<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-16" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-16"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="31"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and related metadata is performed via DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>Such extended information is retrieved from the UAS ID via the use of a DRIP Entity Tag (DET) <xref target="RFC9374" format="default"/> which is managed by the DRIP Identity Management Entity (DIME). In this document we assume the DIME belongs to the UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>) but a DIME can be independent or handled by another entity as well.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="RFC9434" format="default"/>) or Network RID (Section 1.2.2 of <xref target="RFC9434" format="default"/>) is public, much of the extended information will be private. As discussed in Section 7 of <xref target="RFC9434" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (typically known as AAA) is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies which are out of scope for this document.</t>
      <t>The intent of the access control requirements is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information.</t>
      <t>Registration is necessary to guarantee the uniqueness of the DET and thus to ensure the extended information is bound to the UAS ID.</t>
      <t>This document creates the DRIP registration and discovery architecture focusing on the DET for UAS at its surrounding ecosystem. Clients in the architecture that can use a DET include Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS.</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="intro-concept" numbered="true" toc="default">
      <name>General Concept</name>
      <t>DETs MUST be registered within the hierarchy to become legitimate. DIME's are the points in the hierarchy that enforce requirements on registration and information access. This document standardizes the basic interactions and methods for registration and lookup to support interoperability based around DETs. Other identifiers and their methods are out of scope for this document.</t>
      <t>This document selects the Domain Name System (DNS) as the Public Information Registry for both storing and retrieving public information, such as the public key of DETs and pointers to Private Information Registries. Personally Identifiable Information (PII) is stored in Private Information Registries and MUST be protected through AAA. AAA mechanisms to protect PII is out of scope for this document.</t>
      <t>For UAS, a DIME can provide the following registration and lookup services:</t>
      <ol spacing="normal" type="1"><li>personal information (e.g. for pilots and operators)</li>
        <li>UAS Serial Number and aircraft physical characteristics</li>
        <li>DETs as a Key ID for UAS RID Authentication (<xref target="drip-auth" format="default"/>)</li>
        <li>DETs as a pseudo-anonymous UAS Specific Session ID (UAS ID Type 4)</li>
        <li>binding of UAS ID to UTM Operational Intent</li>
      </ol>
      <t>A DIME's services are determined by their intended role (<xref target="dime-roles" format="default"/>) and policies (both internally and from appropriate authorities). For example, services 1 and 2 can be restricted to non-public access controlled lookups with mandatory registration and 5 to publicly available but access controlled lookups.</t>
      <t>For this document only services 3 and 4, as they directly relate to DETs, are detailed. Services 1 and 5 will be talked about conceptually while service 2 is out of scope.</t>
      <t>Requirements on the elements of information in registration and lookup (beyond the scope basic interoperability) is out of scope for this document. It is left to appropriate authorities to determine these details along with policy for access. For the UAS use-case this would be the national Civil Aviation Authorities (CAAs).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="RFC9374" format="default"/> defines the Hierarchical Host Identity Tag (HHIT) and further specifies an instance of them used for UAS RID called DETs. The HHIT is a 128-bit value that can be represented as an IPv6 address.</t>
      <t>As a review, HHITs are comprised of four major components: a Prefix, a Hierarchy ID (HID), a HHIT Suite ID (fixed 8-bits) and an ORCHID Hash. DETs use a 28-bit prefix and 64-bit hash leaving 28-bits for the HID. For UAS RID this HID is further divided into two fields: RAA and HDA, each 14-bits in length. <xref target="hhit-fig" format="default"/> shows this breakdown.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28-bits)   | (28-bits)    | (8-bits)      | (64-bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14-bits)                      | (14-bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t><xref target="RFC9434" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components (<xref target="dime-arch" format="default"/>) and can be classified to serve a number of different roles, mapped to levels in the hierarchy, which are detailed in the following subsections.</t>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is the IPv6 prefix portion of the DET associated with it which is assigned by IANA from the special IPv6 address space for ORCHIDs. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex manages all delegations and allocations of RAAs to various parties. The Apex MUST reserve an allocation for itself that it MAY use.</t>
        <section anchor="drip-apex" numbered="true" toc="default">
          <name>DRIP Apex for UAS RID</name>
          <t>For UAS RID the Apex uses IPv6 prefix of <tt>2001:30/28</tt> per <xref target="RFC9374" format="default"/>. Allocations of RAAs in this prefix SHOULD be done in contiguous groups of 4. This is to support the nibble reversing of the DET to be placed in DNS (<xref target="det-dns" format="default"/>). See <xref target="iana-apex" format="default"/> for the RAA allocations.</t>
          <t>Values 0 (0x0000) through 3 (0x0003) MUST be reserved for the UAS RID Apex and SHOULD be used to endorse RAA delegations in Endorsements (<xref target="endorsements" format="default"/>). While the individual Apexes can be designated for different purposes they share the same pool of RAAs to be allocated. Such operation would require policy by the administrator of the Apex to avoid simultaneous allocation and is out of scope for this document.</t>
        </section>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>An RAA is a business or organization that runs a DIME to register HDAs (<xref target="hda" format="default"/>). Most are expected to be CAAs (using <xref target="iso3166" format="default"/>), such as the Federal Aviation Authority (FAA), that then delegate HDAs for use in their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA:</t>
        <ul spacing="normal">
          <li>MUST provide a set of services to allocate HDAs to organizations</li>
          <li>MUST have a public policy on what is necessary to obtain an HDA</li>
          <li>SHOULD provide service level guarantees for DNS operation and registry service</li>
          <li>SHOULD maintain a DNS zone minimally for discovering HIP RVS servers</li>
        </ul>
        <t>All RAA's MUST use the single reserved HDA value 0 (0x0000) for itself to support various functions or services. Other HDA values SHOULD be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contiguous values (<tt>raa_code + 0</tt>, <tt>raa_code + 1</tt>, <tt>raa_code + 2</tt> and <tt>raa_code + 3</tt>) are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined (by ISO 3166-1) as "user assigned code elements" and do not have specific claimants predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants. These values MUST NOT be used for an RAA.</t>
          <t>How a CAA handles their allocated values are out of scope of this document. Control of these values are expected to be claimed by their respective owner. How a claim is vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <ul empty="true" spacing="normal">
            <li>Author Note: get ISO reference for document and for reserved/special allocations. Reference/steal from ENUM document text on delegation procedure. How country code delegations are done through ICAO.</li>
          </ul>
          <ul empty="true" spacing="normal">
            <li>Informational Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces. How this is claimed and handled is out of scope for this document.</li>
          </ul>
        </section>
        <section anchor="experimental-raa" numbered="true" toc="default">
          <name>Experimental</name>
          <t>The RAA range of 16376 (0x3FF8) to 16383 (0x3FFF), eight (8) RAAs, is allocated to the DRIP working group itself as an experimental range. RAA 16376 is already "in use" with <tt>driptesting.org</tt>. The rest of the range (16377 to 16383) are reserved to be allocated by a designated expert to agencies or organizations that wish to test for a period of time.</t>
          <ul empty="true" spacing="normal">
