<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-18" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DET in DNS">DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-18"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="27"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the discovery and management of DRIP Entity Tags (DETs) in DNS. Authoritative Name Servers, with DRIP specific DNS structures and standard DNS methods, are the Public Information Registries for DETs and their related metadata.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information from RID is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>When a DRIP Entity Tag (DET) <xref target="RFC9374" format="default"/> is used as the UAS ID in RID, extended information can be retrieved from a DRIP Identity Management Entity (DIME) which manages registration of and associated lookups from DETs. In this document we assume the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>) but a DIME can be independent or handled by another entity as well.</t>
      <section anchor="general-concept" numbered="true" toc="default">
        <name>General Concept</name>
        <t>DETs embedded a hierarchy scheme which is mapped onto DNS. DIME's enforce registration and information access of data associated with a DET while also providing the trust inherited from being a member of the hierarchy. Other identifiers and their methods are out of scope for this document.</t>
        <t>Authoritative Name Servers of the Domain Name System (DNS) provide the Public Information such as the cryptographic keys, endorsements and certificates of DETs and pointers to Private Information resources. Cryptographic (public) keys are used to authenticate anything signed by a DET, such as in the Authentication defined <xref target="RFC9575" format="default"/> for Broadcast RID. Endorsements and certificates are used to endorse the claim of being part of the hierarchy.</t>
        <t>Aspects of Private Information Registries to store and protect, through AAA mechanisms, Personally Identifiable Information (PII) are not described in this document.</t>
      </section>
      <section anchor="use-of-existing-dns-models" numbered="true" toc="default">
        <name>Use of Existing DNS Models</name>
        <t>DRIP relies on the DNS and as such roughly follows the registrant-registrar-registry model. In DRIP, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting.</t>
        <t>The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex which contains delegation information for domain names. Registries generally provide services such as WHOIS or RDAP to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. Since that registry is a de facto monopoly, the scope of its activities are usually kept to a minimum to reduce the potential for market distortions or anti-competitive practices. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <t>It is not necessary, and in some case may not be desirable, for DRIP registrations to strictly follow this registrant-registrar-registry model. Prevailing circumstances and/or local policy may mean some combination of these roles could be combined. A DRIP registry might be operated by the CAA. Or it could be outsourced to a DNS registry provider. Registration policies - pricing, renewals, registrar and registrant agreements, etc. - will need to be developed. These considerations SHOULD be determined by the CAA, perhaps in consultation with local stakeholders. They are are out of scope for this document.</t>
        <t>The specifics for the UAS RID use case are detailed in the rest of document.</t>
      </section>
      <section anchor="scope" numbered="true" toc="default">
        <name>Scope</name>
        <t>The scope of this document is limited to the <tt>2001:30::/28</tt> IPv6 prefix and its associated reverse domain in DNS for DETs being used in UAS RID for participating parties (UA, Observer devices, DIMEs, etc.).</t>
        <t>Other sectors may adopt this technology. It is RECOMMENDED that a global Apex (i.e. IPv6 prefix) and international Apex manager be designated for each sector.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
    </section>
    <section anchor="det-hierarchy-in-dns" numbered="true" toc="default">
      <name>DET Hierarchy in DNS</name>
