<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-04" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="registries">DRIP Entity Tag Registration &amp; Lookup</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-04"/>
    <author initials="A." surname="Wiethuechter (Editor)" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="24"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an attestation or certificate from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various <xref target="drip-requirements" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="definitions" numbered="true" toc="default">
        <name>Definitions</name>
        <t>See <xref target="drip-requirements" format="default"/> for common DRIP terms.</t>
        <dl newline="false" spacing="normal">
          <dt>HDA:</dt>
          <dd>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</dd>
          <dt>HID:</dt>
          <dd>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</dd>
          <dt>RAA:</dt>
          <dd>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</dd>
        </dl>
      </section>
    </section>
    <section anchor="registries" numbered="true" toc="default">
      <name>Registries</name>
      <section anchor="classes" numbered="true" toc="default">
        <name>Classes</name>
        <t>Under DRIP there 3 classes of registries, with specific variants in each.</t>
        <figure anchor="reg-class-fig">
          <name>Registry Hierarchy</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Root   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
        </figure>
        <!-- Author Note (atw): above figure should match docs/registry-diagram.png -->

<section anchor="root" numbered="true" toc="default">
          <name>Root</name>
          <t>This is a special registry holding the RAA value of 0 and HDA value of 0. It delegates out RAA values only to registries that wish to act as an RAA.</t>
          <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        <section anchor="raa" numbered="true" toc="default">
          <name>Registered Assigning Authorities</name>
          <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of a DET). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their NAS. This is does not preclude other entities to operate an RAA if the Root server allows it.</t>
          <t>The ICAO registration process will be available from ICAO. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>uas.icao.int.</tt> DNS zone for the RAA.</t>
          <t>As DETs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
          <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
          <section anchor="irm" numbered="true" toc="default">
            <name>ICAO Registry of Manufacturer's (IRM)</name>
            <t>An RAA-level registry that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in ANSI CTA2063-A Serial Numbers.</t>
            <t>It is holds the RAA value of 1 and HDA value of 0.</t>
            <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        </section>
        <section anchor="hda" numbered="true" toc="default">
          <name>Hierarchial HIT Domain Authorities</name>
          <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
          <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
          <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
          <section anchor="mra" numbered="true" toc="default">
            <name>Manufacturer's Registry of Aircraft (MRA)</name>
            <t>An HDA-level registry run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
            <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
            <t>Hold RAA value of 1 and HDA values of 1+.</t>
          </section>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>An HDA-level registry that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent.</t>
            <!-- Author Note (atw): these are contemplated to be part of a USS as a function or a standalone SDSP in the UTM system -->

<t>Hold RAA values of 2+ and HDA values of 1+.</t>
          </section>
        </section>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the entity MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single entity to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
        <!-- Author Note (atw): does someone want to explore this option of federating across multiple DETs with same HID? -->

</section>
    </section>
    <section anchor="drip-fully-qualified-domain-names" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <t>Under DRIP there are a number of FQDN forms used to allow lookups to take place.</t>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the DET detail response.</t>
      <t>DNSSEC is strongly recommended (especially for RAA-level zones). Frequency of updates, size of the zone, and registry policy may impact its use.</t>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>See Section 4.2 of <xref target="drip-rid" format="default"/> for how to encode DETs as Serial Numbers.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.8653.mfr.uas.icao.int
]]></artwork>
      </section>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DET</name>
        <t>DETs SHOULD be discoverable in DNS via a hash.oga.hda.raa.prefix. structure under a ICAO managed DNS aviation tree. This document proposes a .det.uas.icao.int. branch in the current ICAO DNS domain. This is subject of discussions with ICAO. Thus if we assume a DET prefix of 2001:30::/28, the following example shows the resultant DNS entry:</t>
        <!-- TODO(atw): fix orchid construction in example code and place new FQDN -->

<artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 20010030
FQDN: a3ad19520ad0a69e.5.20.10.20010030.det.uas.icao.int
]]></artwork>
        <t>When building a DET FQDN the following two things must be done:</t>
        <ol spacing="normal" type="1"><li>The RAA and HDA values MUST be converted from hexadecimal to decimal form.</li>
          <li>The FQDN must be built using the expanded form of the IPv6 address.</li>
        </ol>
        <t>The prefix is included in the FQDN form to support other potential prefixes being used.</t>
        <!-- Author Note (atw): we need a section detailing the potential prefixes to be seen and from whom and why we would want to support such a thing -->
<!-- Author Note (atw): need a section on different TLDs supported - uas.icao.int, remoteid.aero, rid.aero? -->

