<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-15" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-15"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="01"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts is performed via DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>Such extended information is retrieved from the UAS ID via the use of a DRIP Entity Tag (DET) <xref target="RFC9374" format="default"/> which is managed by the DRIP Identity Management Entity (DIME). In this document we assume the DIME belongs to the UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>) but a DIME can be independent or handled by another entity as well.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="RFC9434" format="default"/>) or Network RID (Section 1.2.2 of <xref target="RFC9434" format="default"/>) is public, much of the extended information will be private. As discussed in Section 7 of <xref target="RFC9434" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (typically known as AAA) is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies which are out of scope for this document.</t>
      <t>The intent of the access control requirements is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information.</t>
      <t>Registration is necessary to guarantee the uniqueness of the DET and thus to ensure the extended information is bound to the UAS ID.</t>
      <t>This document creates the DRIP registration and discovery architecture focusing on the DET for UAS at its surrounding ecosystem. Clients in the architecture that can use a DET include Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS.</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="intro-concept" numbered="true" toc="default">
      <name>General Concept</name>
      <t>DETs when generated are only "proposed" and MUST be registered within the hierarchy to become legitimate. DIME's are the points in the hierarchy that enforce requirements on registration and information access. This document standardizes the basic interactions and methods for registration and lookup to support interoperability based around DETs. Other identifiers and their methods are out of scope for this document.</t>
      <t>This document selects the Domain Name System (DNS) as the Public Information Registry for both storing and retrieving public information, such as the public key of DETs and pointers to Private Information Registries. Personally Identifiable Information (PII) is stored in Private Information Registries and MUST be protected through AAA.</t>
      <t>For UAS, a DIME can provide the following congruent registration and lookup services:</t>
      <ol spacing="normal" type="1"><li>personal information (e.g. for pilots and operators)</li>
        <li>UAS Serial Number and aircraft physical characteristics</li>
        <li>DETs as a Key ID for UAS RID Authentication (<xref target="drip-auth" format="default"/>)</li>
        <li>DETs as a pseudo-anonymous UAS Specific Session ID (UAS ID Type 4)</li>
        <li>binding of UAS ID to UTM Operational Intent</li>
      </ol>
      <t>A DIME's services are determined by their intended role (<xref target="dime-roles" format="default"/>) and policies (both internally and from cognizant authorities). For example, services 1 and 2 can be restricted to non-public access controlled lookups with mandatory registration and 5 to publicly available but access controlled lookups.</t>
      <t>For this document only services 3 and 4, as they directly relate to DETs, are detailed. Services 1 and 5 will be talked about conceptually while service 2 is out of scope.</t>
      <t>Requirements on the elements of information in registration and lookup (beyond the scope basic interoperability) is out of scope for this document. It is left to cognizant authorities to determine these details along with policy for access. For the UAS use-case this is Civil Aviation Authorities (CAAs).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="RFC9374" format="default"/> defines the Hierarchical Host Identity Tag (HHIT) and further specifies an instance of them used for UAS RID called DETs.</t>
      <t>As a review, HHITs are comprised of four major components: a Prefix, a Hierarchy ID (HID), a HHIT Suite ID (fixed 8-bits) and an ORCHID Hash. DETs use a 28-bit prefix and 64-bit hash leaving 28-bits for the HID. For UAS RID this HID is further divided into two fields: RAA and HDA, each 14-bits in length. <xref target="hhit-fig" format="default"/> shows this breakdown.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28-bits)   | (28-bits)    | (8-bits)      | (64-bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14-bits)                      | (14-bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t><xref target="RFC9434" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components (<xref target="dime-arch" format="default"/>) and can be classified to serve a number of different roles, mapped to levels in the hierarchy, which are detailed in the following subsections.</t>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is the owner of the IPv6 prefix portion of the DET associated with it which is assigned by IANA from the special IPv6 address space for ORCHIDs. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex manages all delegations and allocations of RAAs to various parties. The Apex MUST reserve an allocation for itself that it MAY use.</t>
        <section anchor="drip-apex" numbered="true" toc="default">
          <name>DRIP Apex for UAS RID</name>
          <t>For UAS RID the Apex manages the IPv6 prefix of <tt>2001:30/28</tt>. Allocations of RAAs in this prefix SHOULD be done in contiguous groups of 4. This is to support the nibble reversing of the DET to be placed in DNS (<xref target="det-dns" format="default"/>). See <xref target="iana-apex" format="default"/> for the RAA allocations.</t>
