfIj3CUwiklyyGA
Oq8/9eU8M1k0jbJMj4eYKdnKLgPmsPPTgLAkW2wOWeGTSAzuPVslrMXm4hXI
xcsSsraKw9SGaWSZ0fJoG6T3itmuI8o+f4Gz1k6XQs3m9Mq5CsrT3aC+N0QH
V+VbLNg5DzpZsceDiTh12dwQY0lDUeIIT61fxwujIOorCp0cqrEFeqDMlvZ5
RPqoeCnG85CtxrENOQAfZEiBlJFS+NkkXkQ9QCInLlgik0p7PR/0w75+gZu2
YmpwE9HiDuZhvGAIPKZZHYGVk7CtniRroAAjgzU+mgNb4VAHMWKfEMw7vh0j
L5F72/NBlGlgUZSL51gMlQJSXjeQerEMc0iWRvklTs8Wd8++j4ko4SYgEq6z
/xwTIsyKSuabSTwlTAAsGIzG5QiaOYmKMJ47MiJbJ8bPUR6ZcAJMzsThOPux
bH4OFI05ooC7D9oII+EQJBg8xQjGnjVMmTi/xjdEycTGI0HYw7HHaRf2Rni0
Ylga1krA7fFCe9P4mtnd2336bR/hRnDs92iQ6+TrjTEHgW781Pqf9GMjqczP
Fz3780Xt5Tv633AZvUHwlmnVb+hCX6a9L+yXtVbSm/uPtHpU+3lX+k/lV/Pz
nr3XF8pTNBP2f20xF3F9vTgY8n/p/09OT82voA0N/aams/qvjTBt+LUGiWYA
1GDx3v1/yJyJspVgMbSwAM0r/doAY9tZ9VfBQMbS4LMS+kpE4tcbHp3D2TDO
tbsNkfeBiyLfM1bCpGnOkzIT8AcmYrN0PhE6eBPOVxELWLR7X2/2tqXrQ/qd
DaNMHnLDv0ZE1MYz0VqcF2SOYM1MgvTEeRgnSjQk1o8pB8u9QhvM/PAxCdvO
R39ydrOLMz8lUanBJRtqwKgRhRCksrW5Odjf3ny8tddx1qaQXZLijjoZng7d
XA1AeCRSuTLwmBzyF1OXl+cHz04O874HR/Eji8OUSHl0rVKesaFrRJ83z8+F
TUrQFRNkDRIgybX8AR8rJy5OiFgDdgh4iK/x4TWi+7npDs3pHfd7qOLMOctv
8uwZTdT8Decpffqu9a5X+6HXzX+jebAZ9ILtynnZfLNJP/SCf9mmJwwVNN9B
86dPn9aa70jz46fH9MSTFw9YXuQwPU/s7EhnMsrO5tMnfmfHQx37+BidlWxP
BxA7jSvZ9JotXI9Pd+nbwe72l09cjwOzmm3p8TxiFJ/wJ2ir3+xt20+o5Z7/
CcsO330bHL0hmSfWuMxXxI/etVq/C05TROEarxIJmVkOHWK+WiRWW5FYBPrl
kcqmj8xBfPSI5N5Hj4JHnuD6CBEPtMnurG4GbdmXDrBsW//a7qhrRlekAjvv
V/RmTByS5JD5nSJ3afaiC1DPAoG2LJp7F1jIk+MO6ZTsMGjTS2Bvl4+bVS+M
twAQutUMFcZhyITRfNrXAaTfL59KPF9UUAM6qmK5xLyKXOJn2EHJpwSnc5kW
GowI8grDmzhjIFqG12Gc5EWfj4MMwjODLnoXbNCpovYbQjeuIBXiKwjgaXZ9
1dfZSBjRyEzJydluMiEzP0U0a3palP28OifxEjG/0Okx1WDFR97V8Rn+lyhj
GyDozqQuPctetbEvm3aD6lsP9VP3xXjla/AlIQ1RZWXHNE99FKnzDP46NSc9
HPFB8ncWhj8xun5uArpVNfMkQePubpPYnBZCpsNgsNMbEUVnrYzQCka4wW53
e29HEY3D+0BfO2wBwLYwjxvBDgsyTntBmxkmGvQoq7LkW3ggdcL7QaRiNgnZ
o/0CXmZMFWQ3Ij0sdBEVB/FN7Mff+8TmgENc/MDWery+A88xtzZkITGsJJLp
lOKVCC9OrbMXHmdmT+3T4YXxv7PlSdVoYpcc0qPeUdZVYvG9iz8tMkgcTx09
CMWJFsP3pcBcIJDTGCZDVvlhtTCap4adjf05++DOWV7gTkSzN4ZWyXkJOOAy
LER3gw4ElRV92BAL6tX1gTghecGCxY9gjUh+WLCBnGN3NMoJeEhMOzj/44WI
K5kwWvXK6mSg3c+9EwIKwgR136emU7Y/gFL58aaGjbvAZ0SQKGCM7c52mBtF
y5FFdh/rwDgKALeAhc/WZz6TPEWaDIHtVMWENknYOFiGXwr1Rg+WaO/oAnaE
HYAlt4X/VsgClncAaiqui4o5pzwykyOhPhhM10QIHt+YoMnK94l+z+YgOPjE
AX5nhmLo4MWO2tiviFj8wK2/JrRI5ddHwc4VB9itMk8QUsiyGzw3wUC6p04K
k+nGCXAgYpIEgNAUO8yNaN9guIEp0g73dTCdp2nWtlN5HOx0rnAqRPVXywyr
naXknJlwhwb4MR2nbdnb2dTzKlDLKzozyNp+sL29u9nFvwP+d4tZBP2yDauZ
b08SUmkFC7v7mLX6uJ9uMkcAAnhCN8jTBruprFzMK9XUjFy4IkBjY57HMHDg
BIoGbm3WGuwgEjNyQYvZJAtvJexQCJCRsGVaHII0SZ3Bz2n0PA8eh+ZAi32G
YCI2gM2ot7mAi8jfTknMxrowVZCmMRE4K1MZo1LfRhFag4OHPJWIOR7fhq1x
nArmjzRG0Uw4N4KmxQ05vjQqTAQNdRtPxOSQPzSnMw10RYSmigLTLFxNVnOO
6BR7En0GMledd7V3a4K23Tu5c2gOhdqsFuGdjZ9eSBATAl1oFGInQXvqGR+f
v+JVfXOkzJ+Jq8Dm4nV0R5RuFIk1UcyGhmHdpt4GCWZISolMElY9hbIIP9jb