            <li>Author Note: ietf leadership has to choose DE</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register client entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and UAS/UTM infrastructure (such as Supplemental Data Service Providers). It SHOULD also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>For UAS RID, HDAs can provide any of the following services:</t>
        <ul spacing="normal">
          <li>registration and public lookup of DETs as a Key ID for Authentication as defined in <xref target="drip-auth" format="default"/></li>
          <li>registration and access controlled lookup of DETs as a pseudo-anonymous UAS Session ID</li>
          <li>registration of UAS ID and UTM Operational Intent to bind them together (if allowed by cognizant authority)</li>
        </ul>
        <t>An HDA SHOULD maintain a set of RVS servers for UAS clients that may use HIP. This service MUST be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote.</t>
      <t>Interfaces with a specific transport requirement (such as HTTPS) are labeled accordingly. Interfaces not labeled can be implementation specific or proprietary due to co-location of components. For example the interface between the DPA and a Registrar, when delegated, might be Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/> while implementations co-locating these components might use an internal code library. These non-labeled interfaces are out of scope for this document.</t>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          |
          | HTTPS
          |
**********|*********************************************************
*         |                                                        *
*         |      DRIP Identity Management Entity (DIME)            *
*         |                                                        *
*   ######|#####################################################   *
*   #     |                                                    #   *
*   #  +--o-----------------+                                  #   *
*   #  | DIME               |                                  #   *
*   #  | Provisioning Agent |         Registrar Functions      #   *
*   #  | (DPA)              |                                  #   *
*   #  +--------------------+                                  #   *
*   #                                                          #   *
*   ##############################o#############################   *
*                                 |                                *
*                                 | EPP                            *
*                                 |                                *
*   ##############################o#############################   *
*   #                                                          #   *
*   #  +--------------------+                                  #   *
*   #  | DIME               |                                  #   *
*   #  | Information Agent  |         Registry Functions       #   *
*   #  | (DIA)              |                                  #   *
*   #  +--------------------+                                  #   *
*   #                                                          #   *
*   ######o#########################################o###########   *
*         |                                         |              *
*         |                                         |              *
**********|*****************************************|***************
          |                                         |
          | Registrant Information Service          |
          | (e.g. WHOIS, RDAP, etc.)                | DNS
          |              +---------------+          |
          '--------------o Lookup Client o----------'
                         +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DIME Provisioning Agent (DPA)</name>
        <t>The DPA performs the task of vetting information coming from clients wishing to register and then delegates (internally or externally) various items to other components in the DIME. This is the primary component that handles all DRIP related cryptographic operations for incoming registrations to the DIME.</t>
        <t>The DPA:</t>
        <ul spacing="normal">
          <li>MUST have a publicly accessible and discoverable HTTPS interface for clients to register through</li>
          <li>MUST use a provided interface from a Registrar (<xref target="nameserver" format="default"/>)</li>
        </ul>
        <t>Specific details of the public HTTPS interface (such as advertisement) is out of scope for this document.</t>
        <t>A DPA can be considered an additional specific function to an existing DNS Registrar for DRIP. It MAY be a separate service or entity that interfaces with a DNS Registrar.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Registrar &amp; Registry</name>
        <t>The Registrar and Registry and pre-existing components used in DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate.</t>
        <t>Existing functions and interface/protocol specifications for Registrars and Registries are out of scope for this document. However the following references are presented as pointers to material that might be useful: TODO: add list of useful RFCs?</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DIME Information Agent (DIA)</name>
        <t>The DIA is the main component handling information egress (via lookup) of the Registry.</t>
        <t>The DIA:</t>
        <ul spacing="normal">
          <li>
            <t>MUST have an access controlled interface for add/delete/update of information that MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>this interface definition is out of scope for this document</li>
            </ul>
          </li>
          <li>
            <t>MUST have an access controlled interface to query for information that MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>if this interface is publicly available it MUST use Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>)</li>
              <li>if this interface is not publicly available its specification is out of scope for this document</li>
            </ul>
          </li>
        </ul>
        <t>Certain information stored, due to policy, may be considered PII and MUST be protected from access using AAA (for example using XACML). See <xref target="dap" format="default"/> for more information.</t>
        <t>A DIA can be considered an additional function to an existing DNS Registry for DRIP. It MAY be a separate service or entity that interfaces with a DNS Registry.</t>
      </section>
    </section>
    <section anchor="det-registration-process" numbered="true" toc="default">
      <name>DET Registration Process</name>
      <t>The general process for a registering DET is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify inputs (such as Endorsement(s)) from registering client</li>
        <li>DPA checks for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>Generically a DET can be used as an identifier for any client in UTM and SHOULD be registered to a DIME. For example a CAA may choose to use DETs for its Operators. A data model (such as what is specified in <xref target="det-reg-model" format="default"/>) would be required to define all the information for registration for a given classification of client.</t>
      <t>Such specification beyond using DETs as a Session ID and/or Key ID (<xref target="det-auth-reg" format="default"/>, <xref target="det-id-reg" format="default"/> and <xref target="det-id-auth-reg" format="default"/>) is out of scope for this document.</t>
      <section anchor="det-reg-model" numbered="true" toc="default">
        <name>DET Registration Data Model</name>
        <t>The following is the general data model for DET registration data to be sent to the DPA from a client. This model is defined for and used by <xref target="det-auth-reg" format="default"/>, <xref target="det-id-reg" format="default"/> and <xref target="det-id-auth-reg" format="default"/>.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
det_registration_info = {
    serial_number: tstr .size 20,  ; ANSI CTA2063-A UAS Serial Number
    uas_id: bstr .size 20,  ; UAS ID per ASTM F3411-22a Basic ID Message
    uas_id_type: 0..15,  ; UAS ID Type per ASTM F3411-22a
    ? self_endorsement: bstr .size 120,
    ? key_binding,
    ? utm_binding,
    * tstr => any
}
utm_binding = (
    utm_id: bstr .size 16,  ; Operational Intent (UUIDv4)
    utm_source: tstr  ; URI to USS with Operational Intent
)
key_binding = (
    key_id: bstr,
    key: bstr
)
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>UAS ID Type and UAS ID:</dt>
          <dd>
  defined per ASTM <xref target="F3411" format="default"/>. See <xref target="uas-id-handling" format="default"/> for handling specific instructions during registration.</dd>
          <dt>UAS Serial Number:</dt>
          <dd>
  defined per <xref target="CTA2063A" format="default"/>. Other UAS Serial Number formats (considered legacy) are out of scope for this document.</dd>
          <dt>UTM Assigned ID:</dt>
          <dd>