      <t><xref target="RFC9374" format="default"/> defines the Hierarchical Host Identity Tag (HHIT) and further specifies an instance of them used for UAS RID called DETs. The HHIT is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator. It's format is in <xref target="hhit-fig" format="default"/> and further information is in <xref target="RFC9374" format="default"/>.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28-bits)   | (28-bits)    | (8-bits)      | (64-bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14-bits)                      | (14-bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t>The IPv6 Prefix, assigned by IANA for DETs is <tt>2001:30::/28</tt>. The corresponding domain (nibble reversed as <tt>3.0.0.1.0.0.2.ip6.arpa</tt>) is owned by the IAB.</t>
      <t>Due to the nature of the hierarchy split and its relationship to nibble reversing of the IPv6 address, the upper level of hierarchy (i.e. RAAs) "borrows" the upper two bits of their respective HDA space for DNS delegation. As such the IPv6 prefix of RAAs are <tt>2001:3x:xxx::/44</tt> and HDAs are <tt>2001:3x:xxxx:xx::/56</tt> with respective nibble reverse domains of <tt>x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt> and <tt>y.y.y.x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt>.</t>
      <t>Preallocations have been made based on the ISO 3166-1 Numeric Nation Code <xref target="ISO3166-1" format="default"/>. This is to support the initial use case of DETs in UAS RID on an international level. See <xref target="iana-raa" format="default"/> for the RAA allocations.</t>
      <t>The HDA values of 0, 4096, 8192 and 12288 are reserved for operational use of an RAA (a by-product of the above mentioned borrowing of bits), specifically when to register with the Apex and endorse delegations of HDAs in their namespace.</t>
      <t>The administration, management and policy for operation a DIME at any level in the hierarchy (Apex, RAA or HDA), be it external or from a parent level, is out of scope for this document. In some cases, such as the RAAs and HDAs of a nation, these are National Matters which are to be dealt with by those parties accordingly.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>Public Information Registry</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified, by all parties involved, as public is stored in the DNS, specifically Authoritative Name Servers, to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>Authoritative Name Servers use domain names as handles and data is stored in Resource Records (RR) with associated RRTypes. This document defines two new RRTypes, one for HHIT metadata (HHIT, <xref target="hhit-rr" format="default"/>) and another for UAS Broadcast RID information (BRID, <xref target="bcast-rr" format="default"/>). The former RRType is particularly important as it contains a URI (as part of the certificate) that point to Private Information resources.</t>
      <t>DETs, being IPv6 addresses, are to be under <tt>ip6.arpa</tt> (nibble reversed per convention) with at minimum an HHIT RRType. Depending on local circumstances or additional use cases other RRTypes MAY be present. For UAS RID the BRID RRType MUST be present to provide the Broadcast Endorsements defined in <xref target="RFC9575" format="default"/>.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS specific information, such as physical characteristics, MAY also be stored in DNS but is out of scope for this document. This specification information is currently drafted in <xref target="uas-sn-dns" format="default"/>.</t>
      <t>An example, from Apex to client, of the DNS zones in available in <xref target="zone-examples" format="default"/>.</t>
      <t>Lookups of the above RRTypes are performed with the standard DNS methodology using the nibble reversed DET as the query name affixed to the <tt>ip6.arpa</tt> domain apex and asking for the specific RRType. The HHIT RRType provides the public key for signature verification and URIs via the certificate. The BRID RRType provides static Broadcast RID information such as the Broadcast Endorsements sent following <xref target="RFC9575" format="default"/>.</t>
    </section>
    <section anchor="canonical-cert" numbered="true" toc="default">
      <name>Canonical Public Registration Certificate</name>
      <t>The following is a canonical public registration certificate, generated upon successful registration and placed into <xref target="hhit-rr" format="default"/>. It is defined here as X.509 and MAY be encoded as a C.509. Other X.509 or C.509 MAY exist for specific use cases and MUST placed in CERT RRTypes.</t>
      <figure>
        <name>Example UA Canonical Registration Certificate</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBCTCBvKADAgECAhQsKjO1bWo9IQm4g6DnIDJmnQqRrDAFBgMrZXAwGTEXMBUG
A1UEAwwOMjAwMTAwM2ZmZTAwMDEwHhcNMjQwOTI1MjA0MTQ1WhcNMjQwOTI2MjA0