OsiaFgXKuF7iJ6ZKohiTRpLFDBvredZT0XVpQBnLo9Cl+Dss1h/m89xpyTji
9SkYEvT2rUmiRAiKcrc4z1eqeh4MX0LaLgUjs7bc0Kcooe3tHeckAA/+KvAe
5F8Fgy7RBvzPBhrLSevA8GhIgqctqIBNRx9s3VjQjPXMjxY1Z9upGayTtUUL
67AJPhUFrS0KmRFHVJiwBBmAZsxCQGxtpQSRiwiOh0UWqgiNofGRh0c0fO3L
XEOg5HSAfPZ9jcsImqwvKLFSYXlnk3QYnb3wRBAk3kZOMDG5F5ZTGpekMw1o
tl84NsFhxg0s4rENdb430pmQFWInIysWjOM5YgGNfYQnF2ddDn5IQI/ibKKx
+EL02cWogWFW6OU8KZHMNWeiWLGvw4iBnAwRSWRC3i9HgWuMugiSJjkQGYbD
bvDtwUWXdRsv8C/hBJostLmYLrGL89wiVSc5DNtkMpxpGgxi3xxDY8ZgpE0x
5vNoVt70U8uQvmBDjLEZz07OeibRwngnJX6ZpED4m4bWK2KENiv643uoH12D
Iyz3v2FahBkg5UuNU9UQt1BT+2wMbtt0Zmw/HRuf92pYDgIQ2aQcF8AOLGaL
cJnYdBEbxWwyPdh93ZB04sRnEuTX9c/pZaZLlptuQ43JZYQpd3vHkt4kGmd3
y4IToUzCAi/q8oWx8TEs0ZZ3UmjlGoBJDp0/MQ7SdZEdbEtLGoICeVHCxdS9
yF5VjbQ0fg6XUtGUeamJl6l+iyXcAukU0xjfEaGpdhEcS9YrfX0U6jarorxq
JTIdl/3hGxxVaQ4CPeOK8J5Co6qVp7BYQ4IWNTC66x1TasJ26s7nqGwp5DRo
Wn9kQlKdgQT2A1SbUDujyTuz4hMzA7aHrpFXmEwYCDkZ1OhckvSlQfaM+lZH
02W6XACOe1U7glE1aWECMuAM0fzXmILjzSECESake09Ay3wt0ynAcG7NSZKk
pQpnkkwf+5Vof6yD5jOOemQ1VLI+jBm3T1jCBm1+V5FJmiSQej6ML46ICQR8
zVD4XtmZK5aOUrCZUh2TEcUbX8kNsBndNN2CPf6K534gukYHOxm+LmK0LZoq
uEoTUYGlI4TEdsNuZgULTF/METvGTWDd706tYWWHobvfEqfGYpr9AF3iaw5u
3t75gcgLzaeN5/il05rFE3rbZoHjH/+Rjl4n+CLQz1qmmfte8hfa9FVHRiB6
76Sm2BFqn+Zs5DPY8JX3MY8lHCKKZQWOSXwdq6/URRPMIfDDexu9GUdL0b30
WfCS254IGwVS287hLODeNkpCorj7Ya0wSpBmGDIfcnIfSx3/+ufN3tPusPes
+/veafes99//9S/lUFo02N6hp/Q7e84zmd6ORrp9w9BqQARqj3cDku4gPDmy
Yl2/rCagL+5jCxxEUnpdSnJTegg2wosRkn2aSGxdLc8kZynQft31ezZ8VEN2
lFMKkzHRdtYGUQtXtA4jCCxcWUJrTLh4Ab9Ykwkb4DgB4QISgsV2qTuTgqL+
6rdvvRgDZOwrMcpiDtyflpzpDa54yZBm9XwZj63H2s5APdacJ2VVQe97G49k
TIiMCxXrH1uqDf3moJFx2iuZo0BSStEndFp7fPRPwwXDFCE2dlw3rNHgmJTd
RvN5D1nnhsyCEZjIhuxxZlKz2O5ubdBnfobG8Brdtw/PiHgCuMuQc+q1XoeG
/9Kni1YQ9IIjEQO4q7OhJpjYFLDH/ty9kh++X8JPHTNjnww7unjqtGu7k+BB
v0/mXJKz7wE0FpW6nL2q8aqJm4dG8Z7QtPmcqbggW1cyXUskCRDA2gP88Rw2
KIX9ou7qg0v5nbXaA4wHLFsE77zWqd/a9+O17vGqv99P61HF1f6eITf2p97D
h/5wD1+UV/pF2Rl/z0M85R7U41eZS3lKjQ/xp/ZQwngTEfJBPfjH5OfMwSwu
LS35Q3qotLrvrw/swYev7aGU5N2wii/8HvxDbcHLamh1Drbju8DD/tQnBW4O
h6xopNS2GZKlOTTCwWgjPx+S7fPDw4uOe/oL7UUFHxQnPgyrfcrYRuLwu581
B28KLiSm+cB6Tx+kD81Ew3v6KPj4Lh4ilM3U03/aauz4wTms+6y6r1+s/exz
n9ilwXMpuKRcwt+TXu/zhpiy0mh2+0phTCWZphTG9FzlogPLyTSK6X75gAS1
ZWhENGL/NjWUlb8FvHUIuyzCXDTKSApYlGpcpQsrPBptG65vFTSsMU3tOJ6n
ts2MXLLWWWwyf3WshzAWHc6IY/UCC5q1OXT1y5x04FlrJFFvyiGvahAw5UTY
+f3s8vLsQlNFXQckiHpR7dbWZ15Xqsq8hwH+EmkQdl4lUcblwJ9JeIRXSIDD
L/l3SHJOhJT4LM+7IzFjRtMs13eZurxTTvyY+jYFMxbrqpji8E9ihxpF985x
nQAI8ZvFzvpQxBD6jVJWVbxCAFFgjg8ftTLNsgKWPYPvZB/rz1t6tMocRg+b
9PNOxN/SCYZkWfv28pvD6rf1sdxkgNlHZ2futbcIt2LaZV+MrB77ZYgDz7V4
9MzTXE8coosCt/GTF1iSaW6S7d+hjUEYyN0S/6+WYGCPnIG1qIMKBMYAbGy1
FSO49lmpocJ2rChBEqXYpuSAY8jzKE9X2RhzHSOLqnSe2ZBaP9NWNdBjzS1C
