<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-09" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-09"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="28"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through the existing DNS structure and methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="drip-arch" format="default"/>).</t>
      <t>While it is expected that DIME functions will be integrated with UAS Service Supplier (USS) (Appendix A.2 of <xref target="drip-arch" format="default"/>), who will provide them is not yet determined in most, and is expected to vary between jurisdictions. However this evolves, the essential DIME functions (including the management of identifiers) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="drip-arch" format="default"/>) or Network RID (Section 1.2.2 of <xref target="drip-arch" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="drip-arch" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DRIP Entity Tags (DETs). Forgery of the DETs is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a full DRIP Entity Tag <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
      <section anchor="supported-scenarios" numbered="true" toc="default">
        <name>Supported Scenarios</name>
        <ol spacing="normal" type="1"><li>UA using manufacturer generated Serial Number for UAS ID. No additional information provided.</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. Manufacturer using a DIME. Manufacturer MUST provided pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number which is mapped to a DET by manufacturer for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. Manufacturer MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated DRIP enhanced Serial Number for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public information into DNS (i.e. HI) - either directly or as a mapping to a DET. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. UA using user generated DET for Authentication. User uses DIME with capability to publically map Serial Number to a DET (via a USS). DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA provisioned with DET (i.e. Session ID) with a DIME (via a USS) for UAS ID and Authentication. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST NOT (unless required) provide mapping of DET to Serial Number in DNS. USS MUST provide pointer to additional information via DNS (even if null).</li>
        </ol>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="drip-arch" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="drip-arch" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers back Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IAM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  | SIDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the value of RAA=0 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex generally has as the prefix portion of the HHIT associated with it (such as 2001:30/28) which is assigned by IANA from the non-routable special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. For DRIP and the UAS use case it is hoped that ICAO will handle the role of registering RAAs as an Apex.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have two reserved HDA values. 0 (0x0000) for itself in its role as an RAA and 1 (0x0001) if it wishes to offer HDA services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <ul empty="true" spacing="normal">
          <li>Note: A single RAA may control more than one NAS (for example LU and BE being covered by Skeyes.be). In such a scenario the CAA could either request two different RAA values for each larger region with HDAs delegating smaller spaces; or run under a single RAA with HDAs delegated to cover specific regions. A similar scenario could also occur in the US with the FAA requesting RAAs for each region, for example: North East, South Eat, Midwest, North West, South West. This is up to regulators and their policies.</li>
        </ul>
        <section anchor="irm" numbered="true" toc="default">
          <name>ICAO Authority of Manufacturers (IAM)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in <xref target="CTA2063A" format="default"/>.</t>
          <t>To manage the large ICAO Manufacturer Code space (34  character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the DRIP use case. These are the RAA values of 2 (0x0002) up to 96 (0x0060). This allows a single HDA for each Manufacturer Code.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturers Authority of Aircraft (MAA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="RFC9374" format="default"/>, Section 4.2) and this DIME would hold a mapping from the Serial Number to the DET and its artifacts.</t>
        </section>
        <section anchor="ridr" numbered="true" toc="default">
          <name>Session ID Authority (SIDA)</name>
          <t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
          <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces SHOULD NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>). For RAAs the abbreviation is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) when allocated to a CAA.</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver SHOULD use the uppercase 4-character hexadecimal encoding of the field it is missing.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |        DRIP Identity Management Entity              *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent        |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent       |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      |              |  *
*          |             |             |      |              |  *
*  +-------o-----+       |             |      |              |  *
*  | Name Server |       |             |      |              |  *
*  +------o------+       +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information (such as the DRIP Endorsements) coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON or CBOR encoding of objects being sent to the DPA. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if as RAA.</li>
        </ul>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms. As an example the Serial Number, under the FAA, is classified as PII and can only be accessed by federal entities (such as the FAA themselves).</t>