</section>
      <section anchor="reverse-det" numbered="true" toc="default">
        <name>Reverse DET</name>
        <t>The DET reverse lookup should be a standard IPv6 reverse address in ip6.arpa.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
      </section>
    </section>
    <section anchor="supported-dns-records" numbered="true" toc="default">
      <name>Supported DNS Records</name>
      <t>DRIP requires a number of resource records, some specific to certain registries to function.</t>
      <section anchor="hip-rr" numbered="true" toc="default">
        <name>HIP RR</name>
        <t>All registries will have their own DET associated with them and their respective DNS server will hold a HIP RR <xref target="RFC8005" format="default"/> that is pointed to by their DET FQDN.</t>
        <t>MRA and RIDR servers will also have HIP RRs for their registered parties (aircraft and operators).</t>
      </section>
      <section anchor="cert-rr" numbered="true" toc="default">
        <name>CERT RR</name>
        <t>Most attestations can be placed into DNS. An exception to this is the Attestation Certificate made during Session ID registration. This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
        <t>These should be held in CERT RRs <xref target="RFC4398" format="default"/>.</t>
      </section>
      <section anchor="ns-rr" numbered="true" toc="default">
        <name>NS RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>Along with their associated "glue" record (A/AAAA) supports the traversal in DNS across the tree.</t>
        <ol spacing="normal" type="1"><li>
            <tt>&lt;mfr.remoteid.aero&gt;</tt> on Root points to specific DET FQDN of IRM</li>
          <li>
            <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero</tt> on IRM points to specific DET FQDN of MRA</li>
          <li>
            <tt>&lt;raa_value&gt;.det.remoteid.aero</tt> on Root pointing to DET FQDN of matching RAA</li>
          <li>
            <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero</tt> on RAA pointing to DET FQDN of matching HDA</li>
        </ol>
      </section>
      <section anchor="aaaa-rr" numbered="true" toc="default">
        <name>AAAA RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>DRIP requires the use of IPv6.</t>
      </section>
      <section anchor="svr-rr" numbered="true" toc="default">
        <name>SVR RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
        <t>The best example of this is RIDR would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
        <t>In all cases the server being pointed to MUST be protected using AAA, specifically using RDAP.</t>
        <t>##</t>
      </section>
      <section anchor="tlsa-rr" numbered="true" toc="default">
        <name>TLSA RR</name>
        <!-- TODO(atw): clean up this text and add substance -->
<!-- Holds raw HI or x.509 cert -->

<t>This RR <xref target="RFC6698" format="default"/> is mainly used to support DTLS deployments where the DET is used (e.g. Network RID and the wider UTM system). The HI is encoded using the SubjectPublicKeyInfo selector. DANE <xref target="RFC6698" format="default"/> is for servers, DANCE <xref target="dane-clients" format="default"/> is for clients.</t>
      </section>
    </section>
    <section anchor="registry-operations" numbered="true" toc="default">
      <name>Registry Operations</name>
      <t>As a general rule the following processing performed for any registration operation:</t>
      <ol spacing="normal" type="1"><li>Verify input Attestations from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate DNS with required/optional records</li>
        <li>Populate Database with PII and other info</li>
        <li>Generate and return required/optional Attestations/Certificates</li>
      </ol>
      <section anchor="registering-a-registry" numbered="true" toc="default">
        <name>Registering a Registry</name>
        <t>DRIP defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries" format="default"/>.</t>
        <!-- Author Note (atw): is the hhit-registries draft and reference needed anymore? -->

<t>Both the parent and child generate their own keypairs and self-signed attestations if not generated previously. The child sends to the parent its self-signed attestation to be added into the parent DNS.</t>
        <t>The parent confirms the attestation received is valid and that no DET collisions occur before adding a NS RR (and CERT RRs) to its DNS for the new child. An attestation, parent on child, is sent as a confirmation that provisioning was successful.</t>
        <t>The child is now a valid member of the registry tree and uses its keypair and Self-Attestation with all provisioning requests towards it. The HIP RR for the child is populated into the local DNS along with any CERT RRs.</t>
        <section anchor="registering-an-raa" numbered="true" toc="default">
          <name>Registering an RAA</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of RAA</td>
                <td align="left">Root: <tt>&lt;raa_value&gt;.det.remoteid.aero NS &lt;raa_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, RAA</td>
              </tr>
              <tr>
                <td align="left">RAA Self-Attestation</td>
                <td align="left">Root: <tt>&lt;raa_det_fqdn&gt; AAAA &lt;raa_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;raa_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-irm" numbered="true" toc="default">
          <name>Registering an IRM</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of IRM</td>
                <td align="left">Root: <tt>mfr.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, IRM</td>
              </tr>
              <tr>
                <td align="left">IRM Self-Attestation</td>
                <td align="left">Root: <tt>1.det.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">Root: <tt>&lt;irm_det_fqdn&gt; AAAA &lt;irm_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;irm_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-hda" numbered="true" toc="default">
          <name>Registering an HDA</name>
          <t>Specifically handled by an RAA (<xref target="raa" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of HDA</td>
                <td align="left">RAA: <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero NS &lt;hda_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: RAA, HDA</td>
              </tr>
              <tr>
                <td align="left">HDA Self-Attestation</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; AAAA &lt;hda_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;hda_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-mra" numbered="true" toc="default">
          <name>Registering an MRA</name>
          <t>Specifically handled by the IRM (<xref target="irm" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of MRA</td>
                <td align="left">IRM: <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: IRM, MRA</td>
              </tr>
              <tr>
                <td align="left">MRA Self-Attestation</td>
                <td align="left">IRM: <tt>&lt;hda_value&gt;.1.det.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">ICAO Manufacturer Code</td>
                <td align="left">IRM: <tt>&lt;mra_det_fqdn&gt; AAAA &lt;mra_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;mra_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="registering-a-serial-number" numbered="true" toc="default">
        <name>Registering a Serial Number</name>
        <t>Specifically handled by an MRA (<xref target="mra" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt>)</td>
              <td align="left">(Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">(UA Self-Attestation)</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;sn_self_attestation&gt;</tt>)</td>
              <td align="left">(Broadcast Attestation: MRA, UA</td>
            </tr>
            <tr>
              <td align="left">UA Metadata</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;attestation_mra_sn&gt;</tt>)</td>
              <td align="left">(Concise Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;concise_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;broadcast_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <!-- Author Note (atw): when registering a SN it could either be a DRIP encoded SN or it could be a non-DRIP SN. In the former case Attestations are both provided and generated during the registration process. The later case there will be no DRIP Attestations produced and most likely an X.509? Also there would be no RRs - so what do we point to to avoid NXDOMAINs; perhaps SVR/AAAA records? -->