W0fOKEcEJqsC1c4vkJy6gv1N90rc+L+/eHn6+OCbl+dehkPGrY1x5ugN12Ni
w2qJtsItmY7TedCmPdfyKChvCv0Tu2EDvsu0A0X5RA/zgrqtsvUBlEVW1HBi
LRr8Ase2+eiUDsp7n4bGY9FwRJulTHtGPRFn/SF9V/0vmnnPNCQZzYnyEGLa
p7UTaehx5VjaOa47mzUB7+1nqIgsVuufXM0u+VYPnv8RG3P9w9xOwH+Zh/r7
3BGrnaTUVPAH0VV3S02NLUw1hIqybRCUPYJik1XHIJ8idbRxUSQnJzASUve3
kV96xUZUcX6p4KRJxEFfyA/01wjjn50WOgCRMGF27C9Hmgv74FDHV0gKCRgF
StUh5kqSQJnHx5xnhU4WbG4rgtVSjdRwsr2UYjrUv5yF3PmInFGbK1dIUS0b
wdjAwhqpefqLIKAX3P+u/B+GzR9QS+zxuSazmAZfeLzSzK8sk76r2TnKWJ7k
Ffz2d2kdit9nE2LDoJU3T4bGL8iu3QqDArjBhqK8yJXEuz4Zh6xxzjhgPEbV
R3Eci+JijTXlXV6O5LxxLlwOb0epDpDaiuBwBG5cI0FJUMrF454MfV+hNzFg
WnhDNJ49OhKxR1OQ+CzNPXbF+Xwp2nh5rGDL0NG0H/ifEG2SZrHwvFAKfBV+
0RM2lV7HyGuGtV6LlhazVe7nKBEKv3e1KM73VGenOMTgihjfaeyoP3KheUQC
7HJlWiYCBhRaGZDLIsoMxRtrgTaKUErQ+JAmGS/IWtIlXUFdu4toTLgS54vc
WL8n4VLs5sfWK+2RRZkRmzG0jqJj2OeHwzM2mGohcRjQxZq+ubf10088WfP3
tlYpZY8f0Qm2Oi9NV0Xq5aM/vAjgNmr/xRIkUkNz1Vjq6sM6GclEgKg9t8T6
J5MuITyirAJ13JULKYprwTD84MLoEiK45KbvsoBSiyFrklCGvrbTrH542+MM
RbaAo5htoAxNJrluAOsoVn4Nc6+WremavvIFl8afijBf//FFnHU9pPf24JH9
n/XWYxXrv/e5EZ45MSitGi6sWLPOgqeyVdlukTI8G8cqAyLwhvfH+tnrX/cW
x/ZnfVuz6zS2qrPM+/pqZqPE8qrq28mD6tv7nIW3n/FR0NoJSo9MnI5/qG1l
U0sacLhLJ7JmLPFYHQc1FfnPMHiYY+cdsHdOrS4fmg+Sjnw0vEc6Anb8cvIQ
oF2V+DGP5q0s7eTjqpoI0i9igMnsNS5hLiFn7WZcQpfjiDgPz5Tr2udSWn9E
oTds9XJV+AnP7byjYna1F9THOuCKcGwMM9VbTUUIjkI4QV2qs3SJwstrXIGs
YWdGb89Yb6dBUU7JfQjQsMhD+80foFKbC2zmu3Se9INvbQk0LspbrLKkshYu
CVoOivDyo0s1D8QcsNDq3tYJ/ZOq9o0+P0CWQxcJ5U1BFBmOY8VKLFnVeBxL
E+6t4b1cvwMVfiN3EYKVUFljyl4L0ydYxVyzm0Q9DulUlDKH0xrw1JEM1n+E
drpiEyrvpW+Gpgg+VHgS282XYi9k0VIvj/A7RZE239VvJAwucIJ8gdvwrl7P
EoFMtrSbZpkJOiLEn8SVKMx6HACIooW2fGJzOR6ar14rMqC5AjvXdFIteLax
TPNiwxSKQlfK8B898qNwHj2SmMIVSyx+lXT6RAPlHprZFma2/UvMjJMGpNQS
RzN1fonpQRjFwdMEC68oBwY50XoVFlW0WtwHg+r9dhFRKy6GeE1zRjKuj5Eb
gwafZ2Ymr6O7vFzWZxX28HXPGcE1kkzx8gXfVhIMiB9aXHI88VZQGupcnNdL
Y1WxW0HjA6YpEpS6kkL9DhG6vlRbDlK6rMaGZSuhWz5NdeEnNiq7MmjImWaJ
VhwU+4YHVr825fk5babcjyXRFGofqnSIQtDnJxKTmXfqBr4qNxSuWg/a841/
JfejZwqk//0P/NEOxSH8LmiPOv5bW5bg3YNREsbP+E7/xzr/vtQOKP3UW677
sS1vai0roq60dIttdlq/sy3xG9QHr65F73dpU0snoqDP9qSzts/qaOtH1z/b
406pJTHlxyJElVvevE+fZVGqHvrgr93JDxcN3utKn1WVYv2Kqj+Ne/Q+P77H
+YGfVgu4W66+ygj8aujbTlqE1zAx6kUNk6gF4MupbGFTK81rHt48GfRsopzI
mUf6J+M50JyJV/k0+/KmKBNVErnlSORWI4m8eC8ayeVkHRspUTbOItAMxdiV
OiNSBb5SLjIrFWk0QbaRVeAGKk179WoCNsYoGvEVXi39xF2FVdNu1pL50mJs
QSxkLQ2HTsWBQ1yteFpHXjymUngpMlULuQyUq2U5uUvChRolrY/qxbDBsfKJ
7q4905/o7ie620x35dlFNJ/2PP1xn1rVKLI0dddYldoDm9OEP7N0uxucXZ6/
P/3e+jn0+wsZ60Eqvu2o+PYaKj5ruofAOoN9GucSrDzlJJDQUenFGtnL9crZ
p78sVzWvsIkp4n6W9h4+dcAjlt1QfaWIgal/wcK/zQErV56l5ec5157AHMuc
xKT7cCw4U217T4JIxeXkjn7ZyuYVmAQFV2WOtBJ7I55Lf1XVl0s9rGVOa0Hi
RnIVy/9uab9Q/8aTXWu5lgbIL59o/4N9fqL9vwbtl6I2FeL/nkR/+z6i/zEE
f8cR/J01BL8kto5naZo7obtOhvLxjNZbL54s1yQh+4mvxKpQza7K9GVjktDr