MTQ1WjAAMCowBQYDK2VwAyEAe9/qfhAvPzw/rWb5n4wmVfKZcUezxygo7qFDIO7z
TVejLzAtMB4GA1UdEQEB/wQUMBKHECABAD/+AAEFu+Gv+JeyXlowCwYDVR0PBAQD
AgeAMAUGAytlcANBACB7NmtdXksQDzkzVpJtl29H8g9EioEB75tNHQSSvlpjyFyO
uxKnOYUhN+fIuLhk4Inn79qbFhddGyVqFvcsfQk=
-----END CERTIFICATE-----

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            2c:2a:33:b5:6d:6a:3d:21:09:b8:83:a0:e7:20:32:66:9d:0a:91:ac
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe0001
        Validity
            Not Before: Sep 25 20:41:45 2024 GMT
            Not After : Sep 26 20:41:45 2024 GMT
        Subject: 
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    7b:df:ea:7e:10:2f:3f:3c:3f:ad:66:f9:9f:8c:26:
                    55:f2:99:71:47:b3:c7:28:28:ee:a1:43:20:ee:f3:
                    4d:57
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:105:BBE1:AFF8:97B2:5E5A
            X509v3 Key Usage: 
                Digital Signature
    Signature Algorithm: ED25519
         20:7b:36:6b:5d:5e:4b:10:0f:39:33:56:92:6d:97:6f:47:f2:
         0f:44:8a:81:01:ef:9b:4d:1d:04:92:be:5a:63:c8:5c:8e:bb:
         12:a7:39:85:21:37:e7:c8:b8:b8:64:e0:89:e7:ef:da:9b:16:
         17:5d:1b:25:6a:16:f7:2c:7d:09

]]></artwork>
      </figure>
      <section anchor="private-information-registry-uri" numbered="true" toc="default">
        <name>Private Information Registry URI</name>
        <t>The Public Information Registry MUST contain a pointer to a Private Information Registry to obtain additional information associated with an HHIT. The information available following a pointer MUST be protected with a AAA mechanism, per REG-2 of <xref target="RFC9153" format="default"/>. The definition of the AAA mechanism is out of scope for this document.</t>
        <t>For DRIP, a URI extension in the X.509 (<xref target="canonical-cert" format="default"/>) is the selected way to provide this information in DNS. A base URI, to perform lookups, for a DIME MUST be included in their Canonical Registration Certificate. A DIME MAY include a fully qualified URI in an registering entities X.509 as needed.</t>
        <t>These URI SHOULD use the path segment of Section 3.1.3 (<tt>domain/&lt;domain name&gt;</tt>) of <xref target="RFC9082" format="default"/>. The base URI is out of scope for this document. The use of the RDAP bootstrap process is OPTIONAL.</t>
        <t>Additional URIs MAY be present in the X.509 for other use cases.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="drip-prefix-delegation" numbered="true" toc="default">
        <name>DRIP Prefix Delegation</name>
        <t>This document requests that the IANA delegate the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> domain following instructions to be provided by the IAB. Names within this zone are to be further delegated to the appropriated RAA's described by this document.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa" numbered="true" toc="default">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref> to be managed by IANA.</t>
          <dl newline="false" spacing="normal">
            <dt>RAA Allocations:</dt>
            <dd>
  a 14-bit value used to represent RAAs. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values/ranges are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4000 - 16375</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">16376 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">DRIP WG (Experimental Use)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <t>To support DNS delegation in <tt>ip6.arpa</tt> a single RAA is given 4 delegations by borrowing the upper two bits of HDA space. This enables a clean nibble boundary in DNS to delegate from (i.e. the prefix <tt>2001:3x:xxx0::/44</tt>). These HDAs (0, 4096, 8192 and 12288) are reserved for the RAA.</t>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/blob/main/iso3166-raa.csv">GitHub</eref>. Each Nation is assigned four RAAs that are left to the national authority for their purpose. For RAAs under this range a shorter prefix of <tt>2001:3x:xx00::/40</tt> MAY be delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) assigned to them.</t>
        </section>
        <section anchor="iana-hhit-type" numbered="true" toc="default">
          <name>HHIT Entity Type</name>
          <t>This document requests a new registry for HHIT Entity Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Entity Type:</dt>
            <dd>
  numeric, 16-bit, field of the HHIT RRType to encode the HHIT Entity Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">DIME: Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">DIME: Issuing CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6</td>