          <t>Values 0 (0x0000) through 3 (0x0003) MUST be reserved for the UAS RID Apex and SHOULD be used to endorse RAA delegations in Endorsements (<xref target="endorsements" format="default"/>). While the individual Apexes can be designated for different purposes they share the same pool of RAAs to be allocated. Such operation would require policy by the administrator of the Apex to avoid simultaneous allocation and is out of scope for this document.</t>
        </section>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>An RAA is a business or organization that runs a DIME to register HDAs (<xref target="hda" format="default"/>). Most are contemplated to be CAAs (using <xref target="iso3166" format="default"/>), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA:</t>
        <ul spacing="normal">
          <li>MUST provide a set of services to allocate HDAs to organizations</li>
          <li>MUST have a public policy on what is necessary to obtain an HDA</li>
          <li>SHOULD maintain a DNS zone minimally for discovering HIP RVS servers</li>
        </ul>
        <t>All RAA's MUST have a single reserved HDA value: 0 (0x0000) for itself to support various functions or services. Other HDA values SHOULD be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contiguous values (<tt>raa_code + 0</tt>, <tt>raa_code + 1</tt>, <tt>raa_code + 2</tt> and <tt>raa_code + 3</tt>) are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined (by ISO 3166-1) as "user assigned code elements" and do not have specific claimants predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants.</t>
          <t>How a CAA handles their allocated values are out of scope of this document. Control of these values are expected to be claimed by their respective owner. How a claim is vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <ul empty="true" spacing="normal">
            <li>Informational Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces. How this is claimed and handled is out of scope for this document.</li>
          </ul>
        </section>
        <section anchor="experimental-raa" numbered="true" toc="default">
          <name>Experimental</name>
          <t>The RAA range of 16376 (0x3FF8) to 16383 (0x3FFF), eight (8) RAAs, is allocated to the DRIP working group itself as an experimental range. RAA 16376 is already "in use" with <tt>driptesting.org</tt>. The rest of the range (16377 to 16383) are reserved to be allocated by the DRIP experts to agencies or organizations that wish to test for a period of time.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register client entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and UAS/UTM infrastructure (such as Supplemental Data Service Providers). It SHOULD also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>For UAS RID, HDAs can provide any of the following services:</t>
        <ul spacing="normal">
          <li>registration and public lookup of DETs as a Key ID for Authentication as defined in <xref target="drip-auth" format="default"/></li>
          <li>registration and access controlled lookup of DETs as a pseudo-anonymous UAS Session ID</li>
          <li>registration of UAS ID and UTM Operational Intent to bind them together (if allowed by cognizant authority)</li>
        </ul>
        <t>An HDA SHOULD maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service MUST be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote.</t>
      <t>Interfaces with a specific transport requirement (such as HTTPS) are labeled accordingly. Interfaces not labeled can be implementation specific or proprietary due to co-location of components. For example the interface between the DPA and Registry/Name Server, when delegated, might be Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/> (due to Registry/Name Server requirements) while implementations co-locating these components might use an internal code library. These non-labeled interfaces are out of scope for this document.</t>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          |
          | HTTPS
          |
**********|*********************************************************
*         |       DRIP Identity Management Entity (DIME)           *
*         |                                                        *
*  +------o-------+         +-------------+      +--------------+  *
*  | DRIP         |         |             |      |              |  *
*  | Provisioning o---------o             |      |              |  *
*  | Agent (DPA)  |         |             |      |              |  *
*  +-------o------+         |             |      |              |  *
*          |                |             |      |              |  *
*          |                | DRIP        |      | Registration |  *
*          |                | Information o------o Data         |  *
*          |                | Agent (DIA) |      | Directory    |  *
*          |                |             |      | Service      |  *
*  +-------o----------+     |             |      | (RDDS)       |  *
*  |     Registry     |     |             |      |              |  *
*  |        /         |     |             |      |              |  *
*  | Name Server (NS) |     |             |      |              |  *
*  +------o-----------+     +-----o-------+      +--------------+  *
*         |                       |                                * 
*         |                       |                                *
**********|***********************|*********************************
          |                       |
          | TCP/UDP               | RDAP
          |                       |
          |               +-------o-------+