Dxfsy/WevThLpeI1zWIDeY35Br9QoVv8o8Sdrk2Z1LLVSi+yxUWX/u2ZtF5O
4dF8LFzgdGi4S0PJc/tK625MaLPvkvGH6gtdJ/MbduFd9dFYvMqyZs7Db6jg
57zqxn3+d8xPPukSD7T8xE/W/Px2+UmTLvGe7GTn/XQIlpQfMgTZUJ1W68yY
QEwBgDuOypNKVpxTjZx8lpD15lW9fFLDLPxQW5+ALdihbEOCxly3nsO3hJ6P
o6whWiqT+mPORmJZhxqg7DUSiNRV99pkFUmQjQQjjdOEOudLwJtIn6F4dmo1
Qvdr0jcuZFvD3krLe/BcfvlE3x7s8780fbO4XiNp9k2Vtq2ha9/qxXslqgYk
Tt1hr9K2ptFbLXEJoqmGqSt5cNZY+52YTivHHdED7qjXCKa57OxeqomJM9W0
Q/Fl6TWKKYZde+0pSVxNa3qwThlTM3MJtVw76i60zom2QArlajO5BiBLYfmU
i7WwQ46VARObikpP5ncJu3PxoV4auRDwE5sFn8cTAxWuqyWRmibHPldX8cpI
hPZ+ODan33uXbD/4Bksw9XM4jjzh++5tIGspE0RjXJoptSHUAU8vqNHpX1UM
rdPpT2Ra//xEptf8fDCZfrHi4mJNtBXlwtYTYHorYqWRU230+n1+yHslVR3X
dHkf3afjuc40vmYmdfHWkaT7CbVfHGwNqZaqSV4sON9gawOBa7dhlViN5qlw
0TCxFuRiBEcrkDiJspAKbaKM1+hkmoxSpJ7amkOlez1fR3dLatq1HsqrJrXi
SswJze/kbmq+NLuBW6YmZJumq05J4IdXrnuZRT1fqJZIO1t/2r+TVC8CkKwc
f+rdprnROFeypvvwBa1keZiXuW5dLo5t/tDi95X6dPPUfnd1/6m5MjUY0XtU
ugTGXbjdjKZa3DEpShARj0gejRGjBxxLorkP5uSv0biQ2Nurh87WlfbDwX86
SA2f+sHVurXJTUfag97jreggm28ir+J7mP+axVfuP9ewwSa/joOjRHJCMrNB
i6W4MFPNEEXiEDTZgUvFr2zv3RvsCzfViXmVd7l0yyrjqkp8G7SpipXL1/Hk
B0wh+Dp4y4RMDKf7QUFHOOjn8Y9RsLXZ1Vf8xQ/xRF7L09RVzfuBc1YL/608
+SHPxvVv0qzS1SP+fR++pJZeidM6lrqXJneDa1+Xc+9yCSaYmEBZdooxvHDR
NR1aidMTeXJKh2KVRfaKo6qU2dFYuVdDLj01KUmTEu6puXx8b1CduGnRV1ti
H3SBA56TCEWMqDHK+6LgTGiCc2ENKOf+l+5Zp7d5NEf9ZlMn2SRw4aZuMerK
yk30iEGjkLE84NvD5Jm9IYWtuhy6CN/cQvbwJnK2ZEsu4dXktapx2Jm7+Qg3
0iOP1vIp5ouekhLlFAJngrjZParsBKYKqasgW/hwugxH3JuYFXOLiaVB0zCf
wYRuNvaiYWe5CH99MyVzMn3PDcUs+Aut+W5eomZqajbD5dmFlu0kCEie2+xm
e/O4mu0tWcgXpDgsZ7TAjpbxshE03L6Q++7V7WDJ43GaVQlZScuwpLsW9mNK
SD3IdfTqmwUqXjLNybgchOKNcYgrT5arHSBp5LhgrFIgw7rdG86W49vKtAzO
uIsCectNUd0HEy6+ExcDpqoHo7B5UrbAsbmeUcd2wopxK4wq+OStju/ke5iH
qfO/tC1aZ9OVnKzcZyrUnU+yKQWudxqN/mpqiIvrI8zvFgQpLo6PuqrpdRYu
5SIMmc0EV35wxDsXE3W5i4Xc1goCe03orh8AMrpY1oW94m93SopsAb8Gdi3l
lydR0SNI9tRGoVEJnLap2XOizh/M4rlcx95qPXNKO/oemgBfLrbpAMVx3RO5
JsoW4UYJBxM/UYJzO2Wegfp68x6qG3Skct5tlHnlM+ViU6ZOdlhzDwVedGpX
H97nWnK6u68+N7uUflU9/vyTO2ldy096/Jqfn+FOqipGuC6YERkHoVRMLVuv
XqMcJ98zDNWFfvkwBf5cXE38He3ss5MzKOf8xcHROTT1nFX0yozquvlsEt6r
m59b15PR1Ks6+fp7NqBkGEp2+PLognnAjJPCiLX5AbI0yuPyDQOlkr6zWMQ6
05t/k0/CjLKXTnsj8aCLhUBls6iSJVy3y7IPSiQ2aTJOr1FKEgZdd2ORCHx2
Nfa2YaR1Lwub0h3bgvBLpKilq3xukjOlvKmkj1nVC+pmxZZRujCkzO9PuHdz
9TfbKowuUYa2wkdN7ybdTfhIjTeU2YcUeS3nrrv0ef7v28+QeN9qnUVZ+S7t
QEoEe4UOSpUINHwO4ooosyznQlPkv71C6xLGx/KXSfBrTqeXUgtDlI4GztCo
+ZSw6ejb3pZ/a7fcE95qHTZ10hVlQxFG7mTzayJJiKJcfZ3Xw2i4b8PTKzWR
z85P/tgbdOW/2/rfna5OkHk//bbTr4BxuspEJpmHozRjySi11fYZ34CmMQuf
nBLddmt9r2oGsmB7IdwiCqXU+XQ1N3lEjE8eFGAE8evINByTu2pWMk4FGlDP
Rh6rycqmbM20rDfy4Jp22ObhQnc9fOnay6aeQRuuk9RceMBROClW0bFhqctw
FM+5lqockoZ6wNbRIcTHowZcyj2LRAAbRVp4xl7hweoMxMEwueN7y1YGlJKz
NZ1Hb1g2V7GdU1Fl+K6tbW1SZG/S1xFDkl1MgvYZfPS1Qin94PvhwYvnZkVh