<figure>
          <name>Manufacturer Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +--------------+    SA-a0a0 +-----------------+
    | Manufacturer | <--------> | Manufacturer CA |
    +--------------+ A-ma0      +-----------------+
        ^    |
        |    |
        |    |
SA-a0a0 |    |   A-ma0
        |    |
        |    v
    +----------+
    | Aircraft |
    +----------+
]]></artwork>
        </figure>
        <t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A Serial Number for UAS. Under DRIP a DET can be encoded as such to be able to convert back and forth between them. This is covered in <xref target="drip-rid" format="default"/>.</t>
        <t>Under DRIP the Manufacturer SHOULD be using DETs and have their own keypair and Self-Attestation: Manufacturer (SA-m). (Ed. Note: some words on aircraft keypair and certs here?).</t>
        <t>Self-Attestation: Aircraft 0 on Aircraft 0 (SA-a0a0) is extracted by the manufacturer and sent to their Certificate Authority (CA) to be verified and added. A resulting attestation (Attestation: Manufacturer on Aircraft 0 [A-ma0]) SHOULD be a DRIP Attestation - however this could be a X.509 certificate binding the serial number to the manufacturer.</t>
      </section>
      <section anchor="registering-an-operator" numbered="true" toc="default">
        <name>Registering an Operator</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <!-- Author Note (atw): this could also be handled by the RAA run by the CAA and act as a registration point for Operators in their NAS in general. Many CAAs, for example the FAA, already have separate systems deployed to handle this information. We could be asking a lot of the user (registering to another place and specifically for DRIP) and CAA to deploy this new database in an attempt to unify the system -->

<table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Operator Self-Attestation</td>
              <td align="left">
                <tt>&lt;op_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Operator PII</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;op_self_attestation&gt;</tt>)</td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;attestation_ridr_op&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;concise_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <figure>
          <name>Operator Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+  [HIP RR]  +---------+
    ^   |
    |   |
    |   |
Coo |   | Aro
    |   |
    |   v
+----------+
| Operator |
+----------+
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in DRIP UAS RID. A self-signed attestation (Self-Attestation: Operator on Operator [SA-oo]) is generated and sent to the desired registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the registry (all over a secure channel - the method of which is out of scope for this document).</t>
        <t>The registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The DET is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the DET/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>
        <t>With the receipt of Attestation: Registry on Operator (A-ro) the provisioning of an Operator is complete.</t>
      </section>
      <section anchor="sid-registration" numbered="true" toc="default">
        <name>Registering a Session ID</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attestation: RIDR, Operator</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Attestation: Operator, UA</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;session_self_attestation&gt;</tt></td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_session&gt;</tt></td>
              <td align="left">Attestation Certificate: RIDR, Operator, UA</td>
            </tr>
            <tr>
              <td align="left">(Concise Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">(Mutual Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;concise_attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Mutual Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Link Attestation: Operator, UA)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Concise Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Operational Intent)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Link Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: RAA, RIDR)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: Root, RAA)</td>
            </tr>
          </tbody>
        </table>
        <section anchor="standard-provisioning" numbered="true" toc="default">
          <name>Standard Provisioning</name>
          <t>Under standard provisioning the Aircraft has its own connectivity to the registry, the method which is out of scope for this document.</t>
          <figure>
            <name>Standard Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        A-a0aN          +----------+
]]></artwork>
          </figure>
          <t>Through mechanisms not specified in this document the Operator should have methods to instruct the Aircraft onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Self-Attestation: Aircraft 0 on Aircraft 0 [SA-a0a0]). This new attestation (Attestation: Aircraft 0 on Aircraft N [A-a0aN]) is securely extracted by the Operator.</t>
          <t>With A-a0aN the sub-attestation (Self-Attestation: Aircraft N on Aircraft N [SA-aNaN]) is used by the Operator to generate Attestation: Operator on Aircraft N (A-oaN). This along with Attestation: Registry on Operator (A-ro) is sent to the registry.</t>
          <figure>
            <name>Standard Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork>
          </figure>
          <t>On the registry, A-ro is verified and used as confirmation that the Operator is already registered. A-oaN also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>
          <t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 to Aircraft N (A-a0aN).</t>
          <figure>
            <name>Standard Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  AC-roaN               BA-raN  |    |  A-ma0, A-a0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork>
          </figure>
          <t>The registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new DET tied to Aircraft N is then checked for collisions in the HDA. With the information the registry generates two items: Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>
          <t>AC-roaN is sent via a secure channel back to the Operator to be stored. BA-raN is sent to the Aircraft to be used in Broadcast RID as specified in <xref target="drip-auth" format="default"/>.</t>
        </section>
        <section anchor="operator-assisted-provisioning" numbered="true" toc="default">
          <name>Operator Assisted Provisioning</name>
          <t>This provisioning scheme is for when the Aircraft is unable to connect to the registry itself or does not have the hardware required to generate keypairs and attestations.</t>
          <figure>
            <name>Operator Assisted Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+     aN, SA-aNaN        +----------+
]]></artwork>
          </figure>
          <t>To start the Operator generates on behalf of the Aircraft a new keypair and Attestation: Aircraft N on Aircraft N (SA-aNaN). This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N (A-a0aN). After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>
          <figure>
            <name>Operator Assisted Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-ma0, A-a0aN, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+      A-ma0, A-a0aN     +----------+
]]></artwork>
          </figure>
          <t>Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 on Aircraft N (A-a0aN) is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator (A-ro), Attestation: Manufacturer on Aircraft 0 (A-ma0), Attestation: Aircraft 0 on Aircraft N (A-a0aN), Attestation: Operator on Aircraft N (A-oaN).</t>
          <figure>
            <name>Operator Assisted Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  AC-roaN, BA-raN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        BA-raN          +----------+
]]></artwork>
          </figure>
          <t>On the registry validation checks are done on all attestations as per the previous sections. Once complete then the registry checks for a DET collision, adding to the HDA if clear and generates Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). Both are sent back to the Operator.</t>
          <t>The Operator securely inject BA-raN and securely stores AC-roaN of Aircraft N.</t>
        </section>
        <section anchor="initial-provisioning" numbered="true" toc="default">
          <name>Initial Provisioning</name>
          <t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>
          <!-- Author Note (atw): this action of registration is the same as an owner needed to use something like FAA DroneZone to register the SN of the aircraft to their CAA Assigned ID. So it doesn't make a whole lot of sense to do this at the HDA level (then it would need to be done for every HDA the user wants to fly under - potentially many). Is this a concern? -->