  also known as an Operational Intent, defined per ADD-UTM-REF and ASTM <xref target="F3411" format="default"/> as a UUIDv4. Part of the UTM Binding group which also includes the source URI of the Operational Intent.</dd>
          <dt>Key ID:</dt>
          <dd>
  part of the Key Binding group which also includes a raw key value.</dd>
          <dt>Self Endorsement:</dt>
          <dd>
  defined per <xref target="endorsements" format="default"/> and <xref target="se" format="default"/>. See <xref target="se-handling" format="default"/> for handling specific instructions during registration.</dd>
        </dl>
        <t>It is RECOMMENDED that the information above is signed over in some way to ensure integrity of the registration data. The recommended way to do this is with a Endorsement (<xref target="endorsements" format="default"/>). Another way is with a JWT<xref target="RFC7519" format="default"/> or CWT <xref target="RFC8392" format="default"/> using the clients key.</t>
        <t>Other data elements MAY be added to this model. A DIME MUST have a public API detailing additional elements expected for their implementations. These elements and reference is out of scope for this document.</t>
        <section anchor="uas-id-handling" numbered="true" toc="default">
          <name>UAS ID Handling</name>
          <t>The <tt>uas_id_type</tt> field MUST be set to same UAS ID Type in the ASTM <xref target="F3411" format="default"/> Basic ID Message to ensure proper decoding of the <tt>uas_id</tt> field.</t>
          <t>The <tt>uas_id</tt> field MUST be set with the octets found in the ASTM <xref target="F3411" format="default"/> Basic ID Message UAS ID field. By using identical contents of the Basic ID Message the Specific Session ID Type octet (the first octet in the UAS ID when using UAS ID Type is <tt>0x4</tt>) is preserved. When a DET is used a Session ID, the value of this first octet MUST be <tt>0x01</tt>.</t>
        </section>
        <section anchor="se-handling" numbered="true" toc="default">
          <name>Self Endorsement</name>
          <t>The <tt>self_endorsement</tt> is included when a DET is used either as a Session ID (in <tt>uas_id</tt>) or for Authentication (in <tt>key_id</tt>).</t>
          <t>The value is verified by the DPA and its contents used to generate a Broadcast Endorsement for use in <xref target="drip-auth" format="default"/> and put into DNS.</t>
        </section>
        <section anchor="service-tuple" numbered="true" toc="default">
          <name>Service Tuple</name>
          <t>Five critical pieces of information are required to provide the services listed in <xref target="intro-concept" format="default"/> that make a tuple. These are: UAS ID, UAS ID Type, UAS Serial Number, Key ID and UTM Assigned ID. The UAS ID, UAS ID Type and UAS Serial Number fields are mandatory and MUST NOT be null for entry as defined.</t>
          <t>This tuple encodes the services that the specific registration is being used. A few examples can be seen in the table below.</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Service</th>
                <th align="left">UAS ID</th>
                <th align="left">UAS ID Type</th>
                <th align="left">UAS Serial Number</th>
                <th align="left">Key ID</th>
                <th align="left">UTM Assigned ID</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DET Authentication</td>
                <td align="left">TEST3ABC</td>
                <td align="left">0x1</td>
                <td align="left">TEST3ABC</td>
                <td align="left">DET</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">DET Session ID</td>
                <td align="left">0x01 + DET</td>
                <td align="left">0x4</td>
                <td align="left">TEST3ABC</td>
                <td align="left">-</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">DET Session ID + Authentication</td>
                <td align="left">0x01 + DET</td>
                <td align="left">0x4</td>
                <td align="left">TEST3ABC</td>
                <td align="left">DET</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
          <t>As this document focuses on DETs exclusively the use of the Key ID using other cryptographic identifiers and how to distinguish between them (such as how UAS ID and UAS ID Type is used) is out of scope of this document.</t>
        </section>
      </section>
      <section anchor="det-auth-reg" numbered="true" toc="default">
        <name>DET Authentication</name>
        <t>For Authentication use of a DET, registration requires the following additional data elements: <tt>key_id</tt>, <tt>self_endorsement</tt>. <xref target="se-handling" format="default"/> MUST be followed.</t>
      </section>
      <section anchor="det-id-reg" numbered="true" toc="default">
        <name>DET Session ID</name>
        <t>For the registration of a DET as a Session ID the client is typically the UAS. The mechanisms of how the UAS generates a DET are out of scope for this document.</t>
        <t>For Session ID use of a DET, registration requires the following additional data elements: <tt>self_endorsement</tt>. Both <xref target="uas-id-handling" format="default"/> and <xref target="se-handling" format="default"/> MUST be followed.</t>
        <t>Optionally a binding between a DET and a UTM Session ID can be made by providing the information of the UTM side using <tt>utm_id</tt> and <tt>utm_source</tt>. The support of this is based on CAA policy and is out of scope for this document.</t>
      </section>
      <section anchor="det-id-auth-reg" numbered="true" toc="default">
        <name>DET Session ID &amp; Authentication</name>
        <t>For Session ID &amp; Authentication use of a DET, registration requires the following additional data elements: <tt>key_id</tt>, <tt>self_endorsement</tt>. Both <xref target="uas-id-handling" format="default"/> and <xref target="se-handling" format="default"/> MUST be followed.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as private is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="RFC9434" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>DIMEs MUST be responsible for the operation of the DNS-related infrastructure for domain names under DRIP. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two.</t>
      <t>DIMEs SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. National policy and regulations will define how long DNS data are stored or archived. These are all National Matters where national law/regulation prevail ensuring DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>Static UAS specific information that is publicly available MAY also be stored in DNS but is out of scope for this document.</t>
      <ul empty="true" spacing="normal">
        <li>Author Note: proposal for a UAS RR that is a CBOR map of static UAS data elements (UAS ID, UAS Type, Self Description, etc.)</li>
      </ul>
      <t>For DRIP, IANA has agreed to act as the Apex at least initially (see <xref target="iana-apex" format="default"/> for more details). The delegation of civil aviation authorities to RAAs is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. Since these are public, any entity can stand up an RAA with that value. The Apex SHOULD be the root of trust in a Endorsement or certificate chain that provides validation of any of these specific RAAs, in the ISO RAA range, thus protecting against bad actors standing up fraudulent RAAs.</t>
      <section anchor="det-dns" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record (<xref target="hhit-rr" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for, depending on what is required: HIP, HHIT, TLSA, URI, or PTR RRTypes.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or as a binary blob by concatenating values. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases.</li>
      </ul>
      <figure anchor="endorsement-cddl">
        <name>Endorsement CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = 6.xxx(e-data: array)
e-data = [e-type, scope, ? $$evidence, $$endorser, $$signature]

e-type = uint .size(2)
scope = (vnb: time, vna: time, ? $$scope-ext)

$$endorser //= (hhit,)
$$endorser //= (hhit, eddsa25519-hi,)
$$endorser //= (eddsa25519-hi,)
hhit = #6.54(bstr .size(16))
eddsa25519-hi = bstr .size(32)

$$signature = (eddsa25519-sig,)
eddsa25519-sig = bstr .size(64)
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>Endorsement Type:</dt>
        <dd>
  a 16-bit value used to hint at the content of the <tt>$$evidence</tt> group. Four special values (1 through 4) map to the SAM Type of the Authentication framing in <xref target="drip-auth" format="default"/>, allowing the 16-bit value to be excluded from the Endorsement structure. See <xref target="iana-e-types" format="default"/> for more details.</dd>
        <dt>Scope &amp; Scope Extensions:</dt>
        <dd>
  The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps. Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired using the <tt>$$scope-ext</tt> socket group.</dd>
        <dt>Evidence:</dt>
        <dd>