cJ1C4yXykqTz9PoOoWLx2FMlZB4MBktd7J1ybsmm6nJe0jVM8XzRg2k1CxqU
8B8A63Jp4+B1kurtRpDeX991mdQsXPFa/RBKfjyX1GIS9ZOJkuapyrbeF3qH
Fa6ALvyqQeZWtFgybdep2iESePlKycWCPVRQ6KSqBfu9KqPZ6zbEsjriCLCJ
DV2IAPuxA1cj51DJOkbNw5hvTTS8rRoWB8MzjUPTHq9yOfNTvRIiJC1tzrWP
sKZrlSdwE0MvX2JyEqjBlinFaxOtIZRLdGFvVhpt1jAtLSZ1Lwtoo36KlG4T
bJDwxGYAyI1HLqLE3jIwxnVWTIKY5XN6tN4gwVZ9wjBEuXUROmL2KpxLcW8O
BGRTiZZdKY/iH9g7sepLIItAIuJaVt6NO+1QdU6cKPmdWcq1ELDMHEQ5gF8J
Wtkb4AlCXOBO41kS1roXBFbcOtN390q5BWvivxTwKRFQ1t5Jvko5a7yqNat7
nDPHoZjjI+MnBxmSKcG4GM9BVGOuk/WaQ8+HwY+EIr0i4ysCYU31VsAkEnc5
LnGJZoZd1znSVn+lcoteNG7pF1OodLTC1aFyE6S37TOSM5DqCjvdBrGx8Tza
UGODwTTeC2tMZrLp44SJiJSPmZyY6/DqhNAAE73oyaqjBJglq7mwiLB8YUuJ
ljIf9KpGTACk9872rlOplqhS9mzINBN0Q8a5oJjU/88Fn3g3OJQL5skkVTuz
mtomkMzSpbpMNogJbWiqtEeaupZazNKlVl+FSJchdLV2orGOUeT2LUrk7hHU
CAqXTBYxFiFurkScThUqO6g4iKmaUlVyNZPkMsvZJ3kwyX8heZCHIE2xIs0N
mqQ5SOScJc3Xksi8uMCeNai53OpwgvsvRW25ieytbgRXXNshdaO0Qq3GLxcw
E9+VK8uLadHg4BiILvcTcJUHbUOKBQutXHODr0AN9UrTPg/m5YVkUsWN98QI
KtYjYUN/Ty96xpFSuUDKFWjyls8wieRGUYgCY74BChb6lV7rWulFLgSSurww
zkudD5FpEDcSFapgZO7yJDhTgSYVgRfzLW7T8kLlgAuLZGmEgSblDsq7QgCF
A8fCwroxXalMc8XVvuyh3tiFswZtAPY8iFwiO3Ke/mpZkJ7bDS6eD/0WQDI5
2rYAHYRCkqrvumZfoBEv5DYtjii3TbtygQ6qnJLCMA9vjSigfNzFTPI1QyRQ
JjaB1BYaxNVCJfQoUU81zPmOXdZ1l3zI7P3f7jJS4uRrrtMkVLiIITsU9ro6
OXpdzntSyydiOJkYco08uWpIY9jDQhTzGv5yyE+ayg1XzFZYdvAsFUAUBINK
JSF2qcaKhWqnz81VkNYg693c4V+kk9s7x7BOe4eryteqPLKwpHdEjkKoeHz5
Gi8M71ZLuTpyDrbOl+CZW/hol6IkZ+8a0zve4Vj9VoElC9hs9aibiNm8Alwi
dlyRklZhP8v5PkhSSljU5gIv9l1t/+9+eRIR+yUn8tVI6EXOhURspoISEaEf
XCo3hwSpdxt1RUC7b9p/O3pzunZW+Po/CSHq/jKUyLu20oLtheKsyPE+tj/2
MB1GLRIsPXCr8G1ORGhqMuMKJ7aUQAwMOIYAC+VaShx4IRwfchvuEroRkej0
4uLoQAQClX992bcd6fW4eoe1u7CU70YlUZBoI+5Rw2WJ7DZW48IkGjOh0RQp
HYb1R8UMnWsI4rCIcN2xsG/nb0KFgfk1EGqmAlVFV2TZZHdvZyA1YFzZXMJ+
op2J6olTDoRNpKymFGekjeNIBcVnrKCrlV8IuLGp3sRUSa97uQyvtaDY+dEf
Xp2cE3Sc/BqLF5pvsQI1rVV8vIqXu/0wW4ZXUibVqyXjsQp2p4k/6uTsZhcx
CpmW1dUbqpJ4RGSJKA9TCtGJze2ubiXgWFbK5pu2WNQ1VwYSTk3jN8HV1ubm
YH978/HW3pVYf2zEEtOnk+HpsJS4xoFI2/1N+r8B/7vVd8vq9VQhz+QETaTA
rFxtrWSO2jgy+z6SonHacbStyXSzUQGnF02kd90Mu84FeD+tL9/q6m+EMS1w
EQ/AkHMy9CXXgCMm55VPljhr1S7kvGGZ8Whlen+Gu1fb/hgduWAw9ybJUoi7
Al0verT3Wott0R4jsZv76zQXu5uejeKvYsjtLGX0Kvj8yjWHJsSEPZZgUFxW
jc0hjBti1DecWe+G51vs+Qt3UWgNlZMS3kFTV8ueIK+/bMs97eW81LmhpTyE
CaKiUXB0KhXzuFpbVPTM4548hjmWtckij+ZT2pRzxdI5VyvMHcOp7D1vLNeh
mxtvvlsWWyN9nUBPJHuzs5oRe7C3twuy9UxU9q6OaKbAQwmPYk070WDQ4m4p
OjIXQtbIUDzUaBVJeC3V+28uMG5q3cW5FBlfSLjPd6joKybBQiJpbqM5tFPj
nP5HWeLveKST06AdvPx2eHLIfz474TtCcV3gny9O/8Klr3zBtNNqSeOvOSDm
msDCQi7H/387hBEaVCR8HamlWnxsLfT9tdwAuMsDNbai0aXR7g5BlYRRe3dX
Y3PM9OvgOcK9cLdpRNToBgYlrRbmdn3NYFgF/h2a0ojw9V2c0tNyzT8A4WsG
BTDES+09GbZ84Hzd7HfkE1O6LEHj3L4zIiSNSSIbYZxcqcy3+/EdrXi5USmg
IIV8NnwmdGHqPO4SzdxCC/yy07fXG+LPAaF2lJtbqGWY83MTt8JWkXRpzUJY