          '---------------o Lookup Client |
                          +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information coming from clients wishing to register and then delegates (internally or externally) various items to other components in the DIME. This is the primary component that handles all DRIP related cryptographic operations for incoming registrations to the DIME.</t>
        <t>The DPA:</t>
        <ul spacing="normal">
          <li>MUST have a publicly accessible and discoverable HTTPS interface for clients to register through</li>
          <li>MUST use a provided interface from a DRIP Information Agent (<xref target="dia" format="default"/>)</li>
          <li>MUST use a provided interface from a Registry/Name Server (<xref target="nameserver" format="default"/>)</li>
        </ul>
        <t>Specific details of the public HTTPS interface (such as advertisement) is out of scope for this document.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Registry &amp; Name Server (NS)</name>
        <t>The Registry &amp; Name Server component handles all the required DNS based requirements of the DIME to function. This includes the registration and maintenance of various DNS Resource Records used in public lookups.</t>
        <t>The Registry:</t>
        <ul spacing="normal">
          <li>MUST provide an interface (for example EPP) for management of DNS functions</li>
          <li>MUST provide a standard DNS query interface</li>
        </ul>
        <t>The detailed specification of either interface is out of scope for this document.</t>
        <t>The Registry is the component that interfaces the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. Specific instruction for operating a Registry &amp; Name Server is out of scope for this document. However the following references are presented as pointers to material that might be useful: TODO: add list of useful RFCs?</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA) &amp; Registration Data Directory Service (RDDS)</name>
        <t>The DIA is the main component handling information ingress (via registration) and egress (via lookup) of the RDDS.</t>
        <t>The DIA:</t>
        <ul spacing="normal">
          <li>
            <t>MUST have an access controlled interface for add/delete/update of information that MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>this interface definition is out of scope for this document</li>
            </ul>
          </li>
          <li>
            <t>MUST have an access controlled interface to query for information that MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>if this interface is publicly available it MUST use Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>)</li>
              <li>if this interface is not publicly available its specification is out of scope for this document</li>
            </ul>
          </li>
        </ul>
        <t>Certain information stored within the RDDS, due to policy, may be considered PII and MUST be protected from access using AAA (for example using XACML). See <xref target="dap" format="default"/> for more information.</t>
        <t>The interface between a DIA and an RDDS is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="det-registration-process" numbered="true" toc="default">
      <name>DET Registration Process</name>
      <t>The general process for a registering DET is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify inputs (such as Endorsement(s)) from registering client</li>
        <li>DPA checks for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>Generically a DET can be used as an identifier for any client in UTM and SHOULD be registered to a DIME. For example a CAA may choose to use DETs for its Operators. A data model (such as what is specified in <xref target="det-reg-model" format="default"/>) would be required to define all the information for registration for a given classification of client.</t>
      <t>Such specification beyond using DETs as a Session ID and/or Key ID (<xref target="det-auth-reg" format="default"/>, <xref target="det-id-reg" format="default"/> and <xref target="det-id-auth-reg" format="default"/>) is out of scope for this document.</t>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch-fig" format="default"/> seen below in <xref target="process-example" format="default"/> uses co-located components to describe the flow of information. Each section gives specific example details for the components, interfaces and data elements. Each section has an associated appendix (<xref target="dns-examples" format="default"/>) containing DNS examples.</t>
      <figure anchor="process-example">
        <name>Example Registration Process</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    |  Client  |
    +--o---o---+
       |   ^
 (1,2) |   | (5)
       |   |
*******|***|*****************************
*      |   |      DIME                  *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   | DPA (2) o--------->o          |   *
*   +----o----+   (4)    |          |   *
*        |               |          |   *
*        | (3)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************
]]></artwork>
      </figure>
      <section anchor="det-reg-model" numbered="true" toc="default">
        <name>DET Registration Data Model</name>
        <t>The following is the general data model for DET registration data to be sent to the DPA from a client. This model is defined for and used by <xref target="det-auth-reg" format="default"/>, <xref target="det-id-reg" format="default"/> and <xref target="det-id-auth-reg" format="default"/>.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
det_registration_info = {
    serial_number: tstr .size 20,  ; ANSI CTA2063-A UAS Serial Number