<t>For this either Standard or Operator Assisted methods can be used.</t>
        </section>
      </section>
    </section>
    <section anchor="epp-command-mappings" numbered="true" toc="default">
      <name>EPP Command Mappings</name>
      <section anchor="common-attributes" numbered="true" toc="default">
        <name>Common Attributes</name>
        <t>There are a number of common attributes between the various EPP commands under DRIP that has specific encoding rules.</t>
        <ul spacing="normal">
          <li>The <tt>hi</tt> attribute is a Base64 encoding of the Host Identity.</li>
          <li>The <tt>det</tt> attribute is a string from of the DET.</li>
        </ul>
      </section>
      <section anchor="epp-query-commands" numbered="true" toc="default">
        <name>EPP Query Commands</name>
        <section anchor="epp-query-check" numbered="true" toc="default">
          <name>EPP &lt;check&gt; Command</name>
          <section anchor="epp-check-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-check-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-check-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-check-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-info" numbered="true" toc="default">
          <name>EPP &lt;info&gt; Command</name>
          <section anchor="epp-info-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-info-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-info-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-info-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
      </section>
      <section anchor="epp-transform-commands" numbered="true" toc="default">
        <name>EPP Transform Commands</name>
        <!-- Author Note (atw): TODO: add DET/HI pairs to examples -->

<section anchor="epp-transform-create" numbered="true" toc="default">
          <name>EPP &lt;create&gt; Command</name>
          <section anchor="epp-create-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>The <tt>abbreviation</tt> field has a max of 6 characters, and is used by RID receivers to display a short decoded form for display of a received DET in the form of <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. If the abbreviation is unknown then the receiver SHOULD use the hexadecimal encoding of the respective RAA/HDA field of the HID as the value in the form. For example if the HDA is unknown and the HDA value is 20 then the decoded display would be: <tt>DE 14 FE23</tt>. Typically for RAAs the <tt>abbreviation</tt> is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA. Dashes or underscores should be used in place of spaces.</t>
            <!-- Author Note (atw): does the above text need to be moved to DET draft instead (and possible expanded)? -->