7fl5QwXEPPiH4CVb+vWe3UtC3bwBQyv3uBAgCEfFEUjwOJSC8rxCOTHmWtJq
HYr7cD2fpTZChTilFBzyrcPGjalBkbBOGLHOUyoJYKyjKbuykn5wtQrzPsm7
qfAfLvYtl0B7k66AJ/Q0Bby+ypN+uRupdWkurRWaC/DE9rrxhm/4vvRU63sa
t5ZKBShFmShhypPe9N8miZWnRK7RSYuzBSYqM3/ZkClnO5WWofVC+pKVJCqJ
eHi85elsK1NVQWcRyr2fWg/E1DQtZ5ljCOZ2pb1ZidvKjDee1Yd+j1gv7te4
BSXnfOLG4Ss2YefTRZT3p2wKV4tX0Db3CcHi513UNDESD8z7nPHPmG/DCD2c
COpo5aL9rojXVTa+o8FZxEViscObiCzYfIUjeaKpaQzwlHkfGyV9sqTW1BKl
kktCLZ8Lg4PDw+fC7vZ2B5skQXoXsb996wWP98aTyRx8WVJZy7exEhaAAHb5
4piAI0xtcCWPwAG8uCH0RiXikYaZs2AE5ZUOPck+I9VRmGyw9mVL04pzwpg+
5I4ufzlqkVhIkVsrUGNusJErDSFNS0o9er6eeZRcFzM5EkSncxPMSL1A4uXe
o+QmztIsYTD2hdxbxy7qeGbcSCuPimqhsjwD4Ja95CiCP3HhkBwZZ5fk2QKM
OFovLMG2CUYnpmTmk9wnEV7zrg0cLmZygbzc1nwEI1MydvUVTMIdl0EG2jyP
k9dBW52V2KRG3keqepgp/mv1UvQ2iuT+EJs+KMG7cHgWZrcBI4KQTtdPUwAW
WrpuweNz4tK6M13bRXBO7IpwpQe3uJcJUPgchp2IYuvIFiLcW/Y49YMlG86N
u+p6FFl/o2j5Peo3NCqKEDPu20wn924SsM+s9D+ZsKvB1n6K/FrHsIqYAv8d
ZW2smGOWbCaUD8X56mFg7tm5PLB8ViITwYWBpYqPUUnikQyCr4LLl4cvuZot
SVrcO259mPa0WDTLLZB7EX4f4ezLBerjUZr9kyQagIbva3f4uUlG+3qrcdd7
GNYfSgpB8PXvOIkAT36Sl5Ei8X4wsvkGOvvMHypWKdN/hp/ZLC7kW82KGOx2
g38KZrE+fPy4YWxvfF4XoQSnH1Q7pxf+vNYvhjuUZZkMCQ1Fq1JfG4rm7RCI
iy2ZAxgLzblieF/5chUTm6kpN7DB5MOk7DIWKSPUkDIzwoZe3s5NQfbZEUbn
2dxfJphmw/XDOZfMVra4IfgJRjmKqGW0EbSvaOuvBJG91xwtLW/BFNm0V4SL
JfiayKMykJHhZD7sy5y6G6clxGOnhyg+cz3ZTTpfLfxkZhPuYty8tJiM1GSY
84rVJOqyZU5/DefyMEAWWC7xK3cyCkRoFq9UapcplUt3uso/KsQo73k4/4Et
kzN3MbcwOT54D1DEeOpEBNCsjM0aQBBD9RVHzPlxaGKV9WB0V0SmvDfuZtOm
HhVTjuG/9dIaViNZale5q1S9zyZciL/jJzTFyUMr0tkbZVFnb051CcnFUitK
PWQxo1+W3NKKQSDmNmDKHzlWbiqYb/tgAwypmRzBpNjo0nI0jlANX/ajdtS/
7nMZcuIGxC21LojeFCiHMnqDTBGS/lg88Rm2qoYwqrqOcCmRnAiQ/a44ek1g
ii9/d42YZpM/sAk2qcYPqQSLaNoFFWF0DxVWV7PYKgHWoz/xFdYrkNYrWHYn
kTIk6zDAPHzJ1WQNscGTjSqyWWa0l+cHUOJFGFuZoivstiKxsGvyVJKpvbXV
2AYtsVDLhQrWpXH1ldiNsAAdvDAJONoFtsCaut2NR05fMI0UVApdU6bdcAlD
nc3f9aNnUDMUSZAFVhVx/H0RomzbiaGsnu3jLLgY8wozNMij5DSrXOUw1uAu
ufmUtiUXn4ntpDpxIjelTOOwGZEcDFwkgqt540ynuCovYoyxt1tYDPUkRxPl
KvoDESv/poUk5aPBiX/B9/0nm0+DA+duRazuG3omZYG8F8GZ89v4jy/gliF1
Snoa+z0xIV8qibdXy0B+thdfsKmnKXTZtNPoaftB++ioI6vrIhed8+B5TiYF
L+8oE0oi6IysThC/xfLrU9QYJGswLU2f0X7k+0NNhjb7Ff3XqbUJKW2T+G93
0ZcLu/CH6EpPJka1sFlFvFKmaa8uLjproSRzYHRkkaI0fZe3KLVY4XbicUzg
411w9i8njpMwNcuiUi+Y/zSeRyVlUgvVmYtCBPwg06GzELPaMnkdQydj17XU
inV3D6fCDugjQSkimEdHvHO8EmRpAtpRgjBzPTtz41NZmHuIOfD6P/79fz2P
i+g//v1/m+mKGi6xXOyZ49hSDWEScmJ1VxiLV4nJRZyTYmc0g5QvuoAfCuGe
wjztxdN5jqyD5SqfGWqIuTGGVSfHJQS/Ks/NiJwxD6lOCbkOdgvR2NXA1q5c
sgQ3J7Y8h5xqFjTVuOEGldxo5MfuClAzMTud1HnXocEA6sZoZfP3OOrksbmJ
yDrMy6ddYpxXec433JCOywGEPq0YWptS+2DYMcNwHl6JKkh+s0grMgEYoD7P
g6EZ+UCicRvoU3t4cHDWCf6ML3onw8vj3sFZb4JEvL8IXzgY4vojb2w+Ugdn
QnhN1TPIsIgksF486pXOU5rnPbdqSdiptzsYBpcc2wLzPEdVweNm0yuBAFNJ