  socket group containing a set claims. The content and order of claims is specified explicitly for each <tt>e-type</tt>.</dd>
        <dt>Endorser:</dt>
        <dd>
  socket group where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). The content and ordering is specified explicitly for each <tt>e-type</tt>.</dd>
        <dt>Signature:</dt>
        <dd>
  socket group containing the signature data for the Endorsement. The content and ordering is specified explicitly for each <tt>e-type</tt>. Signatures MUST be generated using the preceding sections (except for <tt>e-type</tt>) in their binary forms (i.e. as a concatenated bytestring of values) rather than their CBOR encoding.</dd>
      </dl>
      <t><xref target="drip-endorsements" format="default"/> specifies Endorsement structures for the UAS RID use-case.</t>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP). The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Authors Note: ACCP is ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>The CBOR Encoded X.509 Certificates (C509 Certificates) <xref target="cbor-cert" format="default"/> provides a standards-based approach to reduce the size of X.509 certificates both on-the-wire and in storage. The PKI-Lite RAA certificate example in Appendix B.2 is 331 bytes. The matching C509 certificate is 183 bytes. This sort of difference may have significant impact both on UAS storage requirements and over-the-air transmission impact.</t>
        <!-- TODO: where is B.2 example?? -->

<t>C509 provides two approaches for encoding X.509:</t>
        <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280" format="default"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
          <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
        </ol>
        <t>The invertible CBOR encoding may be sufficient for most needs. The CBOR objects clearly indicate which approach was used, so that the receiver can properly process the C509 object. For interoperability in DRIP, it is recommended that invertible CBOR encoding be used.</t>
        <t>Using the invertible CBOR encoding is achieved through in-line libraries that convert in the desired direction. Since it is not expected that DNS protocols to implement this conversion, the HHIT RR SHOULD contain the normal X.509 DER encoding. The CBOR encoding MAY be used, but operational experience will be needed to see if there are measurable gains in doing so.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-apex" numbered="true" toc="default">
        <name>Management of DRIP Apex</name>
        <t>A discussion between the authors of this document, DRIP AD and IANA was held during IETF 118. Those present were:</t>
        <ul spacing="normal">
          <li>Eric Vyncke (AD of DRIP WG)</li>
          <li>Bob Moskowitz</li>
          <li>Jim Ried (Author of this RFC)</li>
          <li>Adam Wiethuechter (Editor of this RFC)</li>
          <li>Kim Davies (IANA)</li>
        </ul>
        <t>IANA agreed that they would be willing to manage the Apex for DRIP until the desired Apex manager, International Civil Aviation Organization (ICAO), is ready. This is expected to be in the next 5 years due to ICAO process. The hand-over to ICAO is TBD at that time but various options are available.</t>
        <t>Further discussion of the SLA required to RAAs by IANA is and other requirements to IANA are TBD.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa" numbered="true" toc="default">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>RAA Allocations:</dt>
            <dd>
  a 14-bit value that is allocated in groups of 4. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values/ranges are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Allocated</td>
                <td align="left">UAS RID (DRIP) Apex</td>
                <td align="left">This RFC (<xref target="drip-apex" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC (<xref target="iso3166" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4000 - 16375</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">16375 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">DRIP WG (Experimental Use)</td>
                <td align="left">This RFC (<xref target="experimental-raa" format="default"/>)</td>
              </tr>
            </tbody>
          </table>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file here: TODO.</t>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-e-types" numbered="true" toc="default">
          <name>Endorsement Types</name>
          <t>This document requests a new registry for Endorsement Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Endorsement Type:</dt>
            <dd>
  A 16-bit value to provide hinting of the contents of other sections of an Endorsement. Future additions to this registry are to be made through Specification Required (Section 4.3 of <xref target="RFC8126" format="default"/>) for values 0x0000 to 0xEFFF and First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>) for the values 0xF000 to 0xFFFF. The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Endorsement Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Self-Endorsement</td>
                <td align="left">This RFC (<xref target="se" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">This RFC (<xref target="be" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Wrapper</td>
                <td align="left">This RFC (<xref target="we" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Manifest</td>
                <td align="left">This RFC (<xref target="me" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Frame</td>
                <td align="left">This RFC (<xref target="fe" format="default"/>)</td>
              </tr>
            </tbody>
          </table>
          <t>To register an <tt>e-type</tt> the following MUST be provided in CDDL for review:</t>
          <ul spacing="normal">
            <li>Additions to <tt>scope</tt> group using <tt>$$scope-ext</tt></li>
            <li>Specific group contents of <tt>$$evidence</tt></li>
            <li>Specific group contents of <tt>$$endorser</tt></li>
            <li>Specific group contents of <tt>$$signature</tt></li>
          </ul>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-hhit-type" numbered="true" toc="default">
          <name>HHIT Type</name>
          <t>This document requests a new registry for HHIT Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Type:</dt>
            <dd>
  numeric, 16-bit, field of the HHIT RR to encode the HHIT Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">DIME Provisioning Agent (DPA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6</td>
                <td align="left">DIME Information Agent (DIA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">7</td>
                <td align="left">Name Server (NS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">8</td>
                <td align="left">Registration Data Directory Service (RDDS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">ISO 3166-1 Numeric Nation (INN)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Endpoint Entity (EE)</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Issuer CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Uncrewed Aerial System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">27</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">28</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">29</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">30 - 65535</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
          <!-- TODO: text on Expert Review process -->

</section>
        <section anchor="iana-hhit-status" numbered="true" toc="default">
          <name>HHIT Status</name>
          <t>This document requests a new registry for HHIT Status under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Status:</dt>
            <dd>
  numeric, 8 bit, field of the HHIT RR to encode the HHIT Status. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Status</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Inactive</td>
                <td align="left">Default when accepted by DIME</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Active</td>
                <td align="left">Set when in use</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Expired</td>
                <td align="left">Set when past VNA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Deprecated</td>
                <td align="left">Set when no longer in use (but not expired)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <!-- TODO: text on Expert Review process -->

</section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="FAA-RID-NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="public-key-exposure" numbered="true" toc="default">
      <name>Public Key Exposure</name>
      <t>DETs are built upon asymmetric keypairs. As such the public key must be revealed to enable clients to perform signature verifications.</t>
      <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (using the HIP RR) until it is required.</t>