    uas_id: bstr .size 20,  ; UAS ID per ASTM F3411-22a Basic ID Message
    uas_id_type: 0..15,  ; UAS ID Type per ASTM F3411-22a
    ? key_id: bstr,
    ? self_endorsement: bstr .size 120,
    ? utm_binding,
    * tstr => any
}
utm_binding = (
    utm_id: bstr .size 16,  ; Operational Intent (UUIDv4)
    utm_source: tstr  ; URI to USS with Operational Intent
)
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>UAS ID Type and UAS ID:</dt>
          <dd>
  defined per ASTM <xref target="F3411" format="default"/>. See <xref target="uas-id-handling" format="default"/> for handling specific instructions during registration.</dd>
          <dt>UAS Serial Number:</dt>
          <dd>
  defined per <xref target="CTA2063A" format="default"/>. Other UAS Serial Number formats (considered legacy) are out of scope for this document.</dd>
          <dt>UTM Assigned ID:</dt>
          <dd>
  also known as an Operational Intent, defined per ADD-UTM-REF and ASTM <xref target="F3411" format="default"/> as a UUIDv4.</dd>
          <dt>Self Endorsement:</dt>
          <dd>
  defined per <xref target="endorsements" format="default"/> and <xref target="se" format="default"/>. See <xref target="se-handling" format="default"/> for handling specific instructions during registration.</dd>
        </dl>
        <t>It is RECOMMENDED that the information above is signed over in some way to ensure integrity of the registration data. A recommended way to do this is with a JWT<xref target="RFC7519" format="default"/> or CWT <xref target="RFC8392" format="default"/> using the clients key.</t>
        <t>Other data elements MAY be added to this model. A DIME MUST have a public API detailing additional elements expected for their implementations. These elements and reference is out of scope for this document.</t>
        <section anchor="uas-id-handling" numbered="true" toc="default">
          <name>UAS ID Handling</name>
          <t>The <tt>uas_id_type</tt> field MUST be set to same UAS ID Type in the ASTM <xref target="F3411" format="default"/> Basic ID Message to ensure proper decoding of the <tt>uas_id</tt> field.</t>
          <t>The <tt>uas_id</tt> field MUST be set with the octets found in the ASTM <xref target="F3411" format="default"/> Basic ID Message UAS ID field. By using identical contents of the Basic ID Message the Specific Session ID Type octet (the first octet in the UAS ID when using UAS ID Type is <tt>0x4</tt>) is preserved. When a DET is used a Session ID, the value of this first octet MUST be <tt>0x01</tt>.</t>
        </section>
        <section anchor="se-handling" numbered="true" toc="default">
          <name>Self Endorsement</name>
          <t>The <tt>self_endorsement</tt> is included when a DET is used either as a Session ID (in <tt>uas_id</tt>) or for Authentication (in <tt>key_id</tt>).</t>
          <t>The value is verified by the DPA and its contents used to generate a Broadcast Endorsement for use in <xref target="drip-auth" format="default"/> and put into DNS.</t>
        </section>
        <section anchor="service-tuple" numbered="true" toc="default">
          <name>Service Tuple</name>
          <t>Five critical pieces of information are required to provide the services listed in <xref target="intro-concept" format="default"/> that make a tuple. These are: UAS ID, UAS ID Type, UAS Serial Number, Key ID and UTM Assigned ID. The UAS ID, UAS ID Type and UAS Serial Number fields are mandatory and MUST NOT be null for entry as defined .</t>
          <t>This tuple encodes the services that the specific registration is being used. A few examples can be seen in the table below.</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Service</th>
                <th align="left">UAS ID</th>
                <th align="left">UAS ID Type</th>
                <th align="left">UAS Serial Number</th>
                <th align="left">Key ID</th>
                <th align="left">UTM Assigned ID</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DET Authentication</td>
                <td align="left">TEST3ABC</td>
                <td align="left">0x1</td>
                <td align="left">TEST3ABC</td>
                <td align="left">DET</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">DET Session ID</td>
                <td align="left">0x01 + DET</td>
                <td align="left">0x4</td>
                <td align="left">TEST3ABC</td>
                <td align="left">-</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">DET Session ID + Authentication</td>
                <td align="left">0x01 + DET</td>
                <td align="left">0x4</td>
                <td align="left">TEST3ABC</td>
                <td align="left">DET</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
          <t>As this document focuses on DETs exclusively the use of the Key ID using other cryptographic identifiers and how to distinguish between them (such as how UAS ID and UAS ID Type is used) is out of scope of this document.</t>
        </section>
      </section>
      <section anchor="det-auth-reg" numbered="true" toc="default">
        <name>DET Authentication</name>
        <t>For Authentication use of a DET, registration requires the following additional data elements: <tt>key_id</tt>, <tt>self_endorsement</tt>. <xref target="se-handling" format="default"/> MUST be followed.</t>
      </section>
      <section anchor="det-id-reg" numbered="true" toc="default">
        <name>DET Session ID</name>
        <t>For the registration of a DET as a Session ID the client is typically the UAS. The mechanisms of how the UAS generates a DET are out of scope for this document.</t>
        <t>For Session ID use of a DET, registration requires the following additional data elements: <tt>self_endorsement</tt>. Both <xref target="uas-id-handling" format="default"/> and <xref target="se-handling" format="default"/> MUST be followed.</t>