84ah22fG/Ln4ws2mmM2wxFNKUur+WU1ePo3zfTHWHabjYLA52H36/jCjiUJw
oXNUcPJjGKwyQ7fDQjCQKM00tFf8cSSihNXmQmlvgs3+021L0ej8YQsIul/Z
dlIEiN/jbOYiWRhqistxQGJyqTAQJxK9ylYklqK1v1br6Ej85VrClMhznb53
SXcp/PRMakXazBlLjv8SmYs3SWqsX2ljL2wkUhyK6wCHDkOaLSl15Sg/QfJi
hvdztmixSXQev46UprDBThwNGuTrRedkCDRO9PUkvCOkt29lvaIuetxNic4B
23ZFUACx5NjcmGjIBA6b+Z3EI2uDKq9jkgD6QavI5JrNFekjkpyNGxPCzN30
LTGiRNhvvEiAnFdMkxtyZi9fIWnTyTniJOJZLAhE18b9aAaZCn9qnhyOLSpr
hzHhBRO6oyPLnQUOSMCYTmFjYwV9SuCTcweAGXEtNBFYHJvtknW8dOfayEo4
u2Vo+SXKrX3wDdOAVW6DoImQcqUYDXix1LkIXp4csvzl5cZzYp6hPuyrSjPn
s2J2gx3yzi6PAoVAWGXOvnw41RlDzVV8UvrLhC6zc5uTk4CTTIi0aO1tmBSP
2elfJur2OrY1n3KYgOHIOIlwiHFkANpbK4KIHxzOYrFelUATi6dhslzzzOde
xtcdEGspaBFZbjNPLJM0CYRMHxsk0ZENHwrlTvnL5xfD2sXyXU/S9myd6ixi
7YBtI4AX14531dXiBVYA1PB2SJ3hQjk1XBBnKzfiwuHw9EijgHaf7mlGuBgu
RcyQi4iNkM9lUjheASFuY3iyaGiOV/IAJtevDE8Pjvi+2yTq6Q2x2j8Oj8iW
KqZJun4vyeJJb4zLzMQpJyGNPhTlDhONeL7BYcapshfzAteRW9YPntO/j18e
XJz5d9iqjKxLYCa18s28Vqmyhe8rCsgLGznVapHk+r0LEZIdxyHhCA+Xo+Ns
RCC66mvzujQVSF3QhtoeXGQ5h2V42fP6CadoSOotMotqzZgIs0RhrBmlmFb1
w3UFLbv+3YYmOsjrMVkjRDROEKScIwuFrAhs/BZSIEPF927AoDy4ODe2Oyt4
rEyAVuMweOHbhZwLk10e5WAnuTWIS/sFx+qTHB68OKqNSVQUMq9WofBpbHUC
Jd8sTT83lMzAu6js9ZWx4x7SX1df8Qz5sIs4zkFKmpV1MOwHwcn0vhKFEo1F
Kou55lkoCVzeNIlv2Jyrpa8MT7wKNHSPDZBegJX4+lzVJJ7CBeIPDkq4emPC
upj3IWiCVCODe+ZlX2nbuWfLAutVzxqIH2eR0hHt8kFV9RmnVTFQEpcmNpQU
Lr3z535El3Pgc6weT/hMvSeqFsoV23Q25lZTtBpS2eBgUMzUxnFl6WFLisra
JI8xdESoRCGOTIhJq+1CTpSl5XytYJ9vHe7A9MHhgQdG5GH5ijvn50z8TB0C
MVPZQuh+ur69GfntZ7VrCKvhGPa2eknTMe2EkZvOS9muYg93Zqo/87Tsh9dZ
ulr+pT0rimW+//jx7e1tPyYa2U+z68cSB8cM9DHAx//038yKBbvpGxdzzOPt
t1r7UkYqnWqyOp9HU2bKpIfDlV+uUk0IvtJ8VXpRJoepRtbi/LPmYwiEK11l
16XRHjaKQvPzj+OMJnUAOUZ+5VCnSdA2gT47/R252BUO+8HWLrMyDoOw98Jq
tQDPmkHLfRdAfuf8pHcc0YNiF+y7Y+NV8K71zlaKoFfef+xD6kNtm+9wLSyR
FPOAUxAWSJHmCKec297Gk1JT/ruxJaksKK7tmsqDxra+FfhFWEhIyzvxqb1D
jgE/ySVADuWiQEI4AYDk79W8iOEjko7mqINtvuQ/3+OzvDLi8PTiJDi4HAa4
6LI3rJSJwxel2xG8mXpPORZR2r6OXBt7YOQx3nN6YkMDeU4tJtndd1Vw3soD
oLorgiVW0mV4R40mAttktThPOTHkHcwi9K8ug74kPTGUV9QQuZDPq6jw3LoI
8FrSUsaQf73doxG+4aAOWEDMIHgx4qd3Bxri73VrcCBEPTPEza+0L/2ktlr6
4HU8R3j6otTwj+m8gHmw1PKGHpZaHRBFlhNqoSwb8+aSNuHldPrweNT2TMD6
Xm2P52h0GS+i6qqTFVgHN4sTsf3S+b6MFstyy4Nonscr2+F7toyX56JL24Va
WRMEWN9RwwhXi0RKMzyYTFfRvPlp8zbOY4sHpgzIReU0IdiK1Eg9ZBIHAEvW
OzCzC5PZ28DQQNzOQQERF/oPwXFkXrdah0KvTTkPbsHClq2Oph4fKJpjFKbK
osSoICYihgUtya3uqQbFGfMWZE4exzErjcYmQggwYh9mHwgsjJqRXrKSyCVb
pKzDrOR8euWMC2eF8fhmDhoCP5mQf68WjMuN5honwS7HpttlcbGzSFgazdA6
+TzXo5Fe0H3tK+vDcZFJkzrIu+7+3fIsxIKtsJVq22N7OXvoXc9uk7JNKIyJ
BaWDy+H6ke+6kip6jbClLjamgiDRZIPYPyyejsqz7p/PwsyoyWXImiwWKZyI
EizRcp7eLST9KFfTFUewpczTuUrpasLZvVqQBjSRTRnW92N8vuxYYCTkCAZS
Z8WQbVQiSV8pW3Omq2RsUkc0vPxbd/H228+qRdlqobyxKWGhMobEZITJHcz3
/xScRdksRLw7EsRR4tfmi8E+ouUpX54+/5MropcaQySCx/DRrVhEbZjVBooT