      <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID is underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-49">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="21" month="February" year="2024"/>
            <abstract>
              <t>   The Drone Remote Identification Protocol (DRIP), plus trust policies
   and periodic access to registries, augments Unmanned Aircraft System
   (UAS) Remote Identification (RID), enabling local real time
   assessment of trustworthiness of received RID messages and observed
   UAS, even by Observers lacking Internet access.  This document
   defines DRIP message types and formats to be sent in Broadcast RID
   Authentication Messages to verify that attached and recent detached
   messages were signed by the registered owner of the DRIP Entity Tag
   (DET) claimed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-49"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-14">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a transport mechanism between an Uncrewed
   Aircraft System (UAS) and its UAS Service Supplier (USS) for Network
   Remote ID (Net-RID) messages.  Either the Broadcast Remote ID (B-RID)
   messages, or alternatively, appropriate MAVLink Messages can be sent
   directly over UDP or via a more functional protocol using CoAP/CBOR
   for the Net-RID messaging.  This is secured via either HIP/ESP or
   DTLS.  HIP/ESP or DTLS secure messaging Command-and-Control (C2) for
   is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-14"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-05">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="13" month="January" year="2024"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-05"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-09">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="cbor-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-09">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
        </reference>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FAA-RID-NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
      </references>
    </references>
    <section anchor="hhit-rr" numbered="true" toc="default">
      <name>HHIT Resource Record</name>
      <t>This appendix is normative.</t>
      <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RR Type. It is encoded as a CBOR array.</t>
      <figure anchor="rr-wire-cddl">
        <name>Resource Record Wire CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
rr = 6.xxx(rr_data: array)
rr_data= [hhit, type, status, abbreviation, endorsements]
hhit = #6.54(bstr .size(16))
type = uint .size(2)
status = uint .size(1)
abbreviation = tstr .size(15)
endorsements = [1* endorsement]  ; MUST be in e-type order
uris = [* #6.32]
]]></artwork>
      </figure>
      <figure anchor="rr-text-cddl">
        <name>Resource Record Text CDDL</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
<domain> HHIT IN ( HHIT TYPE STATUS ABBREV [Endorsement(s)] [URI(s)])
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>Type:</dt>
        <dd>
  This field is two octets with values defined in <xref target="iana-hhit-type" format="default"/>. It is envisioned that there may be many types of HHITs in use. In some cases it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki" format="default"/>.</dd>
        <dt>Status:</dt>
        <dd>
  This field is a single byte with values defined in <xref target="iana-hhit-status" format="default"/>. A HHIT can go through various states during its life-cycle in the ecosystem. It is helpful for a querant to understand the current status as a further requirement for verification.</dd>
        <dt>Abbreviation:</dt>
        <dd>
  This field is meant to provide an abbreviation to the HID structure for display devices. The specific contents of this field are not defined here, but a recommendation/example can be found in <xref target="hid-abbreviation" format="default"/>.</dd>
        <dt>Endorsements:</dt>
        <dd>
  This field is a list of CBOR encoded Endorsements in <tt>e-type</tt> order. It MUST included at least one Broadcast Endorsement (<xref target="be" format="default"/>). A special case for the Apex is that the Broadcast Endorsement is filled with its own DET and HI as evidence (i.e. a self-signed Broadcast Endorsement).</dd>
        <dt>URIs:</dt>
        <dd>
  This field is a list of URIs that can be used for the given HHIT to obtain information. URIs are encoded in the CBOR.</dd>
      </dl>
    </section>
    <section anchor="hid-abbreviation" numbered="true" toc="default">
      <name>HID Abbreviation Recommendation</name>
      <t>This appendix is informative.</t>
      <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>.</t>
      <t>To support this DIMEs are recommended to have an abbreviation that could be used for this form. These abbreviations should be a maximum of six characters (for each section) in length. Spaces should not be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
      <t>The concatenation of <tt>{RAA Abbreviation}</tt> and <tt>{HDA Abbreviation}</tt> with a space between them can be what fills in the <tt>HID</tt> field of the HHIT RR in <xref target="hhit-rr" format="default"/>.</t>
      <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the RAA abbreviation should be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3). A common abbreviation for an RAAs four allocated RAA values are out of scope. Other documents such as <xref target="drip-dki" format="default"/> may have more specific recommendations or requirements.</t>
      <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver must use the uppercase 4-character hexadecimal encoding of the field it is missing when using this form.</t>
    </section>
    <section anchor="det-fqdn" numbered="true" toc="default">
      <name>DETs as Fully Qualified Domain Names</name>
      <t>This appendix is informative.</t>
      <ul empty="true" spacing="normal">
        <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
      </ul>
      <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .example.com
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.example.com
]]></artwork>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <t>This appendix is normative.</t>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=0, Self Endorsement
$$evidence //= (eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>$$evidence</tt> contains the HI of the endorser. <tt>$$endorser</tt> contains the HHIT of the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=1, SAM Type=1, Broadcast Endorsement
$$evidence //= (hhit, eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level.</t>
        <t><tt>$$evidence</tt> are the child entities (e.g. a UA) DET/HHIT and its associated HI. <tt>$$endorser</tt> contains the HHIT of the parent entity (e.g. DIME) as the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <t>Note that the Endorsement Type (<tt>e-type</tt>) field is the same value as the SAM Type allocated to DRIP (i.e. the value 1). As such for DRIP Authentication the <tt>e-type</tt> field is not encoded into the binary form and is instead handled by the SAM Type of the Authentication framing.</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="we" numbered="true" toc="default">
        <name>Wrapper Endorsement</name>
        <figure anchor="we-cddl">
          <name>Wrapper Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=2, SAM Type=2, Wrapper Endorsement
$$evidence //= (*4 astm-message,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
astm-message = bstr .size(25)
]]></artwork>
        </figure>
        <figure anchor="we-cbor">
          <name>Wrapper Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="we-binary">
          <name>Wrapper Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="me" numbered="true" toc="default">
        <name>Manifest Endorsement</name>
        <figure anchor="me-cddl">
          <name>Manifest Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=3, SAM Type=3, Manifest Endorsement
$$evidence //= (3*11 manifest-hash,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
manifest-hash = bstr .size(8)
]]></artwork>
        </figure>
        <figure anchor="me-cbor">
          <name>Manifest Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="me-binary">
          <name>Manifest Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="fe" numbered="true" toc="default">
        <name>Frame Endorsement</name>
        <figure anchor="fe-cddl">
          <name>Frame Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
; e-type=4, SAM Type=4, Frame Endorsement
$$evidence //= (frame-type, frame-data,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
frame-type = uint .size(1)
frame-data = bstr .size(1..111)
]]></artwork>
        </figure>
        <figure anchor="fe-cbor">
          <name>Frame Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure anchor="fe-binary">
          <name>Frame Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <t>This appendix is informative.</t>
      <section anchor="dns-op" numbered="true" toc="default">
        <name>Operator</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN DET 
( 2001003fff800005ba8af5252a35030e 0 1 "TEST DRIP" "" ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN HIP 