        <t>Optionally a binding between a DET and a UTM Session ID can be made by providing the information of the UTM side using <tt>utm_id</tt> and <tt>utm_source</tt>. The support of this is based on CAA policy and is out of scope for this document.</t>
      </section>
      <section anchor="det-id-auth-reg" numbered="true" toc="default">
        <name>DET Session ID &amp; Authentication</name>
        <t>For Session ID &amp; Authentication use of a DET, registration requires the following additional data elements: <tt>key_id</tt>, <tt>self_endorsement</tt>. Both <xref target="uas-id-handling" format="default"/> and <xref target="se-handling" format="default"/> MUST be followed.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as private is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="RFC9434" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>DIMEs MUST be responsible for the operation of the DNS-related infrastructure for domain names under DRIP. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two.</t>
      <t>DIMEs SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. National policy and regulations will define how long DNS data are stored or archived. These are all National Matters where national law/regulation prevail ensuring DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>Static UAS specific information that is publicly available MAY also be stored in DNS but is out of scope for this document.</t>
      <ul empty="true" spacing="normal">
        <li>Author Note: proposal for a UAS RR that is a CBOR map of static UAS data elements (UAS ID, UAS Type, Self Description, etc.)</li>
      </ul>
      <t>For DRIP, IANA has agreed to act as the Apex at least initially (see <xref target="iana-apex" format="default"/> for more details). The delegation of civil aviation authorities to RAAs is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. Since these are public, any entity can stand up an RAA with that value. The Apex SHOULD be the root of trust in a Endorsement or certificate chain that provides validation of any of these specific RAAs, in the ISO RAA range, thus protecting against bad actors standing up fraudulent RAAs.</t>
      <section anchor="det-dns" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record (<xref target="hhit-rr" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for, depending on what is required: HIP, HHIT, TLSA, URI, or PTR RRTypes.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or as a binary blob by concatenating values. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases.</li>
      </ul>
      <figure anchor="endorsement-cddl">
        <name>Endorsement CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = 6.xxx(e-data: array)
e-data = [e-type, scope, ? $$evidence, $$endorser, $$signature]

e-type = uint .size(2)
scope = (vnb: time, vna: time, ? $$scope-ext)

$$endorser //= (hhit,)
$$endorser //= (hhit, eddsa25519-hi,)
$$endorser //= (eddsa25519-hi,)
hhit = #6.54(bstr .size(16))
eddsa25519-hi = bstr .size(32)

$$signature = (eddsa25519-sig,)
eddsa25519-sig = bstr .size(64)
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>Endorsement Type:</dt>
        <dd>
  a 16-bit value used to hint at the content of the <tt>$$evidence</tt> group. Four special values (1 through 4) map to the SAM Type of the Authentication framing in <xref target="drip-auth" format="default"/>, allowing the 16-bit value to be excluded from the Endorsement structure. See <xref target="iana-e-types" format="default"/> for more details.</dd>
        <dt>Scope &amp; Scope Extensions:</dt>
        <dd>
  The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps. Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired using the <tt>$$scope-ext</tt> socket group.</dd>
        <dt>Evidence:</dt>
        <dd>
  socket group containing a set claims. The content and order of claims is specified explicitly for each <tt>e-type</tt>.</dd>
        <dt>Endorser:</dt>
        <dd>
  socket group where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). The content and ordering is specified explicitly for each <tt>e-type</tt>.</dd>
        <dt>Signature:</dt>
        <dd>
  socket group containing the signature data for the Endorsement. The content and ordering is specified explicitly for each <tt>e-type</tt>. Signatures MUST be generated using the preceding sections (except for <tt>e-type</tt>) in their binary forms (i.e. as a concatenated bytestring of values) rather than their CBOR encoding.</dd>
      </dl>
      <t><xref target="drip-endorsements" format="default"/> specifies Endorsement structures for the UAS RID use-case.</t>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP). The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Authors Note: ACCP is ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>The CBOR Encoded X.509 Certificates (C509 Certificates) <xref target="cbor-cert" format="default"/> provides a standards-based approach to reduce the size of X.509 certificates both on-the-wire and in storage. The PKI-Lite RAA certificate example in Appendix B.2 is 331 bytes. The matching C509 certificate is 183 bytes. This sort of difference may have significant impact both on UAS storage requirements and over-the-air transmission impact.</t>
        <!-- TODO: where is B.2 example?? -->

<t>C509 provides two approaches for encoding X.509:</t>
        <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280" format="default"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
          <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
        </ol>
        <t>The invertible CBOR encoding may be sufficient for most needs. The CBOR objects clearly indicate which approach was used, so that the receiver can properly process the C509 object. For interoperability in DRIP, it is recommended that invertible CBOR encoding be used.</t>