<t>The <tt>mfrCode</tt> field is only used by an MRA (<xref target="mra" format="default"/>) when registering with an IRM (<xref target="irm" format="default"/>) and holds the ICAO assigned Manufacturer Code for ANSI CTA2063-A Serial Numbers. It has a max of 4 characters.</t>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripRegistry:dripRegistry xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
    <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
    <dripRegistry:hi></dripRegistry:hi>
    <dripRegistry:selfAttestation>Hex of SelfAttestation(Registry)</dripRegistry:selfAttestation>
    <dripRegistry:raa>10</dripRegistry:raa>
    <dripRegistry:hda>20</dripRegistry:hda>
    <dripRegistry:abbreviation>FAA</dripRegistry:abbreviation>
    <dripRegistry:mfrCode>MFR0</dripRegistry:mfrCode>
    <dripRegistry:postalInfo type="int">
      <dripRegistry:name>Federal Aviation Administration</dripRegistry:name>
      <dripRegistry:phys_addr>
        <dripRegistry:street1>Orville Wright Federal Building</dripRegistry:street1>
        <dripRegistry:street2>800 Independence Avenue SW</dripRegistry:street2>
        <dripRegistry:city>Washington</dripRegistry:city>
        <dripRegistry:sp>DC</dripRegistry:sp>
        <dripRegistry:pc>20591</dripRegistry:pc>
        <dripRegistry:cc>US</dripRegistry:cc>
      </dripRegistry:phys_addr>
    </dripRegistry:postalInfo>
    <dripRegistry:voice x="1234">1 (866) 835-5322</dripRegistry:voice>
    <dripRegistry:email>stephen.dickson@faa.gov</dripRegistry:email>
  </dripRegistry:dripRegistry>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripOperator:dripOperator xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
    <dripOperator:postalInfo type="int">
      <dripOperator:phys_addr>
        <dripOperator:street1>123 Example Dr.</dripOperator:street1>
        <dripOperator:street2>Suite 100</dripOperator:street2>
        <dripOperator:city>Dulles</dripOperator:city>
        <dripOperator:sp>VA</dripOperator:sp>
        <dripOperator:pc>20166-6503</dripOperator:pc>
        <dripOperator:cc>US</dripOperator:cc>
      </dripOperator:phys_addr>
    </dripOperator:postalInfo>
    <dripOperator:part107_acct_name>some_faa_account</dripOperator:part107_acct_name>
    <dripOperator:rec_flyer_id>123456</dripOperator:rec_flyer_id>
    <dripOperator:caaId></dripOperator:caaId>
    <dripOperator:det></dripOperator:det>
    <dripOperator:hi></dripOperator:hi>
    <dripOperator:selfAttestation>Hex of SelfAttestation(Operator)</dripOperator:selfAttestation>
    <dripOperator:attestation>Hex of Attestation(Registry, Operator)</dripOperator:attestation>
  </dripOperator::dripOperator>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-sn" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSerial:dripSerial xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
    <dripSerial:serial>0000F000000000000000</dripSerial:serial>
    <dripSerial:det></dripSerial:det>
    <dripSerial:hi></dripSerial:hi>
    <dripSerial:selfAttestation>Hex of SelfAttestation(Aircraft)</dripSerial:selfAttestation>
    <dripSerial:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSerial:broadcastAttestation>
    <dripSerial:manufacturer>Drones R Us</dripSerial:manufacturer>
    <dripSerial:make>Fast Drone</dripSerial:make>
    <dripSerial:model>9000</dripSerial:model>
    <dripSerial:color>White</dripSerial:color>
    <dripSerial:material>Plastic</dripSerial:material>
    <dripSerial:weight>12.0</dripSerial:weight>
    <dripSerial:length>5.0</dripSerial:length>
    <dripSerial:width>4.0</dripSerial:width>
    <dripSerial:height>3.0</dripSerial:height>
    <dripSerial:numRotors>4</dripSerial:numRotors>
    <dripSerial:propLength>2.0</dripSerial:propLength>
    <dripSerial:batteryCapacity>5000</dripSerial:batterCapacity>
    <dripSerial:batteryVoltage>12</dripSerial:batteryVoltage>
    <dripSerial:batteryWeight>5.2</dripSerial:batteryWeight>
    <dripSerial:batteryChemistry>Lithium-Ion</dripSerial:batteryChemistry>
    <dripSerial:takeOffWeight>15</dripSerial:takeOffWeight>
    <dripSerial:maxTakeOffWeight>25</dripSerial:maxTakeOffWeight>
    <dripSerial:maxPayloadWeight>10</dripSerial:maxPayloadWeight>
    <dripSerial:maxFlightTime>15</dripSerial:maxFlightTime>
    <dripSerial:minOperatingTemp>35</dripSerial:minOperatingTemp>
    <dripSerial:maxOperatingTemp>90</dripSerial:maxOperatingTemp>
    <dripSerial:ipRating>55</dripSerial:ipRating>
  </dripSerial:dripSerial>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSession:dripSession xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
    <dripSession:serial>0000F000000000000000</dripSession:serial>
    <dripSession:uasId></dripSession:uasId>
    <dripSession:sessionHi></dripSession:sessionHi>
    <dripSession:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSession:broadcastAttestation>
    <dripSession:attestationCertificate>Hex of AttestationCertificate(Registry, Operator, Aircraft)</dripSession:attestationCertificate>
    <dripSession:operationalIntent></dripSession:operationalIntent>
    <dripSession:operationalIntentSrc>uss.example.com</dripSession:operationalIntentSrc>
    <dripSession:operatorId>NOP123456</dripSession:operatorId>
    <dripSession:operatorDet></dripSession:operatorDet>
    <dripSession:attestation>Hex of Attestation(Operator, Aircraft)</dripSession:attestation>
    <dripSession:mutualAttestation>Hex of MutualAttestation(Registry, Operator)</dripSession:mutualAttestation>
    <dripSession:fa3>N1232456</dripSession:fa3>
    <dripSession:sessionStart>2022-04-09T15:43:13Z</dripSession:sessionStart>
    <dripSession:sessionEnd>2022-04-09T20:43:13Z</dripSession:sessionEnd>
  </dripSession:dripSession>
</extension>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-delete" numbered="true" toc="default">
          <name>EPP &lt;delete&gt; Command</name>
          <section anchor="epp-delete-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripRegistry:delete xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
      </dripRegistry:delete>
    </delete>
    <clTRID>DEL-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripOperator:delete xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
      </dripOperator:delete>
    </delete>
    <clTRID>DEL-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSerial:delete xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
      </dripSerial:delete>
    </delete>
    <clTRID>DEL-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSession:delete xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:uasId></dripSession:uasId>
      </dripSession:delete>
    </delete>
    <clTRID>DEL-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-renew" numbered="true" toc="default">
          <name>EPP &lt;renew&gt; Command</name>
          <t>Renewal semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;renew&gt; command.</t>
        </section>
        <section anchor="epp-transform-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
        <section anchor="epp-transform-update" numbered="true" toc="default">
          <name>EPP &lt;update&gt; Command</name>
          <section anchor="epp-update-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-update-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-update-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-update-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
      </section>
    </section>
    <section anchor="rdap-definitions" numbered="true" toc="default">
      <name>RDAP Definitions</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- Author Note (atw): need help here: EPP/RDAP adds to existing registries, CERT RR update, HIP RR update -->