( 5 2001003fff800005ba8af5252a35030e ... )
e.0.3.0.5.3.a.2.5.2.5.f.a.8.a.b.5.0 IN URI 
( https://example.com/operator/* )
]]></artwork>
      </section>
      <section anchor="dns-sid" numbered="true" toc="default">
        <name>Session ID</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN DET 
( 2001003fff800005b6ce935b616306d4 0 1 "TEST DRIP" "" ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN HIP 
( 5 2001003fff800005b6ce935b616306d4 ... )
4.d.6.0.3.6.1.6.b.5.3.9.e.c.6.b.5.0 IN URI 
( https://example.com/session/* )
]]></artwork>
      </section>
      <section anchor="dns-child" numbered="true" toc="default">
        <name>Child DIME</name>
        <artwork type="text" name="" align="left" alt=""><![CDATA[
RAA:
@ORIGIN 8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
0.0.0 IN NS 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa

HDA:
@ORIGIN 0.0.0.8.f.f.f.3.0.0.1.0.0.2.ip6.arpa
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN DET 
( 2001003fff8000054e486394a60bb669 0 1 "TEST DRIP" "" ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN HIP 
( 5 2001003fff8000054e486394a60bb669 ... )
9.6.6.b.b.0.6.a.4.9.3.6.8.4.e.4.5.0 IN URI 
( https://example.com/dime/* )
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAEw/WmYAA+19a3cbx5Xgd/yKGmpODDgASPBlihknA5GUxUSiOARlJyeb
YzbRDaItoBvT3SBFS9ozP2P3nN0/N79k77MejeZDspM4e8KZyAC6uh63bt33
vdXr9VrjPE6zq32zrCa9vVarSqtZsm8Oz45PzVEG327NeXRl2odH5x1zHCf8
06soi66SOXwzw2I8TatkXC2LpBVdXhbJNbx+dH78KnwU5+MsmkPXcRFNql6a
wHhxkS56RXKVllWRJmVvsNsaR1VylRe3+6as4lYrXRT7piqWZbW5sfF0Y7MV
FUm0b46zKimypGrdXGGH6cJ8lxdvYR3mmyJfLlpvb1yb3iEOiB1Ln2UVZfH3
0SzPYDa3SdlapPvmz1U+7poyL6oimZTw6XbOH8b5HNdZ/qXVipbVNC/2Wz1j
TJEjmJI4rfKiBd9NmpX7Ztg338HKpstkPIXR6QGvehhH89VneQHzH/4RIZ0U
iyL9Memaly8P6BnAJElgzttPt78yBziLYpxGM3NYpNcJtRjDVuybP8HKr9PZ
jH9DaObZvjn5EzfJYxh8sLX9dEe+L7MKoftmNKQfknmUzvZNBNPr33jT+/fo
XWIn1Qcg0Kppkb/vm7Mkjb3F/T6du59oTWfnz1+Z2WwRrGQE2JLFRXJTmhf5
svQXsbW3aV7AImALqzwzZ3kUd803s6i8ym/MaJxXM9gzb0Xf7AzM9rOXtTX9
wV/SD+n834vJeLCxtUPzb2V5MY8qAN4+NTt7frC3O9jYN0/MweHhS/3t6WBn
C38T3PzPZVoQope2wdZX27ZBDDiov29vud8jQH3A3mwSjsnPAI0APXuHfXcI
8DfXokzGcGR6WZHGvfEmt53n5dv8Jq1+7DU04VejLOmNZylO1u8/ysb6e22c
+G3a2Dn8zpC9zIveOCkqr7txXkJv+CDJcC9iatBSKAz29nYRCunietfM8vzt
cqGPdjb3Nizod77aItAnC/t8d/fpHgEQ1rFezcrIPtjbHtCDrIRlm0U+S8e3
+vCr7T3qqIijRW9aVYueYhY+3Bk8xYc/3Nht2hts8gSBhPWulmmcANIldnf3
tp5u4uOxe+Ppxt6mHeE/l0lx2+Nt9Rps2QY/lHkGeFMu8qyEbqnNwflwc2N3
a8irxz8hs8OT0fE6PDX4uDc0o3k0m5k32TzKsiQ2w6TAEz+6LatkXpqT5fwy
KUrbidIj/U4nb+0ABl4CsTDncJKzfJZf3ZphWeZAPCogDaYN43XW3Eyi4goP
J4Ku3F9fL6f5oj+uoj4Q7un6osjj5bgq10ucWW8pM+tFNLNeyTMDbKSvWW2C
MRDzfVjb4Glv4yn9+nw47J0dH/ZOTs9erUBj7SSv0nFi8ok5LfIFIFpszpaz
BNgN0XYkDMk8rxJhRJN0zEuCFxzM0mKMBF+htvYAuN5kwKJioE0w19I8T+Kk
AJAPrwVaw3ieZsifBHiwAA943gIHfAifb20PBjqGrGuEDCcqYJBFMnazBiSy
6zk00MScF9EYV9pqnnDP2I/KOkbnr4TRUZ/RTEeu7erNzU0/Kqt5H15bn+Ac
e5ubUX9azfUNXsrvl7NbWM/mpvyKG5uUSMfcNHDQfV4odDK0vx++PgZWs9Ef
7GxurLvHrV6vZ6JLBOEY6MT5NC0NCANLkh7ipBwX6SVAvpomZppeTc0suU5m
JvJkB4IUPhdRgcGHAIvTcpxfw4lEFKjJLCUJLWXHLEtEnsOTUd8cBu3hKfVS
JLMIcWCeVMAHq8jADBdJgYccfgVM4K5L2T3sCnnakibHXZS6xfgM+pnmcdk3
Q3OVZIRPOOh1mtzguLiSFPdsEo3hdeExsblMqpskyeDZdT67hh+AawEVQXKO
M1JQxdAA+vChCJR7aiZLglW5XCxAisEl6/PSXKXX+AMe6QzQb2bXQqAs+7xJ
8zSOQYxoPUGU4oMPT1utMyuhwbbAbixhqdgv9FPld548034zHHU8DG/Dwe/0
zesMUIz2YJbO6ezlAGxBX2NZJuzwOMoAKICDsETchWcFiAVjQGMDPXXN5bIy
ybsqyWKCiXsPQFPmsAnpHGacJXCk4745B6gDm4NXSuwQ6WoyYxEW9qT2Om4R
zN7gMPh5maVA+M3b5JZwkfkavtc8foYolVxH0LeTbk27TBLzPL3CXdrGl9+/
F7Hh48cObMFoOZ7euaAiwU4QKyZFPvcmSJChOZZEOaM7ZHceDGSXjx/NzTSF
oaDXOcnxgHq31AW92STkS2/tw+NXR7CFxysImJioRK7D3UAr2DgQsOEQAobo
ZEd4BoC+jwBFQRwpACRvRoAi7eFiAYtO34H8vFkHDG1zxH0KQqQAIHyB9q4w
Uzh6M15ElOUwWGFkBVEJM5vNALbfTdOZ7D+dcJjVnZhl2qOEMN8M+pv9wcqE
YMgTOKogdq+2Xp0+0pLlJUgsXTPHDRYC0LjPNyAB47xA6L4GigQEpCQStyxL
PvY61Fe1YbpmCLwCV80nGr5XwM4q/UKMJP1Rv46B7pSgU+Apn9F3FKGBQtB7
QGSW3BAp23AJOo5pV7cLJBxwdN9m+U2GoB0CK8Tl2QPVNQB+8wMoawjfBMSQ
AhEigv3jEaHxVQGnAs88UgFoBWcD0AQ+R24BCcj+8VJ+w3lD+0UENC0p+dRH
szKnl5nWwX8vS6CiuJuRmz+dhgzITBK9hRcjWgj8djPNZUJ18MMEaM14xm9w
3otlgWIIbYQl/7Bu4ysGvG3XEVA0QMEflkVaxulY6Bmc/+VM4A7C1DXIm4UZ
T3M4B6hcAqxylNViUFoyWHZSjftEcm6J1M6SCcEyINeICCQDI1Hho4xt8yWt
DhjcQjmmd0T7yHmZ7zDFQySUbRkzIoSLSsv6JmY5cDYU8PR1xmtzky9nyL2A
fQNGF0qiuHNkO9LOA3UX5w0HkrDgjq12/SZZdIkHvNJ90wPid9m3fMrSzCzB
xrgv8ObVMiLUSzyCnmFfshggkrT3oAGHK7/jrEL/l3BqYp/AHR/26wLOuEhI
sLTk9R4ZpibzjFlwyTM7P9xVHAc2I4UtggkWOAVslYBeRmy3bw5YBWQxIQl7
pY1EMorcIqJO02w8W8ZJAx8HBt7pGoYq7SuoEelVhsMJRUGecDbEVi+AntNI
KF28OD43hzmo4Znf8MUhNvyGpqzEh+RuEqy/ORh1mOIAT1gBI0yXYQjvjVOY
+yFS8cNkAsI5vf8yymCHrxJQb0CZF3aH+j2wOwSbSE8kBdUlSeQIfRR7vhFp
DQdJFpV5/yTFWYLOS98/tlokM756MzpHvCwcZFACE3hPBRK3zGRAiMNzfAXT
nBNNR072BUtSdIjy1Nss72XcqQQRbpyEJzPPVpHIx0w+Iyjx+BBUCRWOGEPy
MirpUMICIqJWLMmK8EpAWxlGBB+P9NL7JMBdpjPcZugW4BHxLiO4QOIjnpyK
zoZ8nw9akhZ2uEdSsGBFIGOBasqng7HtBORSK36CKN5BPoXPT5kEHXtgEmrB
Et0lyA0AIsBUQBDWCUjeuot8lcjKpW95jsKhr1XQxuJiAVqnQq8axgdK1zen
0A7ZBRBCVW2R5AXt26fHx8RvcZosDtzfLc1CcRV4D9IApKJT2BvQs4CN9YmX
zUEriEDHndNUpaGB0XCwB/fkOdOkri+jCaMj6Ezy2Sy/QTjehU0li4Xlfqs1
6KPiVa5oAu2kf9Wn4RfpLK94aaw25EXZaW32VcBEuZ7tJNQmUlq2mN6WRJtg
rYjv0LIEYaNsbfVly+D/zR9gD0GkUzqL4l0oWJn2+/fWYAfiXWvbf31RJss4
74EUmt3Oc+AjNCmVG0bIDqELlBlFdj+/Bahud1o7fQOkiQg52jL4IepWoN6/
9rSjY2LfrdZQqYjCjs5PnMCy5mlmBXo4X8TwkXehwZpmD1pRD7+UKJ0yooos
0aZTkLI5AXGRZCHi5QvYUmC6iGzCqZFFgyqA25+8i+aLWdJ1sxnQq5sqsIOW
DBjJ2JeDHJH15MyEAgjyeMaJklValIlwh29XcWeHcJV6wYleR+mMTgyJh3f1
Kuga6i4kg9iZb1Hv21053CCdAN0dV7NbsRLgsLjhXYU4DIzq5Shc+o6V5UFL
fosE8RJPkjCSJUGXRSAZGYBVO20k0IRkn4SRmX6frCqdzQesfZnc5kxx5SB7
tN+j3Z1HHHhzXGErFUzvQAx8ZLERxy0VVoCpqBfy/rIll0ZRpvVcTD14BpZo
aQZ2wlOw4iA+VnOXOUivU99c582hfTAclh1i7Oc0E7aFvn9SuW/A0p88MWdq
gvHasbyMRB00PWBQa0hJ17r8X3Pymj6fHf3Hm+Ozo0P8PHoxfPnSftAWoxev
37w8dJ/cmwevX706Ojnkl+FXU/vp1fBPaywQrb0+PT9+fTJ8ubZq+iExImet
mNw1CZ6yqGYuenZwagbbIBT9C0hFm4PBU5CK+MveQCwCieh7dBz4K6shoJtH
SEcMmqbH0SIFjC7pfJRT1ASBtyOuAhiHcZzKtjjJrKyz7Xn0FjZHrBW4l7gd
JbG3Lsp+rAR1YAETImUwMmu6g52tjx9VmpCXkAx2zVEWAxugc6Fvk6EKSVeg
JYvWgT2UJLmC4Ho4vOMdspXwys5BBUCp8Bo5Aa3pO9QV8WyTwECHWxggzNcZ
3kDjBCgJ4hbJJCkKUWRYdiCqnNKRIkKQXQUkFfoEJBaTKPVeLDMSwC3BIpqN
3AdYPzRto2IAB3KOag/3XpMsmejzG7B4084XvGkzeGQPWW26a9D3GivIYhnF
SeBYOGi8rFTeWIMumxviWNyQjXHIFBQFPEsmIBmLDIzoYwt00NlmSNZBVbrM
SxQ1AU7jWUTKRWoNfXjcCVJnyOPgtHsMr9XyrWCMYLwPofqCZiJrBiMT2gtQ
aRhwk2VBCCgqOS0b/aIVutlkPXNE7zgQI9B2kqhAjMvHHnHakRls7vUuAQeu
o9nS09BoB+A8o3El0Q07Pr3eNVEcF0gsQQ7A94sELctd6pEFATQcg3yDZpYJ
zGIJYnb0A0LLGpT34b1T2OD0HQpuL6zWgbLJi+PDDv2KMxwtU7HeQlvokKZa
Cg5l5vXZATQ3L6JyKoIQK5aypAUNQY13t+mXKbREiwxJ1tyqtPZ96IrRX6FG
KIADwH8U8HGKsiXSBdS8b3IDmzCLYUWIiTgSn+gIBPTBNvcPR2CWZFcVzPH9
+ylow71JegUYgASs5EEuQU9/GwM9A6i+34fHAKGCjHy9aAZK79drY/KHr31s
/U/4a/265/+F3+pfa99/3frA+8gbYD6E8P9QA/wHH8jmA7zc3tRdMCb8hl+9
b/SdAc+Nf9q0jf+3bmp//6N17+Nag4bn0KJ335//fuPrD/15HXzW+34PdVit
/N3VwIHxw0OmFcGEFUvKB6+L9mDb3+/6310NPvwcC6GDQIfFPNFTxT7Pr9fq
Tohner7WLBUmnhxQ4cf5H4QUSiuil9cJnPKDWZTOiQutAwk5QiqBJJkVGCsc
o8yEVrdklgInAUGGjBkkfU6Ws0CGLgPJwvZ8kBTie05KFrvZ2c90nXgPhkbM
F1GJVqtr4FCoC4JQyQqo8+qpOoZnX7UxIf3A2AAjgLQR+0Vuj2SVHexI1eN0
AtwZYUOsrQsUHgQ1akzSwqpFqevZilVv0UZOSSdT+li9gijULZJ3LAvjJ3WO
Ef0S6k7uRja3W0OqxBuIZQwlHOtzigjTWUc9Hp4MnUOLWCpquR6Tgx+jMSsi
TAZLUkEIIKVKUZewreMpW1xcdzP0gRfsrWWTUJrJNFhlJ0CQkMlbRwtkl1hJ
0i4gSXIVOdsY/JaLyxRXCwyHNB3dYTFce52RroAsnLYv8zqgFcGxTGYTRmEA
EUj8yD4J7k/4MFAvvhwB8gyZH+D3j9b4IrxSBiVbqb9BMNWLzY2Nwf7Wxvrm
3gUKZoGIa4YN61JNQ/oQ7eUSZbWMhEpUr9OrJS78CoPu6NVtMTuy90CNhKSx
pZeon4OwAqdODB2KLqzALGaw04SSuGV4NpKqF2dop0D9OoE5U9AOrf2jFRqI
7bsFAPS+RUGqNBumvfFuA/461ua1JT9tdTwjLu1ObPuzhh+EJe66WzpJdeQb
IKrAsq+HIzD1gGDAGhLvOy2EPZEcA0CizBLDTWAsmLGcfVDd4ITQ6SHTtT3q
4o4Sy0Q5VRtyiWbPRZ7PfKyEjgQsZJ8g36OakkTOF7Oy6uHiBY5cyEtufT0E
DdRbrvM0NmU6X85A4k1w9z2kJlP0I4yGpHM/7FYAbC+iCPB8yMoNicuX6BYh
x02BQTBRJn5NPkagH5WqicF01USPQiHtxzSOaBteoYyP8EveLRK1TAHI0GZg
2ux5AXwr863B7i68EZp8V8OE3MSfkz+EJoOWQ0WQhKeA0EARmQlvWpgTtWQM
4cuIiF37ZDjquIMU5xjGkJM0za4az8ktxhbe2US1wNTbNNyeG9RE+wrH/Var
x/ivhtoICCpvmaqVuNWCPTxxHMSDdqldTCPiTGLQE0wiZ2pUrTjh8ssKRRnW
PKEHOVo6DbWFsb5rPXYMNSQKDoHZRi8WfHnPdYgCE49Er/2IJAuRek6GNz5U
7HXDfX4BhPbs2xEzFQpfawFFREh9Ic6eZSkHDZrPPJqBOi2rbR6x8Sm7o4HK
JCbLTLwt0EzBrVYN21/pUR17ig25ZGRoJOK41Qxx4RnHo9cGEbY3QCM4rG4s
+AU4fXxyggdKUZp5OvYAQL4izXVb1rDdwYlvPX36lH54/vQ520YCUkkHhc8J
CQR3jWwO8lhEIxzMkjiMYvaCWbz3M3kfo0uRJiGpSRezWx2KAQ4PYL5pH/q+
ACLxPbX+GjAu549fmu0Lsk8vC59VCXTb7p1fm42LrvG/D2rfNy8I3fyfti4Y
JEsJzIgUNRwx5DWnGaJUQvQMoQrrRCtL8ZapZAR664Wd89dmMsvzom0HWjfb
nQvR8zNrFCIuFYQtTsU6sLoJCH3c273tDfUIEujLmtyHXGPfbG3tbnTx3wH9
u0nrhg9bMIdj35QF5IhcSUzkHArhrEve1acbG7hgxCJP0jJtFPvsPEmYXwMo
Fk4upJWrmXuNpfWcCCDRGhuHMUZ5P8rI3pV41kIVCkhyxID8ahoX0Q3TjNwZ
b0gWj0nUK/NgCOrP+lLsOLSjZaI4pIZgKxmQHZsoLIDrRX4j1juOTyqF3rvT
LN2seD6J4wY2d3WWMy92M2jgXzRZ3wGE2gkK9LAs0L6Som94ZtQQCTToTmRf
ymhGaUxzqzPx1Tmdsp+QaPFVhAYw2PZoGS9nFPbAuhi8hqS3Pu/HiAi/FZ5q
TnIMTL0C/oRoQ0ZJ1uuQilszuETtKIla1x32JUOQOeTldZAJ4CHh6dHJm1eu
owotvXnmiXXInUAuXRYJg07SDRhNAw2hEOFYpc3jg+FrWonnn0X3JC1oqBRD
9Nh5dGsDceY5h2pkBD2QBkx74hmFX76h9T7DIDs8u8TIeM9Hb5NbYCeXCSuT
LOaxSkO2Mk9Wo+NR8poqETUUe/BdDat7nDz3xBwBIhapxIW+f5J4X3ssxa0w
nMHu1le7yGO2nj/fI6YDv+xtyS/PQYxK0qtpZdrwEAlUlyRAe4Ak8oYUpRvJ
/yFVRNmvGAr8idHYfZoGj049FkkU35q1lOJi1lhnvUBFC4Po0CgPos/Fqtma
F9LGjr6ys6/xypokTlGKvoRPs2Nf2hWgJspzNcG2ZDp7k5ZTWjJOgEgNygBp
TkZejHVdPTSYsIHGViD55TRdEJuAHsbTPMcQmiMSxK3p+97AHdhRFJ1JhEQp