sT5BUN5wRTSMS1GSDGlBryyCHw+R6XJ6dv4CUW1SUkgqBlkVBxXhNaxVVLRc
A7ZU5zGKeblqPClFPewIRD690EgrENqgDJO0z3U2EuftRKgTj36bqheQo1VE
pBrsA9KXM2sFMuDJbXFhrikMjwKOiIk6dAYaWLq0Jp01mxRhBsO1K7epmChB
AF5P3OTzvNRJtVi/qAua6kkHxkXTaZnK8nWH5lK/at1PPVUiSEtpGmIy5vZ3
XYw5trVKYR02A0ZJzEdagbdVBR7GzEuDAojPTtR0plMAAbPFnXM60p6NQ8Al
FZ6ZULD9Qs2RWrGqLeqhbyHTIQUgZq53qvCHXLyGpv0vUiZaxG6/hnDJy60F
ERS47mAU1jfAagc03MOVnnNtQ1JwbGrjamyqq1KqFS6tIgP9m/UJUCPPgthV
hsE6lr+3r830zf4PXWFvV/nVHHa+0gGitl8GE/UpRaG1LrWhLQ/pnypGoPJn
7HDmalc6kUp2HjsZ/48WAtVIhf/49/9rPUpWs3zgMgqOB+BbHMAwCAHBQsJE
8q0uihWcXAegce3h90gqjLJlFv9I4Hz+/EAC1r5JR/CnvyZVq/gxaD+7vGRx
BMwDaafczjnTI7ZesnvW1GT1tFsJDuDSVQwh+8HYzJB3ex7Gwn45JskrAmTN
8moQdcXdzLo5ixQJ4KyNInDUxh6UF2JyvaXKO5dhnpujw8YzXsO6ImyiTsiB
UIMNt6d2sIES1KFAjsLxa1s343gF0vuHFbEapqReAQ0upQZrCKc5NCV5KlPT
978L3uLY/9R/m16HP8QT+mU2CenfLMS/ElhEvyCBG8YVji8frYjH2vzO4PgP
h6c4RSwPLuDWHEXcpvDIMfz/bGtpi7tIjGsaIdOxNdnYl+vHN2lcLdL99oN+
LQOgj4SC/YAz7jY3tzf3N7f2NvcHO5tP9sc7u0/2B092tvbD7e3p/mS8tds6
OdwP8ByP8ZQfvvx2uB9sPkHOE/0XHQx2WkTx8Qf9RjwAv22GrTOGhoxGg7Ww
8Hp//c0nfXzYxzd9bds0c8lz0hLMZd337WcmU4W3iPdFzAX0i6/+9mDA8vbH
B1Y1TabfutBa5i+OzzeHh+eDs8HFwebm81bt5kBp0hK1dD8YMuC8D2Tlk2yw
HOTjzc15P+wvptlmw5C6yKCeTWGEDUXYUgw7g6WhxiU1vo5+0mVqDPkPTTHX
Hxwx/f85NPrnRT8/EOJ8HZUim5vgZSKcvXDV2Esa8eO+nGRm0xnaceLfK+Qi
UEd3pRpLJkh/KKWGTe1PLggnn5s8FPqwfNWnlwJVuTWTlc3j7Z3BoBS4whE4
fT/+lkPwvJjY2hjslQT+fUdK4BL6FCF8PIUOimUdI7lQJ5qbpL75tIJ3ucU7
BAvej3T/qbEuL2NdDVQG5V7lfPdWJnnydQ8JRx9CQFmuitJ+AmtiDuqy3o5y
1j0JrjaYFqGyhu5tBvWfQcOzrYZn2/T1gN5sBzvBk2A3+DLYC54GH/CsVStp
/aF/t+4tJh0Efzz95v4G736NOdSuH/zV5/Dgz7u/hx4Iif/mc/g76eG3j1Gc
rfZRPXz8HN6nh98+JD/18FvpwaYc/A3n8KmHv7cePp7CVGRN1VTWSZvf8OsN
I5sj07YmrY5g71knrX7z8lzvuG7M0SbJf2Ql/5Fp8V9X5xyVpf9mmBkV4HCd
RiZZki4hKSx+tiL4yqsO5nLvtYZAMHSm83RVLMW+2Rx5ErCWe8c1b+dVhaSq
MRu3Zppgkq56YChe0GqWDgJeOiIlcEkZBPm4UjnPTvom6S+2rkVxoBoLvukG
E+3Yi3Q+TuH5EO3mk8bzt5zDgz8PUG5GPMKrn9+D3jr1MT08/PN3AMnfRA9i
//iYHn6d3fwt9PCbx6iPP5tnwik+oof3+Pk7gOSnHn4zPXzSHT/18OE9/LK6
46iqOzbrKg8pkKOyArlG4TFaJOdPuBQHVx/yhUQaDeRqi14+0AGRF9j655fn
J9+enAbsQ12F9Dph92lLXWmD/h5qkaJmTjsw4fz6rj9OF4/z5PHR98MXZ8+P
BkHHOZbLY2+Zsbc+ZOwtGZuzFUn+V3/2drT35db0y80n0+1x9HQw2NoZ7X75
5WT3SdDv94ONF8fn7EHe4H/3dG5bD8x9iz/Wa3M6LTu17f5Wf9r/sr9J/4b9
Qb+5AHJrt/+kP6FmX/Z3+6P+Dr0a0P897dMw9MmU3m5iJagp69bWr617DfS2
DfS2PwR62/dDb29nNJiGW6MvN3e2BgTF+6C3/QD0tj8OegKtAT3aoRdfEgS3
qPmUngCWew3Q2/4A6O0Y6O18CPR27ofeKNwLp0+2nmyF2082tzej+6C38wD0
dj4OehH9iVdP6N+QXjzh/+GTPfrfqAF6O/dCz4aNCdjSZRPYNumnvz2dRjbK
BEYE6akKG4lKWdu+AczT6XQPX6wB8+XRxSUbXDaCBElcTeA119o/frQGupsM
xz0CFP7v42H7gav2sdXeE6iIGk8+GOS7RAq3n4x2B7vbm7uTnY8BeaWr9we5
3kP9cRDfITq6y1BHbeRdhvG2UtLdCsQ/bNEO4u4aa4U4G858mCPwys77gRnz
sjAnYr/vtUQO8PowqDyltWP1I3pMj4gqPmUI7dFvEf3Pg8pOtLO3u/10J9zd
HI12d58+BJX3wq8P7PQ+/Kp29dH4xdv6/wARx2I00BUBAA==

-->

</rfc>