                <td align="left">Apex: Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">7</td>
                <td align="left">Apex: Issuing CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">8</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10</td>
                <td align="left">RAA: Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">11</td>
                <td align="left">RAA: Issuing CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">12</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">13</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">14</td>
                <td align="left">HDA: Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">15</td>
                <td align="left">HDA: Issuing CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Uncrewed Aircraft System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">27 - 65535</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
              </tr>
            </tbody>
          </table>
          <t>Future additions to this registry MUST NOT be allowed if they can be covered under an existing registration.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="dns-operational-considerations" numbered="true" toc="default">
        <name>DNS Operational Considerations</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720" format="default"/>, <xref target="RFC4033" format="default"/>, <xref target="RFC4034" format="default"/>, <xref target="RFC4035" format="default"/>, <xref target="RFC5155" format="default"/>, <xref target="RFC8945" format="default"/>, <xref target="RFC2182" format="default"/>, <xref target="RFC4786" format="default"/>, <xref target="RFC3007" format="default"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement (DPS) SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841" format="default"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912" format="default"/> or RDAP <xref target="RFC9082" format="default"/> to provide public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters SHOULD be made by the CAA, ideally in consultation with local stakeholders. This document RECOMMENDS that DNSSEC SHOULD be used by both Apex (to control RAA levels) and RAA (to control HDA level) zones.</t>
      </section>
    </section>
    <section anchor="public-key-exposure" numbered="true" toc="default">
      <name>Public Key Exposure</name>
      <t>DETs are built upon asymmetric keys. As such the public key must be revealed to enable clients to perform signature verifications. <xref target="RFC9374" format="default"/> security considerations cover various attacks on such keys.</t>
      <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (under any RRType) until it is required.</t>
      <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-09">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="uas-sn-dns" target="https://datatracker.ietf.org/doc/html/draft-wiethuechter-drip-uas-sn-dns-02">
          <front>
            <title>UAS Serial Numbers in DNS</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   This document describes a way Uncrewed Aerial System (UAS) Serial
   Numbers are placed into and retrieved from the Domain Name System
   (DNS).  This is to directly support DRIP-based Serial Numbers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-uas-sn-dns-02"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9575" target="https://www.rfc-editor.org/info/rfc9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC4033" target="https://www.rfc-editor.org/info/rfc4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5155" target="https://www.rfc-editor.org/info/rfc5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC8945" target="https://www.rfc-editor.org/info/rfc8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="RFC4034" target="https://www.rfc-editor.org/info/rfc4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035" target="https://www.rfc-editor.org/info/rfc4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC3007" target="https://www.rfc-editor.org/info/rfc3007">
          <front>
            <title>Secure Domain Name System (DNS) Dynamic Update</title>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3007"/>
          <seriesInfo name="DOI" value="10.17487/RFC3007"/>
        </reference>
        <reference anchor="RFC2182" target="https://www.rfc-editor.org/info/rfc2182">
          <front>