BdH1kuRNctkcj067hsgf0p204Cgusc5U5PER/6UV333pnLNTPImW4s0Sz2CO
+MmBShIDmLJMrDHE6Cwfds03BzAZ1OBea3AAhxQNR+voS08zoFE2dNu0Vaan
iNREUIRCizRW9VRi9tDXDRxQpDLiGCq1suOBRrXiM8+VJRaEtQ3yxo0DebOn
MW1xwi9whANIoZ1+oNZ3Wfr2oyoQxoKAnt3GBVH0Vh3BIp27uOXGkIdaqAM5
ET0fnBf30DTGXV73cLjmEAkbGVHv2EVD0DY2hkPQEUvZvw3CZA6sAnl8G5Qg
0n340I3zKzxQyCsUszsWm1fVBtGHPLXAmmEkxYqRFM8Bagewp4KmqsSogUE1
DQpPUNZAdMtqJjKsC8SGOX1RiiAhui8OxCIS6sBATd7i/IShIvXIfIOCTz+c
JommxxkINqADcRRXzQzBGg8hSzlNYt8/7xid2BLk2aO4A6vjfjqo+uXI8smc
gV25pB0SfqPjhmybK1ErXV2L9XH5ltEGOyvHIJMQuuAwFEZonQG7g/pmaE9W
mfjvj1XsVV2e6E1NCyf01s0nr+w47wWaGyZCoCDtcj+I0UROpEX7dEnqohfx
58jUi/Pz0xHzl1l0meAZg1OXF0hoZrd94/VMtFHaaNj8XGmc8H8ZFKOqKIgj
qVBNj5cUUaCTl1PooBE6qINkFpvCQuh9yu64SEPSoqLLjmELxS4o5cjfYXJH
GGNb8rEmmoufkbChnJmPQShqH52eSlwnJg9yGsOsvqzSTZzVxXAneTzyUWY2
0olFuVl6CVO8VSEfo5QUgF62zqPiFBs8hNZp4rw+OEGO1Q0cc3mTr8j32KBX
hzAhePql/fvw5ef+tb70hvjMv4ZOHunWub+Tz53JE/r78ORz/lwnnz+ToJNf
B9uru/yJnXxgchr+PWJutU6CUza8IjS0be2RNc+tvaqpkzac8prr8VNn0nxO
PrGTz/3zOrn3L38cntz/9yBkHtcJ0MGf3smjZvKzwOTn2Z2fCU9+prPjB1zz
0Vk9O7f1o7N6do7/vzo79+PDXZhjPpfa11r+XJ18Bhutt2zd2f99MwneOnPR
Cj6uqVZ6x1usRH734vUxaMFnh8NTjWxcWTXoHnfPciUOqHm8L8JWuXnJ+p7I
NB6j+yIMHbp3rCCqJJDQbWgJnuCXIuUfWNlujWN56WkDb2NOBWrHQk1RKKBK
jCJbw6uoZKUqqUh6DHKRcwpkJIuhKoBokSEp07NkSGaLE3JBffEi6kly1m8d
6xRKqb6D1Sn8xG8RpmFVnmt9mtgYT9uWtRw1NmP4guSbcXL7uLhdgG5cRIsp
yvyqRbNam2ayviD8xRrYcHALM+c9DFx/GIXPGX+o5/qJbaT4ksDqaQqTvHCK
tAc/UZB1CI4mFMtH7L/PUT1OTgElEYvRsLKOmRktm3ihkedh2mJ9RlbLiuJr
jPBhp/1jYuIpH+PU+rbGALqUEyEx5MMFRVuNS32Aorcn71KyMpJFwK2InJ5n
aFc45tiQS3bULiJy9aqqmRdBKFS6ol0GvfrOdxzkV45dvX/iAVCstbYdbqht
SSalIunZiXsIqx4xqrdwXte/HLhtojjHcYo9xOW/2VxM5/MVK42EB1+iHRSr
M5GJHlPYKKXWpsricYN5UKEc0jJ0fzWEGsYbHR1wOJlLYwAAHemynK+Wc+xk
7lgVhXXSsIyCVPQQkJU+zNLHqY5ojMcAmZXMKfFbcCdBULCfZoYJhpQBxaYp
1a1hSybL2b45f334Gks9xaDrshGbn2ANm/J3K9ZjojZi56X8VNC086JCnoQx
/5xdrz7BID4hQqMwH1EFNvaF2QKcoUc4RmZcm+qMHSAGsD2cgUfR4GQGxkI9
HGBdYPbrLMFcfX/pacWpRbBsyjQHJX8hliq0775mWwT0zyTdBjjc+J4etBiO
aedtQH3fMZVVoY8lODRlWZ5yPFQCTVZ0R52JMNe5SnJFMW5trEHA1tKOUik9
bH3bcZ3wZg0m15DAwlav4/KqZH25QMdePWmI8ERIy2oyVQtLzrBryHYbu5Tb
Bwnjp0wXtoNKKwk7+qQpppP6LG3RhSA3DEPslKkEueJk8ZeqCM7ehAJUB/mK
VJnCBBIOm9vY2/z4kRBKv28hx7lzLnQ4muZT1jP7HwRpC6NPEbN8GHFGaFdN
d2ya7erZ9fgRJnU2Z4V6KfsS1YGpoYHbkX/+4/Dg1UsbkBdHCwnFI59lmI8/
pOPwEFd8BDO8/Wvwwlu2TB+dh7hwit7esuRTp+V7FvyjuN0Kz4BHGfRk/GVy
LVms38LTCfKfxRLjAJX1eNGB7bLTERLpdcciEeazkkAxTcZveVTAyBlJtOJO
4UyHY0xfPc0XS0pN1IWt+0SWFg5UJl9yIjmai2FsTFx1Lx4ejrjOEewXvaCI
wvIobivmqHJ+fJVohvSyyGpLarWojbBfLjAgCECCAdNVlwouMRO36gEExEYn
Txh26eXZI46IMLyaJkUudPZtQrsluTjPS43Hci5BLMxEVWDmOVBHtzsasqap
PeomSCosUtmj1himfeMSusSrR+mO6CojuZtt4u54rqTSMxpdpdegJ2igt2dq
J1BoQaCQQEgmp5S0sl41L7VYgtTFrSdRtOjywjUwCcNf0pi/CxWTn1y7x8m9
TxoOEBHTVwRZ4IwB7PhQOblGOKWeMm9P6Lwfna/WafAr96jceDpUdUBAJ6IL
9ZQ6LybjWsyYeHlrPhc2auGHB9/7E/weN918bd5z1UsSxb5nx9S+qaCV6Zfp
j4nZ3Oga8xsq/qelAXvD1QR26mUZld+n8b65XHld/KIYB0hl4LTiWmSeUXYv
PHuFkZdXidfR99XtAkS7jX5/sOP3Qonoq13Rm7/DSguT771I5mA6A5iPtHub
3H4veez607Kahz99yZD4+rd47FsfW14DAF2b5wq/1RY92KXpNnh/22/eHB9e
b3fsm0zqBOK4xLNjCg8AkZRoW0NCfaflTd1OA3/TaXT1F/4KbxAKtHz4SaQB
fAcmsG/RzoL1/XsCLHoamXvCniBmqWgonNRKilZfxOiqYimqSLws6pp6n+cR
YM/KFN6/1zKULot2tWiCisdtj1+jfDy+7TzO94Xke6ihfAIJCpewdaMwbXBl
C7ohuA4Pe9BR7+zoORehCsDHNI+3HbhYVNiAHBz8mewiRwJJzgtOQONHOJKX
+SHihry7OidYDZNRWsTCGwd/fngckBSiG0ohJzc9UnSMSvI4ZsMmhQkDQoLK
xCFNmfwsCMN5/F7OuYvmDIrJXObXJMPKjqJBh9RqLGtzE916pZJQ2roiVVvD
o1aK7EgEFddURoOO9BDnNgRNBDUPSI1pFEOp9IYduLd+/905i+s7lOKOYcrf
nUstoK2nKLS7iGW1PsH+ADj4PBCHsRUWVM6MYw02U66CEgTphA0h8MPTY7E4
kSLpBF3brw3ZlJQTLNMROrHVcmJfYYFLQx8fG5InxOmF4sf7J3WKwxz5wmMO
F5xPa1UEDITBMHYUKX1iJ4bJ2smssx4PPRZUagJAwxXHFUlkbBm2H0yoaS60
0/hiDiCk3OFlFj92NrIAHso8uxV0YHmUg0bo5Ftb4ep64Memii4EE5qSaZPx
Ji3QxEI/yORkcAqB4HEDeJbmYuPd9gVXDNTwQcwXSjKt1CXWNV/e63oh8Rqk
64+toIO+NwYXghd1MgSI4VMV2YM6178wLggvlmJ5wbySlA5RXSJtw/p1Q6l6
YkOsGbVhfnvRESTgRVGEcsHiuJaplMiStCrdhmlu1pXVUbyqjv5avQycIKZN
AuUqNkii+VKBxbrl+XKBxVGfYyT1GEuMIL4sUkxvqZtVOADU6QZ+PSQbIog2
OFUxwjJjHzW07C2uosJxlSBAz/u2MqmHPt1VVt5VHUAj5zyuzIS4oR8rw9Sk
Akqxp3W5mjzWkCAx8NlyxoJ7QvHRLnxQK3fRSgyXDS9DYFjeY1lYwDwwQZ9C
nXGXkfhOkhtV/kpXJ5aK54orh4oBJaBowOgfVh1nKx4xAULTbwSYDw1g+aAg
/lAHMOXpNzlnvT/T0CL87d4Wqw9pUDyQtcNVW+n50eh8a/jswP9t493ggRbY
L33o1UEng3onvgG8SH7Mr7UX/W37gUF7tQ/3Dfrr+rI/d9B7VoqJOGH9HSrT
yNHNpI4n74A+lkAjZkyrvDo3gitS1ZEdfYFTrl4hb4qR+Tn60dAgtsT4by/A
bu4MF9jQD5MN2QqemVV1fiWjw2rzNTCyEm+1X45OrrVxtYePzrvh0RU6WM83
8uSiQOjat2yg28CB+ivyr/I37pnrvzypowYvQdR6rQGWrEQaR5K7HrIvJyuS
vcLWwRWWLpWlXQ096Ig2Tgis8qNSu3+MEoUz9Kbws4K3AajPMFq1SR1V7eMB
iL+2FYQwNln0IkXVyJorI6KS3rqEcM8jTvRjNqnyuc9QPfUOlVI5QxdsJ5Ds
PKf6S6aGZl4qpiMToeKUmJRoMyc/JWe5hla/aj4qvq1oZStX3vnbHZ2fusuw
fs1E59IOzmNC/4XVRwtY8aktL8AVPtAkGoRSuNIWkVfK1y9sGdHK6Lvno+Bd
J80TewvKYPCMxIHBaaFUn5pUlyotJ7eg637T2/QLfHFBsVbrsKmTruQr8OI4
8yiIyiYTJeiA5UqihO1bBVbQd+FUWFQ+PTv+tjfo8n+35L/bXZkgeY3h03Y/
gKKWP0pmoJIzQZGMGhEbKckhJdcJeq5M2630Md4rWW5eJVwcf55EXA1ispxN
+GYePhIeDFCwC+hhQ5JFPV4FvXwRl6BuqOKshlyODJiElJgGxyONaaQ0XOS4
KyU32hCPhp6RAlxleeH0btDlKcRD7MXjaKFFbEXzbwj31+LUIq76NQ8x3qVI
WJ25TMQjbRODKccV/WRRdkv1AZYKSjrTZjJL3lHojNQqIZcCD9/1aimyIeA6
B9UAIUm5j4z0Bbr7NZzHueHYYed8Zld5HvNFEFwOkWuRO4rH8yAwWCsRZ/tq
eQhasiZViDwkky4BFRLd7xxWM5cKyACwLtXiVzMgRncU6fjtbZcMZHMXFC4v
aqUMay3yYixqb0giNkYyBOEEWnoglUiQZtKOa2iMJdEixrXRJOBBkwYvVSWS
tEkp2Ry7s18/EmmiYV1p4dydcpVOvWwzWvJgHF/OnAiDBVYbzSJNhb1iv5u5
Af7YKxc4uYbizMKTmW6x0cyblSvLXJ8WE+X76X8b/eXk9hVsuKEwkWYAhAVI
vBykMeZeEwniMuxYxw1TtMSNjhiGuh3eNVDoXkUzzt1BGewqsfXxb2uj+AeW
zI5a/JohkVCQixxXqowYSd40nij+TAzliglYoQeRD+BvTK1MaRJTbB8HS1Fe
cG7mAFbMhuy7/F+34MAvGBBQsivbqxJqxULV7c8KtUQ7EVMoMoqE4SmhcTGd
IVFNKYDmLTH1ofkRUKRHV+yJxywotEpXZvhVXnmOsNW/EZUcL+3BohpKv4hC
5ZfQn1ZZ8bZ9KvFNKPWsARsbz5I1kcoU02gvrBmAyKaPE4Kjhl8mcqIS4yoh
VGBiL3KyVlECmSX+l6sLoHRhb/OxYj3V1eJqKDgBDlXR3mUq9cgVYc9KpoOS
uBRpVLsTAyURjNjELN0sl6saJDAixooo+QIT3ZIbswZMaA15XUiaupZaTPOF
BKZiKZUCDZcrJxrXgQKe7luScWZijpcBLogs4lg5FmeTMvYLChgoWBbEqWp0
6mr1dRAGs/LThUEpte7LghoaWJPkBo2SHNE1r7QTFmaj1SnLd9GEWn/qZNTT
GNlaejBXGKClUWSkWeL9FmEcyngq4QbFMtOgk6ATWz8as7qXlfidWDjA6LCE
U1htzrQkgBMe1uRGMmzd5HadEiHBZ4W5jbvhiRQu7/IysVqi/coCY6Fh0i7r
0eYRc5gWUD0kylJtN6ULVTpdEcPowpjlAnPPu2b0cui3wB3jU2K9Uyhf4W2P
XVsxj9LWUbbOxmT7sG27nKqKebHweBbdKFsVnmjvLKBlAm1EQcdWUvIUO3f9
ilzTImEaqKFTHWqcJ2lRKDQI0iHhwFzVaykMx3ZXQl07xquootBD5nG2HDVM
dd2NiXZ8jPZiFwiFbOCpobWlGpTkv1ubM7KIsdbPZuMrjwrbZV8rqfoDiLYk
sHFQK58gYRc+q2gnUhhDyiCdDYc9uXANDU5AOQHBMSm57DjXA8ricYJbVNrA
Gh6GxC1BQw2AwTIg84SuR6LApcDEFc2ukBVMhf7URCs6zHjbI3o7/fBTOFOz
Jbq+SKyaFHTZz5gcjRzYiIG/GCYgpwRX0A2K26PzFZ1rY87Td47SWqRhc+Qg
nnTiwZeJR5kQd6QUwaeWM1nQ/YaW5VOy/5mdQWQOnr0+w5KO1Kmbd+ifbPsG
fPYCkGfnkEp/k01GEkDYDIHI1+Wai1Qw6KpIJKRqXGllMy4ZphG2FOpJyEKX
l60W4KOoP4mv77DZxYunxWAmqs8eaZ20Wo14rjToKnBQ+RT2g9vSa85lC3Lp
HRWOQJ4a1Y6KXrqFwWUSE4jmJmLtmP0uldLEnRhJ+WWvdqOLPyNbYZ6zJYkE
JZKGfacSIrorC4qCaCoIJb6fUovrqK3RTzW36ChFTpjp4VptuRTRGMUYQuK/
VN25jNBkQaUuaHHkJln4xXiwVzFg1a9IZIsVs2oK+JeC9p7kw6UcqTgjzTq8
dAAeXaSL3X5ULKIL37dJBi1vW2ykZFjEGjmhmAG5QmSPK0SKNqXZBO5QI3ZY
+cxVBy/FaSjlKoN6l2Q3CK7q4UPgFwMnE+JWfwP+b0D/bvbdsno9UeUK5lwx
x1NwZS+REHo9v1AkCQpVWEyRWHBQyYkQja7TU5uejWk7GTVJI3fNsOvOrh82
uSr+ePV/YAr+RiT1kp+oUulDugYHdE0vIp/j8EQuZeGVEh3c3WtUvLjtj9Hh
whVlvZqoC8rgYsWufBdbpSxHWT2etkih9Kwqoxx5vOsN0asiVsblMyouE8KF
VdJMSiiQIk24gR06biz19bBGKr8RhLSHqJwFeEdhpmwTYuT1l20tS+QwFSVX
pQ0aAlFFiyUiJGsxvFTMEosuF5jt5BUdpHtDGDX1MhVLaGobTrtJNSf4ahPC
V10LGa888VePId0SVqxYPPHiZ2TbksHSlRHdfS4wlI3wR4sWXfnI95tp4K36
zPexnAoXtO+a85ejYRcDtajA0On5GXBKZHZE0oJ6q6I/hTWbvdJzRLXxerDg
djCvHFAQZ9QbxzGF+/oV+eXOa0QfZNFd8/vR6xMSGEt2fdAtgLP8kkvOZIia
Gdei4FItfWbt1iiqdyxQx5RzRMRVqBlN9ibSon1evURivJZveOqGHkjCiCDA
gW8xRJchWQrcBbY2hCZoHlY8fTMEUk7ObVtYWzVxP2aGNuBlmr01bRfv1xyI
0eErdCIuOW1D68hnH6SZUDkeuj9IAYwwIpmKhSm2QEoxOntTHOoscsuCaMUa
Oc/PG9BE3PdM2tSgxiI53ioeKSVlUzD1rXfUlBoU7GGQ+drs9t+9e9dOeii4
4Y0CRXTbafFXePrnpFeR2EZyY9f8zvzrvyYC3i5+5r4K/MwFw2C//tJq8WvQ
wRILXlOAbHuz02Lp82vTvs4u9w2rZddZpB+xd2rSS95VIBK6/s36OryF1KTb
af7ZJHFcRps7O4OnvWna0Kr+HN+CqTzZ7e9st10cb3uw2wEA+I2hlfd8a5Nm
Zldrwr7h927wPvwQdrC73QlSiOsnWrOIfekNjxmmD/u/IYnh4FUz2PXu59A4
o2lKt436J8CGtLldvODwUKlDqkUJtQjpwGg9qO0OSfvC/UfDVxJQJmJC6DJE
dsiZZPUTG6mPkHipP23GaYpOiH064i/ZkoSg3DYjW9kg8KNORSj3K8P/tUV8
SoIcR5Hhkwt7PCmCkqUZLsa7RsRIQxJISPZCSL3dWxOvLjVFckwmKYCBraxL
idyokBH/jGY30W2pwZlr1DOZkC8TaJmsmfYFnJMLLpToPY4meM0HPY3gKZko
qmi+sEV6eRyZoEyHjIp+shT5WrZ7mMCuZY2u8xnekOxIm/qd1N6KdwmA1IG6
fwW71CULhXyMZvyjWURpUbIjiSvwUQwzpUKKyY+nFPiAvJuZREV1AV33q65s
YJm6AlgulcJyn0YcKqUI9a2lrYV14cohscQI0AOEN+ABfFjgIMrxITTyn6lU
xBoGsg2uNMq4oeeQMpeKmP2BUoo0yOtJ3i3QLFCJFYTkrwtGdIyRlAUVq8Oz
uafS9M5Uixo1BCsQM7EeSR9GqbBcqRAce+opOgfIRShYZnPSJbHfFm3Tl7jk
g8iIHRKRxlTaijNx6azpatl8cMfVla6j484d0JSUnUeDcaRE/N5tVFgxuacp
qrbiAe1nmZKxM3JGYo3P8XETE5mTmMsqShB9G0gnOtlJC5P+Os6N5wkmGn5A
u+ZEQDJdVXQRIgc/MxPowJEnqkLlXrkzkhBVIMT7iJjI1zID3AVUd5w/haJe
aKCiCsnNf+zvbDwNrzJ5/+Qd/MZVNLwH5tSZU/2fR2gHA5mbexr7PRFZWWh+
p0yDRMNEq+Vpzdr6hXZ9bRfzbR72hfbRUYch23WVPnFONq2vIyQxAxol14BM
+Z6p1SmKa8oV+/Onr1c3uvB8jWDirAfvMUuCCGE5kXz/hwv5lT5qQ3S5Jw1d
qIJCgnwS34xGnTuhxHMgiyTxt2D66FigW6dpylr8d5p4pfhP/3DscXvUNYok
6AXnP0lnSaBAdcVPKnG3DH48cFGtSGj8NkV14wgP35TrItqw3pyJGLzEKAVY
f3REO0crwZhuhHaS2RRxMrzLxWpEBoqEjaT//V//62VaJf/9X/9bp8u6Grv4
yAJNIQfi2aIqLpgYw9NFd/8yU5lqBjqLHpmcosP5Rje18NtKLWWJottiWbIa
JeFbhGH1yVHywG/Cuan8k9KQYnHgooabGKRTj3ewxW7LCre8RKFJFzSRcJJg
WUl2nRZ5RlQCxM400+AcnZidTu58U1gTAqHu3erMfIbMt+uaoGnNuOFp59CX
ZUlplRJyPQxohVdM+GDY0WGsQ8SiPtnZY+axPAGsof1F6S7aOOAgjQb61B4e