</section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="det-generation" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <dl newline="false" spacing="normal">
          <dt>1</dt>
          <dd>
  The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Attestation) or denied.</dd>
          <dt>2</dt>
          <dd>
  The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</dd>
        </dl>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations" format="default"/>) and connectivity it is acceptable under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning" format="default"/>). The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
        <t>In either case the registry must decide on if the HI/DET pairing is valid. This in its simplest form is checking the current registry for a collision on the DET and HI.</t>
        <t>Upon accepting a HI/DET pair the registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The registry MUST also generate the appropriate attestations/certificates for the given operation.</t>
        <t>If the registry denied the HI/DET pair, because there was a DET collision or any other reason, the registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>
      </section>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>Scott Hollenbeck for his initial guidance with EPP/RDAP</li>
      </ul>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>Andrei Gurtov for his insights as a pilot</li>
        <li>Len Bayles for his help in formatting EPP definitions and creating an extension for FRED</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="F3411-19">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC8005" target="https://www.rfc-editor.org/info/rfc8005">
          <front>
            <title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8005"/>
          <seriesInfo name="DOI" value="10.17487/RFC8005"/>
        </reference>
        <reference anchor="RFC4398" target="https://www.rfc-editor.org/info/rfc4398">
          <front>
            <title>Storing Certificates in the Domain Name System (DNS)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>Cryptographic public keys are frequently published, and their authenticity is demonstrated by certificates.  A CERT resource record (RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4398"/>
          <seriesInfo name="DOI" value="10.17487/RFC4398"/>
        </reference>
        <reference anchor="drip-requirements" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-24.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao">
              <organization>Tencent</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="10" month="June" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-24"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="hhit-registries" target="https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt">
          <front>
            <title>Hierarchical HIT Registries</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-hip-hhit-registries-02"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-09.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="17" month="June" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the Net-RID messaging.  This
   is secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure
   messaging Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-09"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-00.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="24" month="March" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-00"/>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-14.txt">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="21" month="June" year="2022"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture.  It defines a
   few message schemes (sent within the Authentication Message) that can
   be used to authenticate past messages sent by a unmanned aircraft
   (UA) and provide proof of UA trustworthiness even in the absence of
   Internet connectivity at the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-14"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-attestations-certificates" numbered="true" toc="default">
      <name>DRIP Attestations &amp; Certificates</name>
      <t>See <xref target="drip-arch" format="default"/> for definitions of claim, assertion, attestation and certificate as used in this document.</t>
      <section anchor="attestation-structure" numbered="true" toc="default">
        <name>Attestation Structure</name>
        <t>All Attestations (<xref target="attestations" format="default"/>) and Certificates (<xref target="certificates" format="default"/>) under DRIP share the following format structure:</t>
        <figure anchor="att-struct">
          <name>Attestation Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                 Attestor Identity Information                 .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                       Attestation Data                        .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|               Expiration Timestamp by Attestor                |
+---------------+---------------+---------------+---------------+
|                 Signing Timestamp by Attestor                 |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                     Signature by Attestor                     |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Attestor Identity Information: (0, 16-bytes or 120-bytes)
    Field containing Attestor Identity Information in various forms.

Attestation Data:
    A field of variable length containing the attestation data.

Expiration Timestamp by Attestor (4 bytes):
    Timestamp denoting recommended time to trust data to.

Signing Timestamp by Attestor (4 bytes):
    Current time at signing.