        <t>Using the invertible CBOR encoding is achieved through in-line libraries that convert in the desired direction. Since it is not expected that DNS protocols to implement this conversion, the HHIT RR SHOULD contain the normal X.509 DER encoding. The CBOR encoding MAY be used, but operational experience will be needed to see if there are measurable gains in doing so.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-apex" numbered="true" toc="default">
        <name>Management of DRIP Apex</name>
        <t>A discussion between the authors of this document, DRIP AD and IANA was held during IETF 118. Those present were:</t>
        <ul spacing="normal">
          <li>Eric Vyncke (AD of DRIP WG)</li>
          <li>Bob Moskowitz</li>
          <li>Jim Ried (Author of this RFC)</li>
          <li>Adam Wiethuechter (Editor of this RFC)</li>
          <li>Kim Davies (IANA)</li>
        </ul>
        <t>IANA agreed that they would be willing to manage the Apex for DRIP until the desired Apex manager, International Civil Aviation Organization (ICAO), is ready. This is expected to be in the next 5 years due to ICAO process. The hand-over to ICAO is TBD at that time but various options are available.</t>
        <t>Further discussion of the SLA required to RAAs by IANA is and other requirements to IANA are TBD.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa" numbered="true" toc="default">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>RAA Allocations:</dt>
            <dd>
  a 14-bit value that is allocated in groups of 4. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values/ranges are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Allocated</td>
                <td align="left">UAS RID (DRIP) Apex</td>
                <td align="left">This RFC (<xref target="drip-apex" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC (<xref target="iso3166" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4000 - 16375</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">16375 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">DRIP WG (Experimental Use)</td>
                <td align="left">This RFC (<xref target="experimental-raa" format="default"/>)</td>
              </tr>
            </tbody>
          </table>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file here: TODO.</t>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-e-types" numbered="true" toc="default">
          <name>Endorsement Types</name>
          <t>This document requests a new registry for Endorsement Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Endorsement Type:</dt>
            <dd>
  A 16-bit value to provide hinting of the contents of other sections of an Endorsement. Future additions to this registry are to be made through Specification Required (Section 4.3 of <xref target="RFC8126" format="default"/>) for values 0x0000 to 0xEFFF and First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>) for the values 0xF000 to 0xFFFF. The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Endorsement Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Self-Endorsement</td>
                <td align="left">This RFC (<xref target="se" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">This RFC (<xref target="be" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Wrapper</td>
                <td align="left">This RFC (<xref target="we" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Manifest</td>
                <td align="left">This RFC (<xref target="me" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Frame</td>
                <td align="left">This RFC (<xref target="fe" format="default"/>)</td>
              </tr>
            </tbody>
          </table>
          <t>To register an <tt>e-type</tt> the following MUST be provided in CDDL for review:</t>
          <ul spacing="normal">
            <li>Additions to <tt>scope</tt> group using <tt>$$scope-ext</tt></li>
            <li>Specific group contents of <tt>$$evidence</tt></li>
            <li>Specific group contents of <tt>$$endorser</tt></li>
            <li>Specific group contents of <tt>$$signature</tt></li>
          </ul>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-hhit-type" numbered="true" toc="default">
          <name>HHIT Type</name>
          <t>This document requests a new registry for HHIT Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Type:</dt>
            <dd>
  numeric, 16-bit, field of the HHIT RR to encode the HHIT Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">DIME Provisioning Agent (DPA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6</td>
                <td align="left">DIME Information Agent (DIA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">7</td>
                <td align="left">Name Server (NS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">8</td>
                <td align="left">Registration Data Directory Service (RDDS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">ISO 3166-1 Numeric Nation (INN)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Endpoint Entity (EE)</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Issuer CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Uncrewed Aerial System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">27</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">28</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">29</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">30 - 65535</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-hhit-status" numbered="true" toc="default">
          <name>HHIT Status</name>
          <t>This document requests a new registry for HHIT Status under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Status:</dt>