HJwK6zoYtstgGDo9B6dM9SVPgYQnP6sLO4Cjk5dlzy2QOHqx2u5gaM7JFvwy
Le21qItc6t/QXk+WxNLowhu5Wse+zs4ohb9/UQ5BhPNOZKs890Gp1cOxDxgQ
wWMO87EZbAx2n34KmI5RToCjU1Fp9cgsCyXVUcVIB8RlEin1ovALCbCQAv/X
ZqP/dMsSMThyx8Pz5wDl39h2UWHNRnznAdnhlIACtKgIaJnzDQ0Z6ykuz0n6
A4HsqLSVdpkir5L0bgMnBXGab/7G2Gtmyy+OiW1HoUqlFV2A+kYcaILnDIfU
rQm6csQeKyFM8fmM7DMUAz5L3yZCRty9ABru4TmgCww50WzwOLr9ovTrMuHg
rK54DE3ozAHSd5FWkD5SlEYKZCPGGA26rPg6f+tVQA2uLBPBhNI75dJkkKUo
YAFXjaju9Bty5wMtv/Ys+yWtGCY3RF3JUGURtgznlV9keA4gulLLog4yYZbU
PDk8vnByyijF4rBI246OLENmOGAo3mRCaWmoIE4AfHz+qEKyOOki9aJSlI4L
2qyEYTaNLLSyG0Krfp85iaDvtHqOhsMA7aQiLuJ6tgS5Mq+PD+kSYhcoKfeu
ChWi233ywt3yQxwGd8g7uzQKRk4wdyzJNq9VoYOKRy6IxV43RDhJBEnuuLiJ
smqdjPghHbf1Hu54lcz+yoTxJKJdgCz9VKJcdUSWOKTSfXjJgfqwJMybqiT7
DMvWagBuUsEiitLGIPpZozQjopMNwqdz0cJJRj8KGpDNmVrPz8h6DtTCifue
UVBKlmNOKCvnCC+6Ell44IzKIMEKEDW8HRI7N1NOwkKu8G5vOj4cnhyJg3v3
6Z53f5lKFlpmXLMFpQwGxYSMMewGhpbLBS3AqAX0fHBEtVgyEPA5q1X6x8PD
4qRIZhQflvSyIo17403OpNVKcQEU2eNNleoqzmbBU2Ud4ojrGGXcNy/h3/XX
B6NTDWjyxGJZAjEpssv65fMvE1vXrb+ic7giwa0WCKt/dC4/3nE8JOSxcdGa
zkjBSWKkL3pdUtBAWXlOGJvLqFFG9YIT8goF67krIleaEREmyULV7sAXTLQa
XfGEll2/eIp6+7weszuEicYJIikfy3XyQFYYNkGit18mpWsIlAejMzUeWQFk
qQ7XxmHwga9k6pLEgB86L8mBmMtt7hK0Pjx4dbQyJhZChD29FIXAo7H1CQB+
oNjDgIDpl0rJFN5Vba8v1I54CN8ufkMzpMPOEjg5HSU+92DYN+Z4ojgQrNsG
/5Mx4ki9NkJJ8FpFmMQzMidKEoryxAsjUSlkAfMcplS4JKLQI5vJDCvqc2En
h6vX6qYl3odljkAbUty7dldMEW07c5cNULUvse8i8aNsAqoE+pL+JY0ZT6tg
IIewxjYkCx1UZy99D613O8FCnNoHp3xij0QT5PCSCeZ/2qRMVYpCG4OimBZU
knAicslyhImnQPL9o44IBRTiSOwj4ihDk8mROOcaxm0f1H/CUvLjy7wgUR/I
pY3TiCytKXscmUrhr6jLknAaL8d6GdyPTver8SBkbHnWg2a9G4wz5fqBRAGi
K4kygcPYQ/2V70XzlqY2ZLyFZUFu0nfmWX8T0W9ra8BmJEk7i6oxlSA9qE0B
2w72tlxb1CAlGUpzZsaJU7vpAkZ8Fc2T8wUGBMkaOF6K5+2LUiIvAMuiVUYg
bZMneZ5yvgb3Anv4b//S60npwRvVQnE1ssrf/c70er8F9McV2E2gu4oE7GLK
sh5SgjeX2RpmfMFaRXSSkADLUmauxMDh0Zl12jZslKd56/249u51CUNx1xaS
mlOkVygn3t9xHyt4nSjnFLdifY/KrmdOdhZQykSZjZcckpprNcjAKOi7NG0L
OyMpYAgzHsjW490TeucbESNKwR+d9AcsQcCbQGJYupcT6l3hyxL9O0ogqJds
vIzGb2/wrFCriDeC7/yt3cvgkl1WQCfe7vpW2sUI5yiXkwkG80nyFSk9uBo5
DPROfvkDcBe8ySohiQkzC+hASIEWPcroVEemR9qnu8cuGSd4LbRK/UDwZreO
WOEguIk8CPPWlRwLDAykQLu0WW69c5UqubRab6xoemdj4vzTNKErpsSJmGY9
sinxTRb2HiUKkipsGQp1xTAfJi7CQVqpvVTJ3SlHgjawEacfY9qE7ixze+6/
JBEHByC/OPAkYSEax0K4R14/OS8+vno7aJcoKUu8S4h4uVehhy/1Sjhoh80J
cg8TXZediPepkLjZJCqXrOtS1BzCIs45m5DM4RQPdqA6MSEscR/vsgqNbqDo
o/dPXCQkGrvEAMYl2twdKJorVU+27kpXnK9NgyNCTrHYiZTrOT46f24Ggz2E
DFoSpOiruUnIn9IzRxic8O1tNn6bmDb0pPP77psOPH2WX6KJ+20OZ/FH+P77
dG7O0EHSljhUnRLQP2w/jKO5+S5NQENLxlPU6ttHIECtNvwDdHQYXZOhGife
AQUN56/RpHKUbl0ayY1mD+a+MdrebE2TXoJ+OAvQ07uMu+jyzTY25PmAgkqt
seu1fwtwG7UNviKIYkpd1ezaTYmKkqjM75jbBCv2SiYNKSxWiD2n3JAs7jGl
lcfQ4fmzQ44AwH/SeUJIquoc+z/YBGb1JkztFpHYwxgxtYxeDoOqIRQcq5ek
p75+HrBhnBBtAAwEM2KpiX4hyGpRSO9ScZQ3/Cu/BZn1kj7fzyAaUCmJJ4Vf
j7PejQt6/LNUHpfG5PL7S3taVYtyf3395uamjwPipXrrHJNHK1lH0Y/+6b+b
VvMZWk1qY2hAxrYf2aBB0/aKPdjZ4Eby52yHVTWltHqKnWFUaIQE5aIrQT3i
u/nOEkD3G9MeSQzDdn8He+YgssHmLqnRiCUuR5ude+uFM4OKD2Ufq5HgquiS
crRSmw90i+uy5KITbrUNVTTsBZarJTZsWYw764k0VRN53ENXXWTD9MyWN6Gh
BfoH62ds4+53+AC7QhtCQqgipb3B/mPHn/k2do73xTZ07gV+H9AFnEiAmjp3
V3aHYNne2MDJ412NOwxKuaARPp+sD+8A6P0Pbefca0+urwxnLkQZ6Kl/D+Wb
MunUZr5yYyYs4QNLRnOQW/yaCk23LVNJGik6Phzaqjgc3EdOuIPRt4ZcP8gX
uRx4KJ/r5ach3qv4Q2I6EpF6mJSlIBoq9ClUpN7ZX4WMNAZ2DVcipNQGMZVg
GiHMfoCj3B+sYQEUyR/GKXw2tRkFlV7PlBN4ZGerTnYIghJNxtePY8cb746e
P+fCic+pFNgB2oP544iR3ut0u7FTtkxKx89tx9Dv82Zat0LkiMDhdUX1DX4E
ObN07B6ydO8jIlU8CKbE9PxJNBMlLLEYUKOBNGquIrby/mX9/U15/7sCDi/g
TANp8d+/qb+/JY1ABE0naLi8//15/f1tafQcg+cbCVfw/iR8v3UeXGpiY14I
Mdzee4XE9YYODlrmmsdIP0hYHfqnQWMCORRIarn44WDwgq2x5+KF9Aj64ZUP
t5RQrodbWg384nNoIik9hN5CCyk2H0H2SdTQdfPXIIO2d6J/GXOOrpDBrhRb
FKKnWhwVcKQLEu2v2MPfUaq6g9J4aO1Tmfv/ajToXvnpwb9aY48KueFO8JoL
CaJ8cG72fOrcBrUGn3CzYkNvm7XefInt0+e2VWtw5lKuuDAeXSrgAkHOhvb2
s4betmu9vbjnauqH57ZTh9u9l0Q91NtuU2933Q7yYG9f1Rr4xfvbJ6OV5d3f
216twWpp9kOy+2ABRy2K2Mb6/52m3p7WemuSO1XtPjnphI1XsZcE8B1vbiqC
P/hXu6GMZe6wwZGGDCruHx3dBbsPgZ+Be/sqbHCMXvgCo3weMbfV3vbCBrUA
/vt6bertadjgTTYuErzWepgW4yKaYA301WMgjVdP/UbY4BuucnMgmYkjuR64
/c3BCu419TYIG7i5caVMKQeBqcqP6W0zbHBGdyYLhbOicRu0zA5eMbCcJff2
thX2dprO8lUx6tFw2w4baNzpZ/a2EzY4lMvSbjGZ4jYbA6+0Ji17Tg8xJrSx
t9pZkFKl9BbdbY9XbbQppPQxc6udhRPQOjGYEpV77fWUBT7odXTaub+3vbt7
g1VTIKjr7fCh3mpngVaXiFJN9K1hhoc0xyaehRRpd2dna4d7+ykU6XOFRjH+
+GJjST99uuAoXf3VREfuPxQe98wnyY7cxS9PevSNcHgcXQmFR2CCkyGbFddP
kiJrNjtPkz2WIlQyw0m0nFVSh3uMyQkcc9V4wa3DfF+1HWp3rCdLZykXpbx/
yWGHquvC5pDNIuxwgcrztyf3sdJ6h6r8HiaYiyGWNNthllNqFN9EgHNto+Vd
PFc4gU6tw089mzCU1NFq8AlhAOgZYhVKaL8yzxN93Godsu8G82kKbUGuWXtX
ACcKUTDfeJrO4iLJNMwr8erOSyWznmjHVJ/OhkC5mCcqHOqPxrduHZ1L2D0p
tBi4Lb7JIBKVJoUBkRi6awtpNtYkpuBsR1boMoAXQL81p1ldLF4lMqwaWphd
stTbZeHMuGoYJjSV09qVnLgS9T9j9ytv2WQdl8scr4K8yxF7q7Ngl5TAlivS
0hVbAhd3x9bKDU9awjyquMSBpvxRJBvfI9gIW+hibcIIksRrcE4xutzM4eCm
GOFB8ZXlNCpsIlQAWS2Ck4C+Q8Q1Thaz/HbOpZJKCQ8mX2NO1BGDDaplTNW0
xDuLjilXvVZu8HLFagGiPakV93GlSk2q1R2FyHKSZJTdYgrD78xpUkyjBd0C
OUW8dIWoMGA04crur09e/skV5c81Mhtzw/GlGw4Rt9EMa/kS+B8GWAFI1lx9
SU0f5cpJ6CO32Ph8iKU84N8eiBS9k9OzVxjMwd5s9vnZ2K/jQ44lQfmIHHNa
sV2CwTRiEZ+5gM88S3rk3wNSo+WecUc0XyR1de2oFGXm0tFmCWcgYTyLeARt
vWQz2EeIn09teKyrFU1n5ibjosB6ka6GZ7jIVXQk0UVwh0Nrta2iAiP69cZg
nSxXM/N7oiZflEEn9VJG6CkQLCQsd1llvL/hjQs0X3bAZ7F/e7AcBcum2hQI
LC/qYqzvs26xpUsjgA6lXrFps1kHHo4ZXFlMQHxxLDHFMgWkOhLqWCQlMlAX
/MngoleZAFBgp95qQXM3bY6b80OHZUgGiM71ViIhIwp54ZuEOHU34oxM3xXt
chDzzAeuOyCVjXJYcgXrvjlkWmvbzNJ5qrE2uDw41Rni/jUFpbCLlNbA5TMB
J1CcQhLihah0vRp3wd6+1enr/lvdM8+cKqSHHsfH+KWCC1ImFIiDMTMc6WfT
i7ST8FQRAoWvUfIdlYOWidTKEFHC1f/ht7RA1n//1/+1KTc62Tp+N1XBN5zn
QXwehIQcb68B1k6X7RXo5E9neLsshr+WtwA3LE1h4RMW2fD42hxzhSSuLJrx
1nOIuH8PttxH7oWD8eUn4v+G6XFV3GWGSSbC5OCNK3FXRbUiRVoIGWfghxSn
E6ldqVUfkby1GW3mi2XlSukB/+y4RaV33xrlrXUilzri6WAehRifu5uhTdvR
sBcYkXDWkRCQNCgEI8d9Ljls7okWJRlRrgNW8yOIzTyKQ+WJzWRGtyBr5krT
1T2piDZ4lVRe2PyVlZySSTRGKYpzhemUILtIpTT9CBbFMWZz7sfl7wip7cgc
S707R6qH2oQgO0k3tyvMCmGpn1CTrDQogABtRJEkyrjm0ahaYoLaAbLh9vCP
aANLCtj8H+Gkv3x5wEUOgpgg035xfk7iLQojWHKR2rmcV46fI1VdqJKvTHIO
LxUep8NrXxjrDIkQzaI0FhxdBiWcPb+qVsgdc1EiPZJUghGLnS0lftalCIcL
0fq4fOmZmAKEqlPAO63BKwJUT6WtpoZptQRZU3toh3E+AHVUwzDMEeHPmm2Y
SwKSlBZiUilRo3Ypno6o1HUiQY6NPVBKFlCSiNLfpcAT+3Y5mkiFaHr7vuqF
2ReVf8NwJtHW3l3tfN7EicOZBhqMGdnSg1SpRkvaFIWtZFMU3welbOT71+bP
XCZGytmQKt0FteMSfYCS/uDnr//l/gIxzeVtWEEPfh50Wv4g8LDyutrp+OV4
8NU/D7705/EXvB9SfZgALCmsQ6UFWqBY0Ctf4iS3Nv8SlJUpCgrsDkrK1Hf1
O4z81toy9PK/cT2t3/I+Hp+YtnjU/nR6ZEbnw/M3IzN89uzs6Fvz5/Bi3b+Y
P785O8YPnfo8UKG9dx7nqPHqPKz775yvCkOzTcoB13KjGh0IMZYEVb5qfs2P
Dn3Yj+KF/xWJBu1SEp/LFIPVlqK1U+E7rnMbUfm5St+ZJrMFVXPPmdBy0Ua1
IZWcRC64DUuUcuOUdhmT4eayIR2dC4Auy4bFW7UNw+Ufs34x0GFJLd5ADLa5
yq2RyuZ0VSTNi46KZ3iWTgBpbscNC1Bw6upZodT7ElZhAbJOwSUf6FxwpTyJ
LqxfVOFLEWgj8M5MAzzw7ofKD4jBG7v9YybiGyqqtXLJYtAVQVBK9ii9Cm/X
syNqLLkCG9FHEulq6fDrmhoRBDfR5kzx2hVvjrTjfo2vxn3HS9hwNi7yOInD
ymCpF/tAdIFLP3vZXrGrl4p5Rc3xIhohQrlkUgaKrq+w8jQ6X1PvJrTmfmj6
VBiBg+ydnig3giMeaHiEViKhC3x7ouo2F2NDjfrs+H4gYQPjV8Oz2c04X5Zm
6DS4lImgChG9T+qPAFpOAAKfpBvEJx81iYC53UdGW9/lBo5rxySe+zpzUf1W
PfHvJbf1D+V2cSrPMF0C3aIAYi36NtfCOfvm4j2FpfrTMO9Re6799BKBvG0O
QEUDEU7qNuPIL0AJ/XhB6SuK0HoirOXpAlgBWjaeH21uYTGd89yrEgAN5eqZ
IrxPVfObVw4sJwJ4CZLejR9YTU/rXHsv+SmVAJboXTpf0qU7JcB57BbVtoV2
xEpDCfazJLuqpn2QuCMvO1MEYptuSAoR1ZYVhBZtm0ndGCvMmPbF93xvZIy6
O37v2TsivRKLHEjdsDeSmre6Qxd6bSyXGg3uVhPkoMqUeOBsXu4FIOlFs7uD
6ZDW5JRrvCgWM4hNxlfQkU7BwX6l466z6fh753ZB7mLVDsQTP6Z4WJS8gVK3
BYDD2WIa9TYRbPxxi0iP3HES9M/aGk90gmXq3GxxLp7bxFedtRqaytGuVlXg
v7YZZmHByvqtLmGaPmV9T2zpcc2Mb8RsNu7gdgluYSZ2QiWeyXwTpPWQEi4J
h9ACNC+iwds9i87AfN5FWOwc81T8RDJSYpgmchWXlMvieiWP3WmiCxLIYFCa
50tUXv9jGc3YJOhdlqD1lyf/GT+Ckv3WvEfr1cf++/wq+j6N4cM0juBfjBXu
v+eqvfCBIqvJUgAzQ2tFbOsxm+f/cXiCCyD+pSYJsWhYjRxL+hB9bnM5iFhM
CZSA0rF3bxEaegVlVV1ATrZv+kLZ+rDRaDzZN1Qad2Nja2N/Y3NvY3+wvbGz
P97e3dkf7Gxv7kdbW5P9eLy52zo+3Df4O/6Mv9KPr78Z7puNndYLfLqBHQy2
W3Ci8Qt8AkTFTxtR65TAwKPBYC1c8Wp//Y2dPr7Yx3f60jaYMl/vbktmexKB
GpBh71bKcj2gAN51967qB78RDeTrje5Kw5YLe2wuuXlnPc/7i2n62kQZKjQr
c1Ul4g3S74Z7xa0bja95T7PFEtT1oB6mpIOVIkDWCj0W/SBos9Ya6WxTexe6
Gb5wFB+OhrRWZ1BTLN1o8EIOGn7bbPhtC94ewJMt4O47Ztd8ZfbMU/MJv7V+
XfP5fvL31oeGeXl/3548u7/Bh7/FHB6InvobzOHBvw//CD3AOfm7z+EfpIdf
PkYRGftJPfz0OTymh18+JP/Zwy+lB1tY9e84h3/28I/Ww0+nMDXhVcrw3iW+
PqPH1hqP8WAr4u8lmkXuEn+fvT5b4wK5zda5908uV2X5QdcWdMfPjW+uCPeP
q7r/GSL+ZSjiN69D5XzNVLm8DSvNs8fdK3ockWFCDVS1cHcKgxuOzl9hmM7W
9mAAHfglS6n2at+88e76cfdIyH0YxsuNz5fVgi0RYRmuXC0G6PnNbunuwxnI
+4H+EUnBFYq+qxfdxZu4OqgorxOTpqo9GG/raqG8OH6shsIRfRqdwv2zG1hq
zf0UFcaVw6JG9RTLtitR7Tw8Gl7G6a4yCXvVgDP6ABwJ/Gw8tomgZuDFAdjC
DbWtJguZmsvt0BSZaW2+YsHysEfvYLfXV1KtcxuV9bjrEFSxMz9Ns/sUNe6f
qt3fcw4P/j3AovSwfn4P5oCIyE/p4eG/fwBI/iJ6YFvST+nhb7Obv4QefvEY
9dPP5imz35/QwyP+/gEg+c8efjE9/FNJ/mcPn97Dz6skX9aV5GYF8CFN+TLU
lO/QIp26rEVQQmX5ZlVZ3vSUZfjc8N6KqvzlNigz1bw3x8tNrpLPV5P9XsJL
5TZ3QiX6JlSim1YXxP2twO8mhF9jBwK9OzsI97GpC7eLXMqQ68iEezBf3YMt
bw/gc9OLK5uw9eVggLF+1LKHfurP34egm3Aj9sJ9mIf70LjE+zdiHm5Ecw/3
7sS8vhONfQRbwSV5wn2YrO7DtrcP8HnlrZVNoHty5UpJ/ozBuZ+/Ea6/lahb
1324QYN+fzAYhLs0CXdpdfX3b9Ek3KKG1+/dn0l9f1Y78DaHshNcXesHQjJg
L23uy/sncVb28oVMBKNyW//++uz4m+MTs0EXNu/1J/R/zZc4txL4io924N8I
HuzQ/ybweQ/+dwmfNzBkGMM4Wm2Nb5hMJntY92vnMtqLJjubO5vR1s7G1kZC
9om186PRORlq1szamun3+6bz2HEwThzG2Xl4pE/qFm8rhG41B90LuVjPBZTr
X5qOxl888bMhGMRlGn82jLf7cX+XJroLD3dpWlv9p32YgHy7F8a74+TpFvxn
sLu1sRtv3w3jR45zN4zrI31St/fAuGRohiBmxZdMpwxiMo76QMb4GgvpB2BM
G4HTgJP0qE2hOJ5P28ensFxc8CX8DD/1twEICJQ9+JTA/+7fx+1ke2936+l2
tLtxebm7+/TufXzkOHfu48pIn9TtPfuIF4u6Tfx/cYsp5Mn5AAA=

-->

</rfc>