        <t>For DRIP the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON/CBOR encoding of objects being sent to the DIA. There MUST also be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource records</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return DRIP Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>There are four ways a Serial Number is supported (by DRIP):</t>
        <ol spacing="normal" type="1"><li>As itself as a clear-text string with additional information</li>
          <li>As itself as a clear-text string mapped to a DET "post" generation by the manufacturer (for use in authentication) and additional information</li>
          <li>As itself as a clear-text string mapped to a DET "post" generation by the user (for use in authentication) and additional information</li>
          <li>As an encoding of an HI and associated DET by the manufacturer (for use in authentication) with additional information</li>
        </ol>
        <ul empty="true" spacing="normal">
          <li>Note: additional information here refers to any subset of keys defined in <xref target="ua-info-registry" format="default"/>.</li>
        </ul>
        <t>(1) is where a UA is provisioned with a Serial Number by the manufacturer. The manufacturer is runs an MAA and uses the mechanisms of this document to provide additional information.</t>
        <t>(2) is where a UAS is provisioned with a Serial Number and DET by the manufacturer enabling their devices to use <xref target="drip-auth" format="default"/> and provide additional information. A public mapping of the Serial Number to DET and all public artifacts MUST be provided by the manufacturer. This document RECOMMENDS the manufacturer use an MAA for this task.</t>
        <t>(3) is where a UAS has a Serial Number (from the manufacturer) and the user has a mechanism to generate and map a DET to the Serial Number after production. This can provide dynamic signing keys for DRIP Authentication Messages via <xref target="drip-auth" format="default"/> for UAS that MUST fly only using Serial Numbers. Registration SHOULD be allowed to any relevant DIME that supports it.</t>
        <t>(4) is where a UAS manufacturer chooses to use the Serial Number scheme defined in <xref target="RFC9374" format="default"/> to create Serial Numbers, their associated DETs for <xref target="drip-auth" format="default"/> and provide additional information. This document RECOMMENDED that the manufacturer "locks" the device from changing its authentication method so identifiers in both the Basic ID and Authentication Message do not de-sync. The manufacturer MUST use an MAA for this task, with the mapping between their Manufacturer Code and the upper portion of the DET publicly available.</t>
        <figure anchor="dime-sn-example">
          <name>Example DIME:MAA with Serial Number (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) HIP RR,
    CERT RRs
(d) UA Information
]]></artwork>
        </figure>
        <t>The unmanned aircraft, intending to use DRIP, generates a keypair, DET and <tt>Self-Endorsement: UA</tt> using the RAA and HDA values specified by the manufacturers DIME (running as an MAA). The DET is converted into a Serial Number (per <xref target="RFC9374" format="default"/>) or the manufacturer creates their own Serial Number.</t>
        <t>The Serial Number, UA information and the <tt>Self-Endorsement: UA</tt> are sent to the manufacturers DIME. The DIME validates the Self-Endorsement and checks for DET and HI collisions in the Name Server/DIA. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated which is provisioned into the aircraft for use when using the Serial Number as its UAS ID. In the Name Server HIP RRs are created using the DET FQDN while a CNAME points the Serial Number FQDN to the DET FQDN.</t>
        <ul empty="true" spacing="normal">
          <li>Note: <xref target="dime-sn-example" format="default"/> is specific for a DET-encoded or DET-linked Serial Number. The Endorsements in (a) and (b) as well as RRs in (c) would not be present for non-DET based Serial Numbers.</li>
        </ul>
        <t>Additional UA Information has a set of valid item keys defined in <xref target="ua-info-registry" format="default"/>. The items present for a given interaction is defined by future documents, local regulations and implementation specific capabilities.</t>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR,
    CERT RRs
(d) Operator Information
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in <xref target="RFC9374" format="default"/> along with a self-signed endorsement (<tt>Self-Endorsement: Operator</tt>). The RAA and HDA values used in the DET generation for the Operator are found by referencing their selected DIME of choice (in <xref target="dime-operator-example" format="default"/> an HDA).</t>
        <t>The self-signed endorsement along with other relevant information (such as Operator PII) is sent to the DIME over a secure channel. The specification of this secure channel is out of scope for this document.</t>
        <t>The DIME cross checks any personally identifiable information as required. <tt>Self-Endorsement: Operator</tt> is verified. The DET and HI is searched in the DIME DIA and Name Server to confirm that no collisions occur. A new endorsement is generated (<tt>Generic Endorsement: DIME on Operator</tt>) and sent securely back to the Operator. Resource Records for the HI and Endorsements are added to the DIME Registry/Name Server.</t>
        <t>With the receipt of <tt>Generic Endorsement: DIME on Operator</tt> the registration of the Operator is complete.</t>
        <ul empty="true" spacing="normal">
          <li>Note: (c) in <xref target="dime-operator-example" format="default"/> MAY be requested by the Operator to be omitted due to PII concerns.</li>
        </ul>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically SIDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:SIDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: SIDA              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: SIDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: SIDA on UA,
    Generic Endorsement: SIDA on UAS
(c) HIP RR,
    TLSA, RR,
    CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: SIDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: SIDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The DIME validates all the endorsements and checks for DET and HI collisions in the Name Server/DIA using the proposed UA DET. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated. An <tt>Generic Endorsement: SIDA on UAS</tt> is generated using the <tt>Generic Endorsement: GCS on UA</tt>. HIP and CERT RRs are provisioned into the Registry/Name server. Both endorsements are back to the GCS on a secure channel.</t>
        <t>The GCS then injects the <tt>Broadcast Endorsement: SIDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: SIDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR,
    CERT RRs
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="drip-arch" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>ICAO SHOULD delegate domains beneath these apexes to national civil aviation authorities. This ensures DRIP complies with national law and regulation since these are matters of national sovereignty. The HHIT has a designated field, the RAA, for this exact purpose and SHOULD be used instead of a ISO-3166 entries: ie a two- or three-letter or a three digit country code.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and reguations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies (both DIME-level and national-level).</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of ICAO. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, ICAO SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done on a country by country basis, using the 14-bit RAA space as a framework. ICAO SHOULD allocate blocks to each National Aviation Authority who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for an HHIT RRtype and not a PTR RRtype.</t>
        <ul empty="true" spacing="normal">
          <li>Info: HHIT RRType is a new DNS RRType that would be proposed by the DRIP WG to fulfill desired attributes of DRIP.</li>
        </ul>
      </section>
      <section anchor="serial-numbers-other-uas-id-types" numbered="true" toc="default">
        <name>Serial Numbers &amp; Other UAS ID Types</name>
        <t>This document specifies the creation and delegation to ICAO of the subdomain <tt>uas.icao.arpa</tt>. To enable lookup of Serial Numbers a subdomains of <tt>sn.uas.icao.arpa</tt> is maintained. All entries under <tt>sn.uas.icao.arpa</tt> are to follow the convention found in <xref target="sn-fqdn" format="default"/>. This is to enable a singular lookup point for Serial Numbers for UAS.</t>
        <t>Note that other subdomains under <tt>uas.icao.arpa</tt> can be made to support other identifiers in UAS. The creation and use of other such other subdomains are out of scope for this document. The further use and creation of items under <tt>icao.arpa</tt> is the authority of ICAO (which has been delegated control).</t>
        <t>DETs MUST not have a subdomain in <tt>uas.icao.arpa</tt> (such as <tt>det.uas.icao.arpa</tt>) as they fit within the predefined <tt>ip6.arpa</tt> as they are IPv6 addresses.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained envirornments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Registry</name>
          <t>This document requests a new registry for aircraft information fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links in DNS.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single DIME to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="S. Card" initials="S." surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking. </t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs).  HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement. </t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="drip-arch" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-arch-31">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-31"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren">
              <organization/>
            </author>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder">
              <organization/>
            </author>
            <author fullname="T. Okubo" initials="T." surname="Okubo">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement.  This document is not an Internet Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-30">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="27" month="March" year="2023"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   The document defines message types and associated formats (sent
   within the Authentication Message) that can be used to authenticate
   past messages sent by an unmanned aircraft (UA) and provide proof of
   UA trustworthiness even in the absence of Internet connectivity at
   the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-30"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-12">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-12"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-01">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="8" month="November" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-01"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .det.uas.icao.arpa.
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.det.uas.icao.arpa.
]]></artwork>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>UAS Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>{id}.{length}.{manufacturer-code}.{apex}.</li>
        </ul>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .sn.uas.icao.arpa.
Serial: MFR0ADR1P1SC00L
Manufacturer Code: MFR0
Length: A
ID: DR1P1SC00L
FQDN: dr1p1sc00l.a.mfr0.sn.uas.icao.arpa.
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in DRIP Wrapper, Manifest and Frame formats. <tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases.</t>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatination of a child entities (e.g. a UA) HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                            of Child                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                           HI of Child                         |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                           of Parent                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