            <dd>
  numeric, 8 bit, field of the HHIT RR to encode the HHIT Status. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Status</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Inactive</td>
                <td align="left">Default when accepted by DIME</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Active</td>
                <td align="left">Set when in use</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Expired</td>
                <td align="left">Set when past VNA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Deprecated</td>
                <td align="left">Set when no longer in use (but not expired)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <!-- TODO: text on Expert Review process -->

</section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="FAA-RID-NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="public-key-exposure" numbered="true" toc="default">
      <name>Public Key Exposure</name>
      <t>DETs are built upon asymmetric keypairs. As such the public key must be revealed to enable clients to perform signature verifications.</t>
      <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (using the HIP RR) until it is required.</t>
      <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID is underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-49">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="21" month="February" year="2024"/>
            <abstract>
              <t>   The Drone Remote Identification Protocol (DRIP), plus trust policies
   and periodic access to registries, augments Unmanned Aircraft System
   (UAS) Remote Identification (RID), enabling local real time
   assessment of trustworthiness of received RID messages and observed
   UAS, even by Observers lacking Internet access.  This document
   defines DRIP message types and formats to be sent in Broadcast RID
   Authentication Messages to verify that attached and recent detached
   messages were signed by the registered owner of the DRIP Entity Tag
   (DET) claimed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-49"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-14">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a transport mechanism between an Uncrewed
   Aircraft System (UAS) and its UAS Service Supplier (USS) for Network
   Remote ID (Net-RID) messages.  Either the Broadcast Remote ID (B-RID)
   messages, or alternatively, appropriate MAVLink Messages can be sent
   directly over UDP or via a more functional protocol using CoAP/CBOR
   for the Net-RID messaging.  This is secured via either HIP/ESP or
   DTLS.  HIP/ESP or DTLS secure messaging Command-and-Control (C2) for
   is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-14"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-05">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="13" month="January" year="2024"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-05"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-09">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="cbor-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-09">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
        </reference>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FAA-RID-NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
      </references>
    </references>
    <section anchor="hhit-rr" numbered="true" toc="default">
      <name>HHIT Resource Record</name>
      <t>This appendix is normative.</t>
      <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RR Type. It is encoded as a CBOR array.</t>
      <figure anchor="rr-wire-cddl">
        <name>Resource Record Wire CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
rr = 6.xxx(rr_data: array)
rr_data= [hhit, type, status, abbreviation, endorsements]
hhit = #6.54(bstr .size(16))
type = uint .size(2)
status = uint .size(1)
abbreviation = tstr .size(15)
endorsements = [1* endorsement]  ; MUST be in e-type order
]]></artwork>
      </figure>
      <figure anchor="rr-text-cddl">
        <name>Resource Record Text CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
<domain> HHIT IN ( HHIT TYPE STATUS ABBREV [Endorsement(s)] )
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>Type:</dt>
        <dd>
  This field is two octets with values defined in <xref target="iana-hhit-type" format="default"/>. It is envisioned that there may be many types of HHITs in use. In some cases it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki" format="default"/>.</dd>
        <dt>Status:</dt>
        <dd>
  This field is a single byte with values defined in <xref target="iana-hhit-status" format="default"/>. A HHIT can go through various states during its life-cycle in the ecosystem. It is helpful for a querant to understand the current status as a further requirement for verification.</dd>
        <dt>Abbreviation:</dt>
        <dd>
  This field is meant to provide an abbreviation to the HID structure for display devices. The specific contents of this field are not defined here, but a recommendation/example can be found in <xref target="hid-abbreviation" format="default"/>.</dd>
        <dt>Endorsements:</dt>
        <dd>
  This field is a list of CBOR encoded Endorsements in <tt>e-type</tt> order. It MUST included at least one Broadcast Endorsement (<xref target="be" format="default"/>). A special case for the Apex is that the Broadcast Endorsement is filled with its own DET and HI as evidence (i.e. a self-signed Broadcast Endorsement).</dd>
      </dl>
    </section>
    <section anchor="hid-abbreviation" numbered="true" toc="default">
      <name>HID Abbreviation Recommendation</name>
      <t>This appendix is informative.</t>
      <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>.</t>