Attestor Signature (64 bytes):
    Signature over preceding fields using the keypair of 
    the Attestor.
]]></artwork>
        </figure>
        <section anchor="attestor-identity-information" numbered="true" toc="default">
          <name>Attestor Identity Information</name>
          <t>This can be either of the following:</t>
          <ol spacing="normal" type="1"><li>Attestor DET: 16-bytes</li>
            <li>Attestor Self-Attestation: 120-bytes</li>
          </ol>
          <t>A specific definition of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) defines which of these are used.</t>
        </section>
        <section anchor="attestation-data" numbered="true" toc="default">
          <name>Attestation Data</name>
          <t>The data being attested to. It can be one of the following forms:</t>
          <ol spacing="normal" type="1"><li>Claims</li>
            <li>Assertions</li>
            <li>Attestations</li>
          </ol>
          <t>This field is variable length with no limit and specific definitions of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) indicate the fields, size and ordering of any subfields.</t>
        </section>
        <section anchor="expiration-timestamp" numbered="true" toc="default">
          <name>Expiration Timestamp</name>
          <t>A UTC timestamp set some time into the future to indicate a point the Attestation Structure should not be trusted.</t>
          <!-- Author Note (atw): we need to highlight here how important the delta needs to be, but not over constrain -->

<t>The time delta into the future is of important concern as replay attacks on during flight could compromise the goals of DRIP. Attestations and certificates intended for public use and lower in the tree (importantly any generated for a Session ID (<xref target="sid-registration" format="default"/>)).</t>
          <t>For this reason deltas SHOULD be kept as short as possible for the given use-case to avoid issues with replays.</t>
        </section>
        <section anchor="signing-timestamp" numbered="true" toc="default">
          <name>Signing Timestamp</name>
          <t>A UTC timestamp set to the time when the Attestation Structure was signed.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>An EdDSA25519 signature using the signing parties private key over the preceding fields in the Attestation Structure.</t>
          <ul empty="true" spacing="normal">
            <li>
              <ul empty="true" spacing="normal">
                <li>Note: the preceding fields of the Attestation Structure actually form an Assertion, with all fields acting as Claims</li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="attestations" numbered="true" toc="default">
        <name>Attestations</name>
        <section anchor="self-attestation" numbered="true" toc="default">
          <name>Self-Attestation (SA-x)</name>
          <t>The only attestation to use a claim (the Host Identity) in the <tt>Attestation Data</tt> with the DET acting as the <tt>Attestor Identity Information</tt>.</t>
          <figure anchor="axx-fig">
            <name>DRIP Self-Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                         Trust Timestamp                       |
+---------------+---------------+---------------+---------------+
|                        Signing Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 120-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="attestation" numbered="true" toc="default">
          <name>Attestation (A-x.y)</name>
          <t>The standard first level DRIP Attestation form using a Self-Attestations of the signer and of the data being signed.</t>
          <figure anchor="axy-fig">
            <name>DRIP Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-xx                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-yy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 312-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-attestation" numbered="true" toc="default">
          <name>Concise Attestation (CA-x.y)</name>
          <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this attestation can be used.</t>
          <figure anchor="c-axy-fig">
            <name>DRIP Concise Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 104-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-attestation" numbered="true" toc="default">
          <name>Mutual Attestation (MA-x.y)</name>
          <t>An attestation that perform a sign over an existing Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="m-axy-fig">
            <name>DRIP Mutual Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 400-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-attestation" numbered="true" toc="default">
          <name>Link Attestation (LA-x.y)</name>
          <t>An attestations that perform a sign over an existing Concise Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="l-axy-fig">
            <name>DRIP Link Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="broadcast-attestation" numbered="true" toc="default">
          <name>Broadcast Attestation (BA-x.y)</name>
          <t>Required by DRIP Authentication Formats for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="drip-requirements" format="default"/> GEN-1 and GEN-3.</t>
          <figure anchor="b-axy-fig">
            <name>DRIP Broadcast Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 136-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificates" numbered="true" toc="default">
        <name>Certificates</name>
        <t>In DRIP certificates are signed by a third party that has no stake in the claims/assertions/attestations being attested to.</t>
        <t>It is analogous to a third party in legal system that signs a document as a "witness" and bears no responsibility in the document.</t>
        <section anchor="attestation-certificate" numbered="true" toc="default">
          <name>Attestation Certificate (AC-z.x.y)</name>
          <figure anchor="a-cxy-fig">
            <name>DRIP Attestation Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 504-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-certificate" numbered="true" toc="default">
          <name>Concise Certificate (CC-z.x.y)</name>
          <figure anchor="c-cxy-fig">
            <name>DRIP Concise Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-certificate" numbered="true" toc="default">
          <name>Link Certificate (LC-z.x.y)</name>
          <figure anchor="l-cxy-fig">
            <name>DRIP Link Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             LA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 300-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-certificate" numbered="true" toc="default">
          <name>Mutual Certificate (MC-z.x.y)</name>
          <figure anchor="m-cxy-fig">
            <name>DRIP Mutual Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             MA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 576-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of attestation and certificates can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular attestation/certification can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Attestation: Unmanned Aircraft</tt></li>
            <li>
              <tt>Attestation: Operator on Aircraft</tt> or <tt>Attestation: Operator, Aircraft</tt></li>
            <li>