            <title>Selection and Operation of Secondary DNS Servers</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="M. Patton" initials="M." surname="Patton"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document discusses the selection of secondary servers for DNS zones.The number of servers appropriate for a zone is also discussed, and some general secondary server maintenance issues considered. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="16"/>
          <seriesInfo name="RFC" value="2182"/>
          <seriesInfo name="DOI" value="10.17487/RFC2182"/>
        </reference>
        <reference anchor="RFC7720" target="https://www.rfc-editor.org/info/rfc7720">
          <front>
            <title>DNS Root Name Service Protocol and Deployment Requirements</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <author fullname="L-J. Liman" surname="L-J. Liman"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The DNS root name service is a critical part of the Internet architecture. The protocol and deployment requirements for the DNS root name service are defined in this document. Operational requirements are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="40"/>
          <seriesInfo name="RFC" value="7720"/>
          <seriesInfo name="DOI" value="10.17487/RFC7720"/>
        </reference>
        <reference anchor="RFC3912" target="https://www.rfc-editor.org/info/rfc3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC4786" target="https://www.rfc-editor.org/info/rfc4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="ISO3166-1" target="https://www.iso.org/iso-3166-country-codes.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author>
              <organization>International Standards Organization (ISO)</organization>
            </author>
            <date year="2020" month="August"/>
          </front>
          <seriesInfo name="ISO" value="3166-1:2020"/>
          <seriesInfo name="DOI" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="hhit-rr" numbered="true" toc="default">
      <name>HHIT Resource Record</name>
      <t>This appendix is normative.</t>
      <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RRType. It is encoded as a CBOR array.</t>
      <section anchor="hhit-rr-wire" numbered="true" toc="default">
        <name>Wire Format</name>
        <t>The wire format for the HHIT RRType MUST be encoded in CBOR. The CDDL of the RRType is provided in <xref target="hhit-wire-cddl" format="default"/>.</t>
        <figure anchor="hhit-wire-cddl">
          <name>HHIT Wire Format CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
hhit-rr = [
    type: uint .size(2), 
    abbreviation: tstr .size(15), 
    registration-cert: bstr / #6.TBD
]
]]></artwork>
        </figure>
      </section>
      <section anchor="hhit-rr-presentation" numbered="true" toc="default">
        <name>Presentation Format</name>
        <t>The presentation format of the HHIT RRType MUST be in Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610" format="default"/>. <xref target="hhit-text" format="default"/> provides an example of a HHIT RRType in this form. It is RECOMMENDED to have all byte strings, except for IPv6 addresses, be displayed as base64.</t>
        <figure anchor="hhit-text">
          <name>HHIT Presentation Format</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
[
  0,  
  "APEX", 
  WQGC..uAo=
]
]]></artwork>
        </figure>
      </section>
      <section anchor="hhit-rr-fields" numbered="true" toc="default">
        <name>Field Descriptions</name>
        <dl newline="false" spacing="normal">
          <dt>HHIT Entity Type:</dt>
          <dd>
  This field is two octets with values defined in <xref target="iana-hhit-type" format="default"/>. It is envisioned that there may be many types of HHITs in use. In some cases it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki" format="default"/>. This field provides such context.</dd>
          <dt>HID Abbreviation:</dt>
          <dd>
  This field is meant to provide an abbreviation to the HID structure for display devices. The specific contents of this field are not defined here.</dd>
          <dt>Canonical Registration Certificate:</dt>
          <dd>
  This field is the canonical registration certificate as described in <xref target="canonical-cert" format="default"/> for the HHIT in either X.509 DER or C.509 form.</dd>
        </dl>
      </section>
    </section>
    <section anchor="bcast-rr" numbered="true" toc="default">
      <name>UAS Broadcast RID Resource Record</name>
      <t>This appendix is normative.</t>