      <t>To support this DIMEs are recommended to have an abbreviation that could be used for this form. These abbreviations should be a maximum of six characters (for each section) in length. Spaces should not be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
      <t>The concatenation of <tt>{RAA Abbreviation}</tt> and <tt>{HDA Abbreviation}</tt> with a space between them can be what fills in the <tt>HID</tt> field of the HHIT RR in <xref target="hhit-rr" format="default"/>.</t>
      <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the RAA abbreviation should be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3). A common abbreviation for an RAAs four allocated RAA values are out of scope. Other documents such as <xref target="drip-dki" format="default"/> may have more specific recommendations or requirements.</t>
      <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver must use the uppercase 4-character hexadecimal encoding of the field it is missing when using this form.</t>
    </section>
    <section anchor="det-fqdn" numbered="true" toc="default">
      <name>DETs as Fully Qualified Domain Names</name>
      <t>This appendix is informative.</t>
      <ul empty="true" spacing="normal">
        <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
      </ul>
      <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .example.com
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.example.com
]]></artwork>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <t>This appendix is normative.</t>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=0, Self Endorsement
$$evidence //= (eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>$$evidence</tt> contains the HI of the endorser. <tt>$$endorser</tt> contains the HHIT of the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=1, SAM Type=1, Broadcast Endorsement
$$evidence //= (hhit, eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level.</t>
        <t><tt>$$evidence</tt> are the child entities (e.g. a UA) DET/HHIT and its associated HI. <tt>$$endorser</tt> contains the HHIT of the parent entity (e.g. DIME) as the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <t>Note that the Endorsement Type (<tt>e-type</tt>) field is the same value as the SAM Type allocated to DRIP (i.e. the value 1). As such for DRIP Authentication the <tt>e-type</tt> field is not encoded into the binary form and is instead handled by the SAM Type of the Authentication framing.</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="we" numbered="true" toc="default">
        <name>Wrapper Endorsement</name>
        <figure anchor="we-cddl">
          <name>Wrapper Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=2, SAM Type=2, Wrapper Endorsement
$$evidence //= (*4 astm-message,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
astm-message = bstr .size(25)
]]></artwork>
        </figure>
        <figure anchor="we-cbor">
          <name>Wrapper Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="we-binary">
          <name>Wrapper Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="me" numbered="true" toc="default">
        <name>Manifest Endorsement</name>
        <figure anchor="me-cddl">
          <name>Manifest Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=3, SAM Type=3, Manifest Endorsement
$$evidence //= (3*11 manifest-hash,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
manifest-hash = bstr .size(8)
]]></artwork>
        </figure>
        <figure anchor="me-cbor">
          <name>Manifest Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="me-binary">
          <name>Manifest Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="fe" numbered="true" toc="default">
        <name>Frame Endorsement</name>
        <figure anchor="fe-cddl">
          <name>Frame Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=4, SAM Type=4, Frame Endorsement
$$evidence //= (frame-type, frame-data,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
frame-type = uint .size(1)
frame-data = bstr .size(1..111)
]]></artwork>
        </figure>
        <figure anchor="fe-cbor">
          <name>Frame Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="fe-binary">
          <name>Frame Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <t>This appendix is informative.</t>
      <section anchor="dns-op" numbered="true" toc="default">
        <name>Operator</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN DET 
( 2001003fff800005ba8af5252a35030e 0 1 "TEST DRIP" "" ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN HIP 
( 5 2001003fff800005ba8af5252a35030e ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN URI 
( https://example.com/operator/* )
]]></artwork>
      </section>
      <section anchor="dns-sid" numbered="true" toc="default">
        <name>Session ID</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN DET 
( 2001003fff800005b6ce935b616306d4 0 1 "TEST DRIP" "" ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN HIP 
( 5 2001003fff800005b6ce935b616306d4 ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN URI 
( https://example.com/session/* )
]]></artwork>
      </section>
      <section anchor="dns-child" numbered="true" toc="default">
        <name>Child DIME</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
RAA:
@ORIGIN 8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
0.0.0 IN NS 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa

HDA:
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN DET 
( 2001003fff8000054e486394a60bb669 0 1 "TEST DRIP" "" ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN HIP 
( 5 2001003fff8000054e486394a60bb669 ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN URI 
( https://example.com/dime/* )
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