              <tt>Attestation Certificate: Registry on Operator on Aircraft</tt> or <tt>Attestation Certificate: Registry, Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SA(Unmanned Aircraft)</tt> or <tt>SA-ua</tt></li>
            <li>
              <tt>A(Operator, Unmanned Aircraft)</tt> or <tt>A-op.ua</tt></li>
            <li>
              <tt>AC(Registry, Operator, Aircraft)</tt> or <tt>AC-reg.op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various certificates a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-{hash of entity}</tt></li>
            <li>
              <tt>a-{hash of entity x}_{hash of entity y}</tt></li>
            <li>
              <tt>ac-{hash of entity z}_{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>a-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ac-aac6b00abba268b7_120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this
document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators)
may benefit from having X.509 certificates.  Most of these certificates
will be for their DET and some will be for other UAS identities.  To
provide for these certificates, some of the other entities covered in
this document will also have certificates to create and manage the
necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to
the ICAO's International Aviation Trust Framework (IATF) Certificate
Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either
be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey
(i.e. HI) in authentication protocols (as not all may support
rawPublicKey identities).  Some EE HI may not be 'worth' supporting the
overhead of X.509.  Short lived DETs like those used for a single
operation or even for a day's operations may not benefit from X.509. 
Creating then almost immediately revoking these certificates is a
considerable burden on all parts of the system.  Even using a short
notAfterDate will completely mitigate the burden of managing these
certificates.  That said, many EEs will benefit to offset the effort. 
It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its
DETs.  An RAA may specifically have some HDAs for DETs that do not
want/need certificates and other HDAs for DETs that do need them.  These
types of HDAs could be managed by a single entity thus providing both
environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA
Resource Records.  This not only generally improves certificate lookups,
but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the
UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). 
All DRIP certificates MUST be available via RDAP.  LDAP/OCSP access for
other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used.  The certificate
request SHOULD be included in the DET registration request (<xref target="registry-operations" format="default"/>).  A successful DET registration then MUST
include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation.  TLSA RR MUST be
deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. 
CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and
further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="blockchain-based-registries" numbered="true" toc="default">
      <name>Blockchain-based Registries</name>
      <t>The implementation of the registries and Network Remote Identification
(Network RID; identify a UA through the network) in DRIP
is yet to be determined. Blockchain, being synonymous with ledger,
is a technology that could naturally fulfil the role of a registry, while
simultaneously offering its benefits such as auditability, persistency
and decentralization. We suggest that blockchain is an
ample candidate to be used as registry within DRIP. We also show
that it can be used to effectively leverage Network RID in certain
scenarios. Thus 1) We propose a novel drone ID architecture based on Hyperledger
Iroha and describe its proof-of-concept implementation with DRIP.
2) Its performance and scalability is empirically evaluated. 3) We
perform an informal security analysis of the system against various
types of attacks [<eref target="https://doi.org/10.1145/3479243.3487305">Secure Drone Identification with Hyperledger Iroha</eref>].</t>
      <t>Figure 1: Architecture using blockchain as registry for DRIP</t>
      <t>The proposed architecture is presented in Fig. 1. It consists of the
usual actors in a UAS network, along with the blockchain registry
based on Hyperledger Iroha. Key components:
o Authorized users (administrators) can register new UAs to
the network, and store with them any relevant data such as
public keys and certificates.</t>
      <t>Drones can either send location updates directly to the blockchain,
given that they are connected to the Internet, or send location
updates to their connected Ground Control Station (GCS)
that forwards it on behalf of the drones.
o Observers can receive drone messages either through bluetooth
and WiFi broadcasts from drones, or by polling the
blockchain. They can also fetch the public key associated
with a drone in order to validate its messages.
o The blockchain network and its nodes are an entirely separate
entity, no other actor participates in the consensus of
new blocks.</t>
      <t>Actors within DRIP (except observers) will be registered as accounts
on the blockchain network. Each of these accounts will have their
DRIP identities, certificates and public keys stored and available so
that they can be validated and used for validation by any account
on the blockchain. Note that DRIP crypto key-pairs are separate
from the blockchain crypto key-pairs. DRIP key-pairs are used to
sign, verify and validate DRIP identities and messages, while the
blockchain key-pairs are used to sign, verify and validate transactions
on the blockchain.</t>
      <t>The DRIP requirements for a registry are the following:
(1) REG-1: Public lookup
(2) REG-2: Private lookup
(3) REG-3: Provisioning (of static/dynamic data of UAs)
(4) REG-4: AAA Policy</t>
      <t>REG-1 &amp; REG-2. In Hyperledger Iroha, accounts are created
on domains. The same account name can be used for multiple domains,
and these are seen as separate accounts on Iroha. PII for
an account can therefore be stored on a separate account (with
the same account name) existing on a separate domain, that only
allows certain accounts to view its account details. Accordingly, a
registry using Iroha would need at least two domains associated
with it for any given account, one for public lookup and one for
private lookup.</t>
      <t>REG-3 &amp; REG-4. The details for an account are set with a
key/value pair. Key/value pairs can not be removed once they are
set, values can only be modified through the corresponding key.
Furthermore, the account that sets a key/value pair is included in
the account details as a key/value pair itself, meaning one account
can not modify details set by another account. See Listing 1 for
clarification. Notice that both accounts have set the same key but
contain different values. This sort of implementation supports both
non-repudiation, but also trust in the sense that a drone (assuming
the drone is not compromised) can always trust its own data, and
does not have to interpret data coming from other accounts. Similarly,
other accounts accessing another account's data can trust
that it is set by the corresponding account (e.g. fetching gps data).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