      <t>The UAS Broadcast RID Resource Record type (BRID) is a format to hold public information typically sent of the UAS Broadcast RID that is static. It can act as a data source if information is not received over Broadcast RID or for cross validation.</t>
      <section anchor="bcast-rr-wire" numbered="true" toc="default">
        <name>Wire Format</name>
        <t>The wire format for the BRID RRType MUST be encoded in CBOR. The CDDL of the RRType is provided in <xref target="bcast-wire-cddl" format="default"/>.</t>
        <figure anchor="bcast-wire-cddl">
          <name>BRID Wire Format CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
bcast-rr = {
    uas_type: nibble-field,
    uas_ids: [+ uas-id-grp],
    ? auth: [+ auth-grp],
    ? self-grp,
    ? op_type: 0..3,
    ? area-grp,
    ? classification-grp,
    ? operator-grp
}
uas-id-grp = (
    id_type: &uas-id-types, 
    uas_id: bstr .size(20)
)
uas-id-types = (none: 0, serial: 1, caa_id: 2, utm_id: 3, session_id: 4)
auth-grp = (
    a_type: nibble-field,
    a_data: bstr .size(1..362)
)
area-grp = (
    area_count: 1..255,
    area_radius: float,
    area_floor: float,
    area_ceiling: float
)
classification-grp = (
    ua_class: 0..8,
    eu_class: nibble-field,
    eu_category: nibble-field
)
self-grp = (
    desc_type: nibble-field,
    description: tstr .size(23)
)
operator-grp = (
    operator_id_type: nibble-field,
    operator_id: bstr .size(20)
)
nibble-field = 0..15
]]></artwork>
        </figure>
      </section>
      <section anchor="bcast-rr-presentation" numbered="true" toc="default">
        <name>Presentation Format</name>
        <t>The presentation format of the BRID RRType MUST be in Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610" format="default"/>. <xref target="bcast-text" format="default"/> provides an example of a BRID RRType in this form. All byte strings longer than 20 SHOULD be displayed as base64 when possible.</t>
        <figure anchor="bcast-text">
          <name>BRID Presentation Format</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "uas_type": 0, 
  "uas_ids": [
    [4, h'012001003FFE0001056A2621D4EF572EF5']
  ], 
  "auths": [
    [5, b64'AYDQ..dwo='],
    [5, b64'AYDQ..Wgs='],
    [5, b64'AYDQ..NAw='],
    [5, b64'AYDQ..7gA=']
  ]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="bcast-rr-fields" numbered="true" toc="default">
        <name>Field Descriptions</name>
        <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411" format="default"/> data dictionary. See that document for additional information on fields semantics and units.</t>
      </section>
    </section>
    <section anchor="zone-examples" numbered="true" toc="default">
      <name>DET DNS Zone Examples</name>
      <t>This appendix is informative, showing an example of the DNS zone setup/content from Apex to a client.</t>
      <t>For this example the following DETs are shown:</t>
      <ul spacing="normal">
        <li>Apex = <tt>2001:0030:0000:0005:fad8:7fea:e0f6:90ad</tt></li>
        <li>RAA = <tt>2001:003f:fe00:0005:618a:cd8e:76d3:b790</tt></li>
        <li>HDA = <tt>2001:003f:fe00:0105:ad79:a278:1c10:5443</tt></li>
        <li>Client = <tt>2001:003f:fe00:0105:6a26:21d4:ef57:2ef5</tt></li>
      </ul>
      <t>The RAA allocation of <tt>16376</tt> and an HDA of <tt>1</tt> have been selected.</t>
      <figure>
        <name>Apex Zones</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN 3.0.0.1.0.0.2.ip6.arpa.
0.e.f.f IN NS ns1.raa-16376.example.com
1.e.f.f IN NS ns1.raa-16376.example.com
2.e.f.f IN NS ns1.raa-16376.example.com
3.e.f.f IN NS ns1.raa-16376.example.com

$ORIGIN 5.0.0.0.0.0.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
d.a.0.9.6.f.0.e.a.e.f.7.8.d.a.f IN BRID ( a368..770a )
d.a.0.9.6.f.0.e.a.e.f.7.8.d.a.f IN HHIT ( 0 APEX 5901..b80a )
]]></artwork>
      </figure>
      <figure>
        <name>RAA Zones</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN 0.e.f.f.3.0.0.1.0.0.2.ip6.arpa.
1.0.0 IN NS ns1.hda-1.example.com

$ORIGIN 5.0.0.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.arpa.
0.9.7.b.3.d.6.7.e.8.d.c.a.8.1.6 IN BRID ( a368..5a0b )
0.9.7.b.3.d.6.7.e.8.d.c.a.8.1.6 IN HHIT ( 0 RAA 5901..0d0c )
]]></artwork>
      </figure>
      <figure>
        <name>HDA Zone</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN 0.1.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.arpa.
3.4.4.5.0.1.c.1.8.7.2.a.9.7.d.a.5.0 IN BRID ( a368..340c )
3.4.4.5.0.1.c.1.8.7.2.a.9.7.d.a.5.0 IN HHIT ( 0 HDA 5901..ac0a )
5.f.e.2.7.5.f.e.4.d.1.2.6.2.a.6.5.0 IN BRID ( a368..ee00 )
5.f.e.2.7.5.f.e.4.d.1.2.6.2.a.6.5.0 IN HHIT ( 0 CHILD 5901..0306 )
]]></artwork>
      </figure>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
